The present disclosure relates to a method and devices for configuring electronic locks. Specifically, the present disclosure relates to a method, a computer system, and computer program products for configuring access rights of electronic locks.
Methods of configuring electronic locks using a mobile communication device are known in scenarios where the electronic locks are configured to grant access to users with registered electronic key devices and thereby control access to certain areas or physical spaces restricted to the users within a building, for example. However, in buildings, in particular apartment buildings using electronic locks to control access to shared spaces and private spaces alike, the method of configuring the electronic locks faces various challenges. This is even more the case, when for controlling access to private spaces stand-alone/offline electronic locks are used, and for controlling access to shared spaces networked/online electronic locks are used. Here the challenges include synchronizing different electronic locks, such that an access right to a private space, e.g. an apartment, also allows access to certain shared spaces, e.g. the main door of the apartment building. A further challenge is the transfer of access and configuration rights, e.g. in case of a change of tenants.
Some attempts are known from the prior art to address these challenges, which are shortly described hereinafter.
EP3358534A1 first published in February of 2017, in the name of Dormakaba Deutsch-land GmbH, relates to a system for controlling access to a physical space within a building. The system comprises an access control server, an electronic lock for granting access to the physical space upon validation of access rights, and an administrator smartphone capable of communicating with the electronic lock and with the access control server. The administrator smartphone stores access rights readable by the electronic lock and user rights for accessing the access control server and for delegating access rights.
It is an object of this disclosure to provide a method and devices for configuring access rights of electronic locks, which method and devices do not have at least some of the disadvantages of the prior art. In particular, it is an object of the present disclosure to provide a method of configuring access rights of electronic locks by means of a specifically controlled mobile communication device, a computer program product for the mobile communication device, a computer system and a computer program product for the computer system.
According to the present disclosure, these objects are achieved through the features of the independent claims. In addition, further advantageous embodiments follow from the dependent claims and the description.
According to the present disclosure, the above-mentioned objects are particularly achieved in that the method of configuring access rights of electronic locks comprises the steps of obtaining by a mobile communication device an access right identifier. Further, transferring from the mobile communication device to a first electronic lock configuration data comprising the access right identifier, via a close range communication interface, thereby configuring the first electronic lock to grant an access right to electronic key devices having stored thereon the access right identifier. In addition the method comprises the step of transmitting from the mobile communication device to a computer system via a communication network an update request, comprising the access right identifier, enabling the computer system to transmit via the communication network the access right identifier to one or more second electronic locks for configuring the one or more second electronic locks to grant an access right to the electronic key devices having stored thereon the access right identifier.
In an embodiment, the mobile communication device obtains the access right identifier by one of the following steps: generating the access right identifier in the mobile communication device, reading the access right identifier, by the mobile communication device, from an electronic key device, and/or requesting the access right identifier, by the mobile communication device, from the computer system. The requesting is done by transmitting an access right identifier request from the mobile communication device to the computer system via the communication network, and receiving the access right identifier in the mobile communication device from the computer system via the communication network.
In an embodiment, the method further comprises transmitting a delegation request for another mobile communication device, from the mobile communication device, via the communication network, to the computer system, the delegation request comprising the access right identifier, enabling the computer system to transfer the access right identifier, via the communication network, to the other mobile communication device.
In an embodiment, the method further comprises the mobile communication device obtaining a configuration right identifier by reading the configuration right identifier from an electronic master key device. Alternatively or in addition the method comprises the mobile communication device obtaining the configuration right identifier by receiving the configuration right identifier from the computer system via the communication network. In this case the update request transmitted from the mobile communication device, via the communication network, to the computer system can further comprises the configuration right identifier, enabling the computer system to transmit, via the communication network, the access right identifier to the one or more second electronic locks, using the configuration right identifier.
In an embodiment, the method further comprises transferring a configuration request from the mobile communication device, via the close range communication interface, to the first electronic lock, the configuration request comprising the configuration right identifier, enabling the first electronic lock to store, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device.
In an embodiment, the method further comprises receiving by the first electronic lock a configuration right identifier from an electronic master key device, via the close range communication interface, and storing in the first electronic lock, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device.
In addition to the method of configuring access rights of electronic locks, the present disclosure also relates to a computer program product comprising computer program code for controlling a processor of a mobile communication device. Preferably a computer program product comprising a non-transitory computer-readable medium having stored thereon the computer program code configured to control a processor of a mobile communication device, such that the mobile communication device performs the steps of, obtaining an access right identifier, transferring configuration data via a close range communication interface to a first electronic lock, the configuration data comprising the access right identifier, thereby configuring the first electronic lock to grant an access right to electronic key devices having stored thereon the access right identifier; and transmitting an update request via a communication network to a computer system , the update request comprising the access right identifier, enabling the computer system to transmit the access right identifier, via the communication network, to one or more second electronic locks, for configuring the one or more second electronic locks to grant an access right to the electronic key devices having stored thereon the access right identifier.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the processor of the mobile communication device, such that the mobile communication device performs the steps of generating the access right identifier; reading the access right identifier from an electronic key device; or requesting the access right identifier from the computer system, by transmitting an access right identifier request to the computer system via the communication network, and receiving the access right identifier from the computer system via the communication network.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the processor of the mobile communication device, such that the mobile communication device transmits a delegation request for another mobile communication device, via the communication network, to the computer system, the delegation request comprising the access right identifier, enabling the computer system to transfer the access right identifier to the other mobile communication device via the communication network.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the processor of the mobile communication device, such that the mobile communication device performs the step of obtaining e a configuration right identifier by reading the configuration right identifier from an electronic master key device, and/or receiving the configuration right identifier from the computer system via the communication network. The medium of the computer program product has stored thereon further computer program code configured to control the processor of the mobile communication device, such that the mobile communication device performs the step of transmitting the update request via the communication network to the computer system, the update request further comprising the configuration right identifier, enabling the computer system to transmit the access right identifier, via the communication network, to the one or more second electronic locks, using the configuration right identifier.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the processor of the mobile communication device, such thatthe mobile communication device performs the step of transferring a configuration request via the close range communication interface to the first electronic lock, the configuration request comprising the configuration right identifier, enabling the first electronic lock to store, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device.
In addition to the computer program product for controlling a processor of a mobile communication device, the present disclosure also relates to a computer system for updating access rights of electronic locks. The computer system comprises one or more processors configured to perform the steps of receiving, via a communication network, an update re-questfrom a mobile communication device, the update request comprising an access right identifier, and transmitting configuration data via the communication network to one or more electronic locks, the configuration data comprising the access right identifier, thereby configuring the one or more electronic locks to grant an access right to electronic key devices having stored thereon the access right identifier.
In an embodiment, the one or more processors of the computer system are further configured to perform the steps of receiving from the mobile communication device, via a communication network, a delegation request comprising the access right identifier; and transmitting the access right identifier to another mobile communication device, via the communication network, enabling the other mobile communication device to gain access to electronic locks with the access right identifier stored thereon.
In an embodiment, the one or more processors of the computer system are further configured to perform the step of receiving the update request from the mobile communication device, via the communication network, the update request further comprising a configuration right identifier; and the computer system further comprises a memory with update assignment rules stored therein, the update assignment rules defining an assignment of the configuration right identifier to one or more electronic locks, enabling the computer system to transmit configuration data comprising the access right identifier, via the communication network, to one or more electronic locks, defined by the update assignment rules, using the configuration right identifier.
In an embodiment, the one or more processors of the computer system are further configured to perform the steps of transmitting a configuration rights identifier deletion request via a communication network to the mobile communication device, instructing the mobile communication to delete the configuration rights identifier stored thereon, and transmitting an access right identifier deletion request via the communication network to another mobile communication device, instructing the other mobile communication device to delete the access right identifier stored thereon.
In an embodiment, the one or more processors of the computer system are further configured to perform the steps of transmitting an access right identifier deletion request via the communication network to one or more electronic locks, the access right identifier deletion request comprising an access right identifier and instructing the one or more electronic locks to delete the access right identifier defined in the access right identifier deletion request.
In addition to the computer system for updating access rights of electronic locks, the present disclosure also relates to a computer program product for comprising computer program code for controlling one or more processors of a computer system. Preferably a computer program product comprising a non-transitory computer-readable medium having stored thereon the computer program code configured to control one or more processors of a computer system, such that the computer system performs the steps of receiving an update request via a communication network from a mobile communication device, the update request comprising an access right identifier, and transmitting configuration data via the communication network to one or more electronic locks, the configuration data comprising the access right identifier, thereby configuring the one or more electronic locks to grant an access right to electronic key devices having stored thereon the access right identifier.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the one or more processors of a computer system, such that the computer system performs the steps of receiving from the mobile communication device, via a communication network, a delegation request comprising the access right identifier, and transmitting the access right identifier to another mobile communication device, via the communication network, enabling the other mobile communication device to gain access to electronic locks with the access right identifier stored thereon.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the one or more processors of a computer system, such that the computer system performs the steps of receiving the update request from the mobile communication device, via the communication network, the update request further comprising a configuration right identifier, and the medium has stored thereon further computer program code configured to control the one or more processors to access a memory of the computer system, the memory having stored thereon update assignment rules defining an assignment of the configuration right identifier to one or more electronic locks, and to perform the step of transmitting configuration data comprising the access right identifier, via the communication network, to one or more electronic locks, defined by the update assignment rules, using the configuration right identifier.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the one or more processors of a computer system, such that the computer system performs the steps of transmitting a configuration rights identifier deletion request via a communication network to the mobile communication device, the configuration rights identifier deletion request instructing the mobile communication to delete the configuration rights identifier stored thereon; and transmitting an access right identifier deletion requestto another mobile communication device, via the communication network, instructing the other mobile communication device to delete the access right identifier stored thereon.
In an embodiment, the medium of the computer program product has stored thereon further computer program code configured to control the one or more processors of a computer system, such that the computer system performs the steps of transmitting an access right identifier deletion request via the communication network to one or more electronic locks, the access right identifier deletion request comprising an access right identifier and instructing the one or more electronic locks to delete the access right identifier defined in the access right identifier deletion request.
The present disclosure will be explained in more detail, by way of example, with reference to the drawings in which:
The electronic locks 1 and 2 are typically used to control access to physical spaces or certain areas within or around a building. The electronic locks 1 and 2 are configured to receive configuration data via a close range communication interface 13from the mobile communication device 3. There are essentially two types of electronic locks 1 and 2, wherein the first type of electronic locks 1 is configured to receive configuration data via the close range communication interface 13 and is typically configured and implemented as a stand-alone or off-line device. The second type of electronic locks 2 is configured to alternatively or in addition receive configuration data via a communication network 12, as shown in
The mobile communication devices 3 and 6 comprise a mobile radio telephone (i.e. a cellular phone), a tablet or notebook computer, a computerized watch, and/or another mobile communication device. As illustrated schematically in
In the exemplary situation of the apartment building described in the background section, the system would comprise an electronic master key device 7 per tenant, allowing each tenant to configure the first electronic locks 1 controlling the access to their respective apartment. In this context a combination of stand-alone and connected electronic locks 1, 2 is advantageous, as an ease of use and administration is provided, while satisfying legal or contractual requirements of tenants controlling the configuration of the electronic locks 1 to their apartments.
The computer system 5 is implemented as a local computer system 5 arranged within the building or in close proximity to the building, or as a remote computer system 5. The computer system 5 comprises one or more processors 9 and at least one memory 10 connected to the one or more processors, as schematically displayed in
The electronic key devices 4 and the electronic master key device 7 are implemented as an electronic key card, a smart/hybrid key or an electronic key. The electronic key devices 4 and the electronic master key device 7 are configured to transmit data stored thereon via a close range communication interface 13 to be received by an electronic lock 1, 2, or by a mobile communication device 3, 6.
The communication network 12 comprises a mobile radio network, such as GSM (Global System for Mobile Communication), UMTS (Universal Mobile Telephone System), WLAN (Wireless Local Area Network) or the like. As indicated in
The close range communication interface 13 is implemented as a radio-based communication interface, such as RFID communication interfaces (Radio Frequency Identifier), so called NFC interfaces (Near Field Communication), optical interfaces like infrared or visual communication interfaces, or Bluetooth communication interfaces. Preferred however are communication interfaces having a range of less than 2 meters, 1 meter or 30 centimeters.
In the following paragraphs, described with reference to
Step S1, as shown in
Once the mobile communication device 3 has obtained in step S1 the access right identifier, it can transfer in step S2 configuration data comprising the access right identifier to the first electronic lock 1, via a close range communication interface 13, as shown in
In order only allow a configuration of the first electronic lock 1, upon validation of a configuration right identifier stored on a physically present electronic master key device 7, performed are the steps described in the following paragraphs.
In an embodiment shown in
In another embodiment, as shown in
In step S6.1, the mobile communication device 3 transfers a configuration request comprising the configuration right identifier, to the first electronic lock 1, enabling the first electronic lock 1 to store in step S7, upon validation of the configuration right identifier, the access right identifier received in the configuration data from the mobile communication device 3 in step S2.
In case the mobile communication device 3 transfers in step S2 configuration data to the first electronic lock 1, the mobile communication device 3 additionally transmits in step S3.1 via a communication network 12 an update request to a computer system 5, as shown in
In an embodiment shown in
For the computer system 5 to forward the access rights identifier included in the update request, the computer system has stored in memory 10 update assignment rules which define assignments of the configuration right identifier to one or more electronic locks 2. As shown in
Another aspect of the disclosure becomes apparent, when configuring access such that some access right identifiers are not granted an access right anymore, for example if an access right shall be revoked, which was previously forwarded to another mobile communication device 6 through a delegation request.
In an embodiment the one or more processors 13 of the computer system 5 are further configured to perform the steps of transmitting from the computer system 5 to the mobile communication device 6 a configuration rights identifier deletion request via a communication network 12, instructing the mobile communication device 6 to delete the configuration rights identifier stored thereon and transmitting from the computer system 5 an access right identifier deletion request to another mobile communication device 6, via the communication network 12, instructing the other mobile communication device 6 to delete the access right identifier stored thereon.
In an embodiment the one or more processors 13 of the computer system 5 are further configured to perform the steps transmitting from the computer system 5 to one or more electronic locks 2 an access right identifier deletion request comprising an access right identifier, via the communication network 12, instructing the one or more electronic locks 2 to delete the access right identifier received in the access right identifier deletion request stored on the one or more electronic locks 2 and being thereby configured to not grant access for electronic key devices 4 having stored thereon only the access right identifier received in the access right identifier deletion request.
It should be noted that, in the description, the sequence of the steps has been presented in a specific order, one skilled in the art will understand, however, that the order of at least some of the steps could be altered, without deviating from the scope of the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
00482/20 | Apr 2020 | CH | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2021/060381 | 4/21/2021 | WO |