专利摘要:
An apparatus for controlling access to a location secured by a l in which the apparatus comprises a mobile unit and a l for controlling the l canism. The mobile unit comprises a storage device for storing an electronic key, wherein the electronic key indicates a predetermined access right to the site; a three communication device for three communication with the l device arranged to automatically search for the location, when the car unit is at a predetermined distance from the l where communication between the mobile unit and l is established; and for automatically establishing a connection to the L and automatically transmitting the electronic key to the L includes: a tr communication device adapted for tr communication with the mobile device and for receiving an electronic key from the mobile device; control means adapted to verify the received electronic key and to initiate operation of the l canism depending on the result of the verification of the electronic key.
公开号:DK201200065U1
申请号:DK201200065U
申请日:2012-04-16
公开日:2012-06-22
发明作者:Nielsen Morten;Andersen Ebbe;Nielsen Ole
申请人:Bekey As;
IPC主号:
专利说明:

DK 2012 00065 U3
Controlling access to a place
The scope of production
This provision relates to control of access to a location secured by a locking mechanism. More specifically, the provision relates to an apparatus for controlling access to a location secured by a locking mechanism, wherein the apparatus comprises a mobile unit and a locking control unit for controlling the locking mechanism.
Background JP2004088339 describes a system in which a program and electronic keys for a vehicle are retrieved from a server after authentication. The server picks up a registration ID from a mobile phone through a public online network, and if a personal authentication result is correct, the server allows the mobile phone to retrieve a program, sub-ID and timestamp. When the cell phone retrieves the sub-id, the sub-id acts as a key. When the connection between the mobile phone and the vehicle is established and a compilation result of the sub-ID of the mobile phone indicates comparison, the mobile phone performs various of the vehicle's operations.
US20030208386 discloses a hotel booking system where a person can book / book a hotel room using a mobile phone. The system picks up a key for the mobile phone and the key is transferred via Bluetooth technology to the door lock at the hotel when the person arrives. Booking / reservation is based on typical web applications, such as Java or Wireless Application Control (WAP), where access to the Internet is obtained via the mobile phone.
US20030151493 discloses access control system which uses a mobile device. Access data is retrieved from a central device to the mobile device via a cellular communication network.
US20030016828, US20020031228 and US20060170533 describe systems where the keys are retrieved to a mobile device via a mobile communication network and the mobile devices exchange keys for door devices via Bluetooth.
2 GB 2012 00065 U3 EP1720296 relates to adjusting transmit power in Bluetooth devices for security.
Improving the security of using electronic keys to access locations remains a problem.
Description of the production
Described herein is an apparatus for controlling access to a site as defined in utility model claim 1, as well as a mobile unit and a lock control unit for use in such an apparatus.
The creation also relates to an access control system that allows suppliers of goods or services to access a place that would otherwise prevent the supply of goods or services.
Especially in apartment buildings or businesses, it is common for a number of exterior or front or intermediate doors to be passed before reaching a service point, such as an apartment door, a mailbox, service station or meter for appliances, an area to be cleaned , etc. For example, in the case of newspaper delivery, the newspaper bid often has to access a staircase to be able to deliver the newspapers to the locked private doors or put them in mailboxes. It often causes great difficulty for the delivery people to find the right keys in a large bundle of keys, and the locks are often replaced without the delivery people being informed. For security reasons, it is also more and more common to lock doors or gates to backyards, residential areas or corporate properties where, for example, waste containers are located, so waste disposal companies have a problem similar to the companies that supply newspapers. It should be borne in mind that similar problems exist for postmen, cleaning companies, emergency doctors, home helpers and other carers, police officers, firefighters, artisans, caretakers / janitors, and others.
Some of the aforementioned service providers need access on a daily basis, such as mail delivery, some even need access during certain time periods, such as for certain weekdays or at certain times of the day, for example, newspaper bids need access between 6 and 9 in the morning.
In addition, different services / deliveries may require different access rights, for example, firefighters, security companies or police must have access to all facilities, while a postman must only have access to a mailbox.
Thus, the object of the invention is to provide an effective system for controlling access to a location secured by a locking mechanism controlled by a locking controller which can provide a high degree of flexibility and a high level of security. The mobile unit and the lock control unit both comprise a wireless communication device.
In addition, access to the site, such as a door, is achieved automatically by means of a wireless communication / interaction between the mobile unit worn by the delivery person and an on-site lock control unit. Because of this, the electronic keys are transmitted via wireless data communication from the mobile unit to the lock controller, a fast and convenient communication between the mobile unit and the lock controller is provided, without the need for physical contact. Thus, the delivery person should not perform any actions, either with the mobile device or with the lock control unit. The delivery person must not enter any passwords, codes, messages or the like on the mobile device or on the lock control unit.
According to the creation, a location may be a physical location, such as a building, area, or other residential, industrial, commercial or office facility, where access to the site is controlled by a locking mechanism, such as a physical lock on a door, window , a port or the like. Access to the site can be controlled at a single entrance or at several different access points.
In addition, a location may also be part of a building, area, etc., and according to the provision, access to various parts of the site can be controlled individually, such as, for example, at an external gate, a front door, within an elevator providing access to 4 DK 2012 00065 U3 all or selected floors, at doors to individual apartments, offices, sections, rooms, storage facilities, such as drawers, safes, etc. The place may be stationary, such as a building, or mobile such as a vehicle, container, a ship, or the like.
Furthermore, the site may also be an installation, such as an industrial unit control unit, an electricity meter, a computer system or the like, where access to the site is controlled by a locking mechanism, such as a lock on a control box, or an electronic lock such as a hardware lock on a computer. The term 'access to a place' may also include user access to a computer or computer program, where access is controlled by a software locking mechanism that restricts access to a program, stored data, communication facilities, or the like.
An access right, according to the creation, may be the right to interact with a place. Examples of access rights include the right to enter a building, an area, a plant, etc., the right to operate a machine, a device, a vehicle, a computer, etc., the right to open or close a door, a window , a container, a box, etc., and the right to receive or deliver goods, data, etc., as long as access rights can be controlled by a locking mechanism.
In one embodiment, the apparatus is arranged so that: all devices for wireless communication are searched; a list of the found wireless communication devices is built into the mobile device; a service search is performed on the list of found wireless communication devices; a wireless communication device is found if the mobile device recognizes the service number of that wireless device; checking whether the mobile device has a correct electronic key for the lock controller; The correct electronic key is exchanged if it is verified that the mobile unit has the correct electronic key and a signal is sent from the lock control unit to a locking mechanism on the door when the lock control unit has received the correct electronic key.
In one embodiment, the apparatus is arranged so that: the connection is disconnected between the mobile unit and the lock control unit; access is requested to continue to connect to wireless communications devices; multiple electronic keys are requested if access is granted and the connection is restored when another lock control device is detected.
In one embodiment, the apparatus comprises means for storage in a storage facility of information about attempts to access the site.
In one embodiment, the predetermined access right has a period of validity and the electronic key contains information about the period of validity.
An access right may have certain attributes that specify properties of the access right. Examples of such properties include one or more validity periods, a level of security, a number of times the access privilege is valid, or any other attribute that specifies a property access privilege.
In one embodiment, the wireless communication is personal area network communication.
An advantage is that communication is fast and does not need to involve a communication network provider.
In one embodiment, the wireless communication is short-range communication.
In one embodiment, the wireless communication is radio frequency communication.
6 DK 2012 00065 U3 In one embodiment, radio frequency communication is a Bluetooth communication. The advantage of this is that the communication is based on reliable standard components that are available as part of many devices, such as mobile phones, personal digital assistants, or the like.
In one embodiment, the distance is a predefined distance.
It is an advantage that the wireless communication can be achieved at a predefined distance, as it can thus be controlled how close the delivery must be before operating the lock control unit. The predefined distance can be determined by the transmit power of the wireless communication device of the mobile device and, for example, of the wireless communication device of the lock control unit.
In one embodiment, a locking control unit for use in the apparatus described herein is disclosed. The lock control unit consists of: - first wireless communication means adapted to communicate with wireless communication via a mobile device, and - control means adapted to initiate operation of a locking mechanism depending on the result of the verification of the electronic key.
In one embodiment, the wireless communication device is a personal area network communication device.
In one embodiment, the wireless communication device is a short-range communication device.
In one embodiment, the wireless communication device is a radio frequency communication device.
In one embodiment, the wireless communication device is a Bluetooth device, whereby the unique ID address of the device is the Bluetooth ID address.
7 DK 2012 00065 U3 In one embodiment, the message is a Short Message Service (SMS - Short Message Service).
In one embodiment, the program is a Java program. It is advantageous to use a Java application as the mobile device supports Java applications more. Alternatively, the application may be any application supported by the mobile device.
In one embodiment, electronic keys are transferred to a mobile device to access locations where an electronic key is indicative of a predetermined access right to a location: - a program is started on the mobile device, thereby calling the management device; - permission is requested from the management unit to run the application, the request is made by the mobile unit; - the request is registered in the administrative unit; - the mobile device is allowed to run the program if the mobile device is registered in the management device as allowed to run the program; - calls the management unit after registration of the mobile device authorization and asks if there are any electronic keys for the mobile device; - the request is registered and electronic keys are sent to the mobile unit from the management unit, if there are any electronic keys to the mobile unit; - the application is generated specifically for the ID address of the wireless device in the mobile device.
It is an advantage that the electronic keys are downloaded from a management device to a mobile device with a secure encryption of the transfer of the electronic keys. This is achieved because the ID of the wireless communication device in the mobile device, such as the Bluetooth ID of the mobile device, is registered in the management device. The release provides secure transfer of electronic keys to mobile devices using mobile phone communication technology such as Bluetooth.
It is advantageous that the access rights profile of individual mobile devices and lock control units can be changed at short notice or at regular or random intervals to increase the security of access control.
When the device is arranged to transmit at least one electronic key from an management system to one of the mobile devices via a communication network, electronic keys can be generated and maintained on a central computer system and sent to the mobile devices.
Another advantage of generating is that the use of electronic keys can be monitored and tracked by a central management system.
A further advantage of the provision is that information on mobile devices, electronic keys, access rights receivers, lock controllers, the use of electronic keys, etc. can be obtained and maintained at a central service to provide optimal transparency and security for the access rights owner.
In one embodiment, communication between the mobile phone and the management unit is performed via GPRS.
In one embodiment, a system consists of computer means, including: - third storage means adapted to store a plurality of electronic keys corresponding to the respective predefined access rights; - first means of communication adapted to send at least one electronic key to a selected mobile device; the selected mobile device consists of other means of communication adapted to receive the transmitted electronic key; the selected mobile device further consists of third means of communication adapted to receive the transmitted electronic key; The selected mobile unit further comprises third means of communication adapted to transmit a signal; a selected lock control unit consists of third communication means adapted to receive the transmitted signal from the mobile unit.
Therefore, it is an advantage of the generation that a plurality of different electronic keys for different buildings can be stored and related to one or more mobile devices, providing a flexible way to customize an access profile for each mobile device.
In one embodiment, the mobile unit further comprises fourth communication means for transmitting, to the computer means, an information signal indicating information about the corresponding transmitted request to grant the desired access right.
In one embodiment, the desired access right has a validity period and the first electronic key comprises information on the validity period.
In one embodiment, a mobile unit for use in a system according to the invention is described. The mobile unit consists of: - first storage means adapted to store electronic keys identifying a plurality of predefined access rights; and - first wireless communication means adapted to communicate an electronic key to wireless communication means in a lock control unit.
The functions of the apparatus described above can be implemented in software and performed on a data processing system or other processing means caused by the execution of computer executable instructions. The instructions may be program code means loaded into a memory, such as a RAM, from a storage medium or from another computer via a computer network. Alternatively, the described functions can be performed by hardwired circuits instead of software or in combination with software.
10 DK 2012 00065 U3
Brief description of the drawings
The above and / or supplementary objects, features and advantages of the present invention will be further illustrated by the following illustrative and non-limiting detailed description of embodiments of the present invention, with reference to the accompanying drawings, in which:
FIG. 1 shows how electronic keys are transferred to a mobile device. FIG. 2 shows how access can be obtained by a lock control unit.
DETAILED DESCRIPTION In the following description, reference is made to the accompanying figures which, by way of illustration, illustrate how the production can be practiced.
FIG. Figure 1 shows how electronic keys are transferred to a mobile device. The figure shows an embodiment of the production with delivery of newspapers as an example. However, production is not limited to the delivery of newspapers. A newspaper company 101 has a number of subscribers who must have their newspaper delivered to their respective places of residence. Subscriber information can be stored in a database of the newspaper company 101.
Subscriber information may include their home address, when to receive a newspaper, etc.
The system consists of 3 units, which are designed to function as a coherent system. The 3 units are: a management unit 102, a mobile unit 103 and a lock control unit (see Fig. 2). The lock control unit can also be referred to as a door unit.
A mobile device 103 can be used by a newspaper bidder to access a locked entrance in a building where subscribers reside. Before the mobile unit 103 can be used as an electronic key for lock control devices, it must be registered in the management unit 102 as follows. The telephone number of the mobile unit 103 is created in the management unit 102. The telephone number may be related to the SIM card which is inserted in the mobile unit 103 and which is mandatory in GMS units.
From the management device, a short message service (SMS) can be sent 104 to the mobile device 103, where the SMS may contain a link to a program that can be installed on the mobile device 103. When the link is activated, the program is installed. The program is launched and the unique 48-bit Bluetooth address, ie. the identification (id) of the Bluetooth device in the mobile device 103 is read.
From the mobile unit 103, an SMS 104 is sent to the management unit 102 with information on the Bluetooth address of the Bluetooth device in the mobile unit 103 and with information on the telephone number of the mobile unit 103. The management unit 102 can then link information about the Bluetooth address and the phone number of the mobile unit 103 to a unique device.
This process can be performed before a mobile device 103 is used for the first time as an electronic key to access lock control devices. Once the mobile unit 103 has been registered according to the above, the mobile unit 103 does not need to be registered again in the future until it is used as an electronic key.
The management unit 102 may obtain information from a newspaper company or access rights owners 101 about which doors a delivery person should have access to on a given day and for a given period of time.
The management unit 102 may select which mobile unit 103 should have access to which doors.
Each time mobile unit 103 should be used as an electronic key unit to access a plurality of doors, a series of steps must be performed to install the electronic keys in mobile unit 103 for the respective lock control units. The function of an electronic key is comparable to that of a password, and can be data elements. The steps are as follows: The mobile unit 103 starts the program and thus calls the management unit 102, whereby the mobile unit 103 requests the management unit 102 for permission to run the program. The program can be a Java program. The call from the mobile unit 103 to the management unit 12 can be made via GPRS 104. The management unit 102 registers the request from the mobile unit 103 to run the program, and the management unit 102 can answer this request by either authorizing the mobile unit 103 to run the program, or by denying the mobile device 103 permission to run the program, e.g., by responding positively or negatively, e.g., by answering "yes" or "no." If the management unit 102 permits the mobile unit 103 to run the program, the program can run on this mobile device 103. If the management unit 102 denies the mobile unit 103 permission to run the program, the program cannot run from this mobile device 103. This communication between the mobile unit 103 and the management unit 102 can take place via GPRS-104. The application is generated specifically for the Bluetooth ID of this mobile device 103, as this ensures that encryption of the subsequent transfer of keys is secure.
The program and communication software components can be sent using GPRS 104 as mentioned above. Alternatively, transmission and communication can be carried out using, for example, the Internet, docking stations, mobile telecommunications (OTA), radio-based communications, local radio-based networks such as Blu-etooth, or any other form of data communication.
If the mobile device 103 has been authorized to run the program, the mobile device 103 registers the license. The mobile unit 103 can then call the management unit 102 to request if there are any keys to it. The management unit 102 records the request for keys from the mobile unit 103, and if there are any keys for the mobile unit 103, these keys can be sent to the mobile unit 103 via GPRS 104. If there are no keys for the mobile unit 103, the program can close in this mobile unit 103.
The software may also include encryption functions.
Thus, the electronic keys sent to the mobile unit 103 from the management unit 102 may be received in the mobile unit as encrypted keys.
13 DK 2012 00065 U3
If the keys have been sent to the mobile device 103, the mobile device 103 records this information and installs the electronic keys in the memory of the mobile device 103. Alternatively, electronic keys can be stored in the memory of a SIM card in the mobile phone. The electronic keys can provide access to specific doors for a predetermined period to which the delivery person has to deliver newspapers. As a rule, the delivery man has a regular and regular route, which he always follows, and he therefore knows which doors to deliver newspapers to. Alternatively and / or additionally, the delivery person may receive information before he begins his route, on which doors the newspapers should be delivered to. This information may be present in the program that the delivery person can view on his mobile device and / or this information may be sent to the delivery person via an SMS, and / or the delivery person may receive this information as a printed list, as a voice mail and / or any other appropriate form for receiving such information.
If there is a problem with a particular door unit, the delivery person can receive information about this. As a rule, the delivery person can receive such information via SMS. Alternatively, this information may be provided to the delivery person via the software program on the mobile phone, as a voice mail and / or in other appropriate form.
The mobile unit 103 containing the electronic keys may support WAP. If there is a wireless communication network along the route that the delivery person follows when delivering newspapers, using WAP can be an advantage. Alternatively and / or additionally, online communication between the mobile unit 103 and the management unit 102 may use another communication channel such as SMS.
FIG. 2 shows how access to a lock control unit can be obtained.
A series of electronic keys are installed in the memory of the mobile unit 203 according to FIG. First
When the newspaper bid is on his route, mobile device 203 will automatically search for all devices, including lock controllers 205, with a Bluetooth device 205. A list of found devices including lock controllers 205 equipped with a Blu-etooth communication port 206 is built into the mobile device 203. Subsequently, 14 DK 2012 00065 U3, the mobile unit 203 performs a service search on the found Bluetooth devices 206 by searching for service number (s) in the service records of the Bluetooth server. If mobile unit 203 recognizes a service number among the found Bluetooth devices 206, mobile unit 203 establishes connection 207 to this locking driver 205 with the recognized service number. The connection 207 between the mobile unit 203 and the lock controller 205 is a Bluetooth connection between the Blu-etooth unit 208 in the mobile unit 203 and the Bluetooth unit 206 in the lock controller 205. It is checked whether the mobile unit 203 has a correct key for the lock controller 205. If the mobile unit 204 has a correct key to the lock control unit 205, a key exchange is performed by Bluetooth communication 207. As a result of the key exchange, the lock actuator 209 in the lock control unit 205 generates a control signal 210 which is sent to the lock mechanism 211 in the door and initiates operation. of the locking mechanism 211.
The connection 207 is then disconnected and the process is repeated at the next lock controller.
Key exchange is performed automatically and the delivery person must not enter anything on any keypad, either on mobile unit 203 or on lock controller 205, and the delivery person must not use any screen, either on mobile unit 203 or on lock controller 205 to obtain key exchange. Thus, the delivery man does not have to perform any actions for key exchange to take place as mobile unit 203 and lock controller 205 automatically communicate with each other by means of Bluetooth communication 207.
For example, every 5 minutes, mobile unit 203 may send 212 a log file to management unit 202 with information / data on which doors it has accessed. The log file may include information about the date and time at which mobile unit 203 gained access to the respective lock controllers.
The log file contains information on which doors the mobile unit 203 has opened by electronic keys and the time of each opening. Alternatively, a log file can be sent every 7 minutes, or every 10 minutes, or every 20 minutes and / or the like. It is possible to control how often the log file should be sent and the period when a log file must be sent can be determined from the delivery person, the route, subscribers, which newspapers / material delivered, weather conditions, etc. Alternatively, the log file can be sent when the delivery person has traveled a predefined distance or when the delivery person has covered a predefined part of the route or when the delivery person has delivered a predefined number of newspapers and / or the like.
Further, at each log that mobile unit 203 provides to the management unit 202, the mobile unit 203 may request the management unit 203 to run the program and ask if keys are still present.
The program runs on mobile device 203 all the time when the delivery man is on his route. Mobile phones today, unlike before, can have enough power to run a program for many hours. Thus, a mobile phone may have enough power to run the program for the entire period of time the delivery man spends delivering all the newspapers on his route.
As a further advantage of the system according to this embodiment of the production, the newspaper company can see if the delivery man has opened the door to the stairs, for example in case of a complaint of failure to deliver the newspaper.
The log file contains information about which doors the mobile device has opened using electronic keys, and the timing of each opening may also be of interest in the case where, for example, an insurance company, such as in the case of a burglary report, needs proof of, for example, a door has been opened due to the use of electronic keys, whereby a burglar may have gained access to the door.
Many mobile phones have a standard Java interface that can be used for the Java application. Thus, it may be unnecessary to make any changes or to improve or upgrade a mobile phone to use it in accordance with the provision. Therefore, a regular mobile phone without additional features may be suitable for use in accordance with the invention.
A standard Java interface on a mobile phone can provide access to use the Blu-etooth device in the mobile phone. Thus, it is advantageous to use Bluetooth ID in the 16 DK 2012 00065 U3 mobile phone as identification when running a Java program on the mobile phone, instead of using only, for example the mobile phone ID.
To allow access to the mobile phone ID, a special program may be required for each brand of mobile phones. Therefore, it is advantageous to use Bluetooth ID in the mobile phone as identification, since the same standard Java interface on a majority of mobile phones can then be used to run the program according to the creation.
The lock control unit may be a separate control module / unit which can be added to an existing door locking system, but connected externally to, for example, an input telephone. The control module / device contains Bluetooth receiver 206, and the only additional input and output may be an electrical power input and an output for controlling the opening of the lock. Thus, the lock control unit can be added to an existing electrical system, which is otherwise used to unlock the door from a telephone in an apartment connected to the input telephone. Thus, the lock control unit can operate in parallel with an input telephone.
Since input phones are already installed on many apartment access doors, it can be easy, fast and inexpensive to provide a control module for these existing locking systems, where the control module may consist of a Bluetooth receiver, an electric power input and a control output. of opening the lock.
Bluetooth is an industrial specification for wireless personal area networks. Blu-etooth is a way to connect and exchange information between devices that include a Bluetooth chip or a Bluetooth device over a short-range radio frequency. Bluetooth devices can communicate over distances such as 5-100 meters. The distance can be adjusted using the Bluetooth device's transmit power, which sends information to another Bluetooth device receiving this information. The length of time the door is unlocked after the two Bluetooth devices 206, 208 have communicated with each other can be calibrated to find a suitable length for the door to be unlocked.
17 DK 2012 00065 U3
Each Bluetooth device has a unique identity, the Bluetooth ID. In relation to this provision, it is the Bluetooth IDs of Bluetooth unit 208 in mobile unit 203 and in Bluetooth unit 206 of lock controller 205 which are compared for verification of an access request. In relation to this provision, the mobile unit 203 constitutes Bluetooth communication means 208 searching for other Bluetooth devices in the environment.
In terms of security, it is advantageous to use a mobile device as an electronic key carrier as no physical keys are needed with this system: This means that the disadvantage of using physical keys where keys are easily lost and is difficult to find in a large bundle of keys, is overcome with this system. Furthermore, it is very easy to prohibit access to a lock controller when the key to this lock controller is an electronic key because the access request to access with an electronic key is easy to reject.
In addition to this security issue, it is not possible to copy an electronic key into this generation system. Because the Bluetooth ID and mobile number of the mobile device are paired by the management device to form a unique device, it is not possible to copy the electronic keys.
Typical or conventional electronic keys may also be copied to another mobile device from the first mobile device if only the SIM card in the mobile device is used by the management device for transferring and storing electronic keys. The SIM card can be removed from the first mobile device and inserted into the second mobile device, whereby the electronic keys can also be transferred from the first to the second mobile device. If the other mobile device does not belong to a person that the management device has accepted and authorized as a user, that person in possession of the other mobile device may gain access to doors, possibly with malicious intent.
Therefore, by linking the Bluetooth ID and mobile number of the mobile device to a unique device, and using this unique device when handling the electronic keys, it is not possible to copy the electronic keys and abuse of electronic keys may be impossible.
18 DK 2012 00065 U3
A single company can control the entire system, or the system can also form the basis for several different companies.
If newspapers are again used as an example, the roles of the various companies can be described and the corresponding data flow is described as follows. The first company involved can be a company that prints and delivers the newspapers and therefore the company needs access to the subscriber's place of residence. As a recipient of access rights, the first company receives passwords from the password manager, another company, organization or person who manages the electronic key system and acts as a service provider for the delivery of a variety of goods and services. The administrator can also handle information about the various lock controls that control the locks of the subscriber's residence. The administrator can also provide the recipient of access rights with the mobile devices and with information about the subscriber's place of residence. This can be done under the control of the administrator. Alternatively or additionally, a third party may be involved who owns the mobile devices or who may be a network operator that sends electronic key information to mobile devices. A fourth company may own the building or have a business agreement with the owner of the building to manage access to the building, and thus the fourth company may be the owner of access rights, which agrees with the installation of the lock control unit with the administrator, which defines the respective access rights for the various holders of access rights. An electronic control unit may be owned and installed by the administrator, the access rights owner, the access rights recipient, or an entire fifth company. The administrator can also provide value-added services such as performance statistics to the access rights recipient or the access rights owner, based on access data obtained from the lock controller. In addition, these services may be self-service functions, physical services, time and material services, or ordinary information services.
The generation thus means that the use of modern technology can form the basis for new service companies that can make the delivery of goods and services more efficient and which can guarantee the necessary security systems that consumers will require from an electronic key according to the generation.
19 DK 2012 00065 U3
It will be appreciated that, according to the production, the electronic keys can be supplemented with many other information which may be related to the use of the electronic keys. For example, a delivery service provider can quickly get updated information about subscriber changes. A janitor can help find your way through the locked doors of a large apartment block. The cleaning staff can get updated information on changes regarding current activities.
It is best if the relationship between the administrator and the access rights owner is described in a contract that primarily describes the conditions under which the access rights grant the administrator certain rights, such as the right to grant other people, such as within the administrator's organization or third-party employees , with whom the administrator can have a contract, the right to access a place, or to perform a function related to the place.
According to the invention, an access control system comprises a mobile unit 203 and a lock activating unit 209 which controls a locking mechanism 211, such as a lock on a door. The mobile unit 203 consists of a communication port, preferably a Bluetooth port 208 in accordance with a known Bluetooth standard. The mobile unit 201 may be a mobile phone, a PDA (Personal Digital Assistant), a handheld computer, another terminal capable of transmitting a Bluetooth or other radio-based signal 207 or any other type of signal which can be received by a lock activating device 209 that controls access to the site, for example, by controlling a lock on a door. A mobile device can also be mounted on or in a vehicle.
In general, for all types of mobile devices or electronic key devices, they should be able to be updated with information and other information that can identify a lock activating device 209. The mobile device 203 is capable of emitting a signal 207 , including an electronic key capable of wirelessly activating the lock actuator 209. It is preferred that Bluetooth transmission or other radio transmission be used.
The lock control unit 205 consists of a receiver 206 for receiving the signal 207 with the electronic key sent by the communication port 208 in the mobile unit 203. The receiver 206 must be compatible with the communication port 208, and it is best if the receiver 206 is a Bluetooth port. Receiver 206 is further connected to a lock actuator 209 adapted to control a lock mechanism 211. A processing unit may connect the receiver and lock actuator. If the received electronic key is valid, the receiving unit 206 may send a control signal to the lock actuator 209 which causes the lock actuator 209 to initiate operation of the lock mechanism 211 and thus provide access to the site.
The lock actuator 209 is connected to a locking mechanism 211, such as a door lock system, valve control system, or the like. The connection 210 may be an electrical or mechanical connection or a wireless communication link. Alternatively, instead of a separate locking mechanism 211, the locking actuator 209 itself may contain corresponding electrical, electronic and / or mechanical components such as an electric motor which can open a valve or an electrical device which can open a door.
The locking mechanism 211 consists of a device which, for example, via an electrical / electronic relay, can activate a lock (not shown) which, for example, is mounted on a door.
The locking mechanism 211 can be connected to an existing door phone system in a building, or it can be adapted to operate independently, via its own mechanical parts and its own power supply. It is best if the locking mechanism 211 is capable of receiving and also transmitting a signal to the locking actuator 209. This can provide a verification process where the security of the access control system of the production is further enhanced.
The mobile unit 203 is provided with a communication port 208 for transmitting signals 207 to the lock control unit 205. The communication may use Bluetooth or other radio communication, or any other suitable communication technology. This communication can follow a proprietary protocol or, preferably, a standard protocol such as Bluetooth, TCP / IP, IrDA, a telephone data protocol, a mobile telephone data protocol, http, audio, etc. The information can be transmitted either using a proprietary data format , or preferably, in a standard format, such as wml, html, binary code, machine code, AT commands, voice commands, or the like.
21 DK 2012 00065 U3
In addition, the mobile unit 203 is equipped with a communication interface 213, for example transmit / receive antenna (antenna) on a mobile phone. Via the communication interface 213, the mobile unit 203 can be connected to a management system 202. The communication can be a radio-based communication, preferably via a standard communication network 212, for example, a standard mobile telephone network. Via the communication connection 212 between the mobile unit 203 and the management system 202, electronic keys can be transferred from the management system 202 to the mobile unit 203. Furthermore, log data can be sent from the mobile unit 203 to the management system 202 via the communication connection 212 during the delivery of, for example, newspapers. This data transmission 212 can use the so-called Short Message Service (SMS) or other higher speed data channels, such as GSM data, WAP or various data channels in CDMA transmission systems. Alternatively or additionally, other suitable communication channels, using a proprietary or standard protocol such as TCP / IP, http, spoken messages, etc., may be used.
It is best if the management system 212 is a computer system, preferably with one or more standard computers, such as personal computers, workstations, application servers, database and web servers, connected via a local network and with access to the communication network 212, for example via a service provider. The management system 202 generates and manages the electronic keys. The management system 202 sends electronic keys to the mobile unit 203. In addition, the electronic keys can be sent periodically to replace the electronic keys on the mobile devices and thus improve the security of the system. The management system 202 can also automatically, or upon request, invalidate electronic keys by sending a corresponding control signal to the mobile unit 203.
The lock controller 205 consists of a Bluetooth device 206. Using the Bluetooth device 206, the lock controller 205 is adapted to receive Bluetooth communication signals 207 from the mobile device 203.
The process of managing access rights according to the creation can be described as follows. Initially, the access rights owner must define the access rights to be granted, including a possible list of possible access rights recipients. Then, the access rights owner gives the administrator permission to generate and assign electronic keys. This permit may include different levels of authorization as described in a contract. Using an administration system, the administrator transforms the access rights definition into a set of electronic keys that identify the individual or group of rights. The definition and generation of the mobile devices can be done by the administrator at the request of the access rights owner or in collaboration between the two and possibly a third party. The electronic keys are stored, preferably in one of the management system's databases. Preferably, data on the use of mobile devices 203 are logged on management system 202. Alternatively or additionally, log data can be stored in lock controller 205 and / or mobile devices 203. Log data can be transmitted to management system 202 at predetermined time intervals, upon request, or online in connection. with an interaction between a mobile unit, 203 and a lock control unit 205.
The administrator may provide additional services to be received by the access rights owner. Alternatively or additionally, the Administrator may provide services to the recipient of the access rights or a third party. These additional services may include the provision and / or analysis of information for the corresponding access rights, where the information may include information on: - The location of the lock controllers.
- Access rights and electronic keys that indicate the corresponding recipient of access rights, including location specification, lock controller, allowed access times, types of allowed access, etc.
- Specification of mobile devices that have or have been granted a given access right.
- Status information on lock controllers, where status may include "locked", "open", "maintenance required", "manual operation", etc.
- Status information about the place.
- Information about which mobile devices have been used in connection with which lock controller or location, when, how, where, how many times, why, etc.
23 DK 2012 00065 U3
The above services can also be used where there is a need to monitor the use of the granted access rights. It may be in situations where there is an agreement to deliver goods at a particular time and place, and where the administrator can provide information on when, where and how access to the relevant delivery staff has been granted.
It is understood that these options may be included in the mobile unit and / or the lock-up unit.
The mobile unit 203 may be a standard GSM telephone, as illustrated in FIG. 1 and 2. The mobile device may consist of a removable SIM (Subscriber Identity Module) card (not shown), a send / receive antenna 213, a send / receive circuit (not shown). The mobile unit further comprises a Bluetooth communication port 208, preferably according to the Bluetooth standard. Bluetooth port is connected to the circuit.
The electronic keys can be stored in the memory of the mobile device. Alternatively and / or additionally, they can be stored in the memory of the SIM card.
The SIM card consists of a processor or control circuit and a memory. The memory can be divided into a ROM with the SIM operating system and other program code stored on it, and a RAM and / or EPROM for storing data elements and for use of the controller.
When data elements consisting of electronic keys are received by the antenna 213 from the management system 202 or a service provider, they are routed via the circuit to the memory of the mobile telephone, where the control unit stores data in the memory. According to the invention, the controller is adapted so that it automatically initiates the transmission of the electronic keys via the circuit and Bluetooth port 208 to a corresponding Bluetooth port 206 in the lock controller 205. This can be achieved, for example, by adapting the operating system stored in memory to enable enabling the software to control communication port 208. The software controls the storage, retrieval, selection, and transfer of electronic keys stored in memory.
An advantage of Bluetooth communication 207 is that it allows for a quick transfer of the electronic key to the lock controller 205 and therefore a short response time when the mobile unit 203 is close enough to the lock controller 205 for the Blu-etooth devices. 206, 208 for communicating with the lock control unit 205 operating the locking mechanism 211. In addition, the Bluetooth transmission 207 has the advantage of not incurring the cost of using a communication network.
The software of the mobile unit 203 consists of a corresponding electronic key download module adapted to receive the electronic key data sent by the management system 202.
The transmit power of the Bluetooth device 208 in the mobile device 203 can be adjusted to match the environment and the environment. If the transmit power of the Bluetooth device 208 is strong, the Bluetooth device 208 in the mobile device 203 and the Bluetooth device 206 in the lock controller 205 can communicate with each other when the distance between them is large.
However, if the transmit power of the Bluetooth device (s) is weak, the Bluetooth device 208 in the mobile device 203 and the Bluetooth device 206 in the lock controller 205 can communicate with each other only when the distance between them is small. Therefore, by changing the transmit power of Bluetooth device 208 in mobile device 203, the distance at which Bluetooth devices 206, 208 can communicate can be adjusted. There can be advantages and disadvantages to both a strong and a weak transmit power. In terms of ensuring that a door is opened only when the delivery man who has accessed that door is close to the door, it may be advantageous if the transmit power is weak. This ensures that other people who are not authorized to access cannot open the door when, for example, the delivery man is out of sight. In case of a weak transmit power, the delivery man must be close to the door before it can be opened, such as a few meters or about 5 meters. The range may depend on the strength of the Bluetooth device (s) and / or the environment, such as the thickness and material of walls and doors. The maximum distance that Bluetooth devices in a mobile device and in a door unit can typically communicate is in the order of 50 meters.
In addition, the door unit may have a delayed response from it receiving the Bluetooth signal until it activates the lock. This delay can be a few seconds, or 8 seconds or 10 seconds and / or something similar. As a result, the distance that the delivery person must be from the door unit before the door is unlocked can therefore be adjusted according to the transmit power in one or more of the Bluetooth devices, the surroundings, the delayed response of the door unit, etc.
The software in the management system 202 further comprises a log module which can be adapted to interface with log modules in the mobile unit and the lock control unit, respectively. This software interface preferably uses the same communication interface as the transfer of electronic keys. An advantage of this embodiment is that log data can be transmitted online from the mobile unit 203 and / or the lock controller 205 to the management system 202.
Software in the management system consists of an electronic key generation module that is responsible for generating electronic keys according to the assigned access rights. The management unit can generate new electronic keys each time a request for keys is received by the administration from a mobile device.
The electronic key generation module sends the generated electronic keys to an administration module which is responsible for administering the electronic keys, ie. store them in a database along with relevant data on the related mobile devices, lock controllers, locations, access rights owners, access rights recipients, etc. It is best if the management module provides appropriate user interfaces for entering and viewing relevant data.
Furthermore, the management module can handle additional administrative tasks, such as automatic electronic key expiration, electronic key transfer to mobile devices and / or lock control devices. The management module interfaces with an electronic key transmission module which, upon request, handles the transmission of electronic keys to the mobile devices, for example, by implementing one or more layers of a layered communication protocol used for the communication.
The software of the management system may further comprise one or more additional service modules which may provide additional services such as statistics on the use of the electronic keys.
26 DK 2012 00065 U3
It is best if the management system includes features that ensure full visibility for the access rights holder of the stored information. To achieve the highest level of security, all electronic communications must be encrypted, either by a special protocol or by a standard encryption method, such as RAS, Digital Signatures, Public Key Certificate, etc.
It should be borne in mind that for the management of the electronic keys, a company can make a special software for customized management of the key information for several different suppliers. The customized solutions may also have a built-in degree of data security which is necessary for the supplier of the goods and services concerned.
The management system may further comprise one or more interfaces to other systems to combine and integrate the management system with other services.
Although some embodiments have been described and shown in detail, the production is not limited to them, but may also be carried out in other ways within the scope of the subject matter defined in the following claims. In particular, it should be understood that other embodiments can be used and structural and functional changes can be made without departing from the scope of the present invention.
In unit claims which comprise several means, several of these means can be performed by one and the same element in the hardware. The fact that certain measures are recited in different dependent claims or described in different embodiments does not indicate that a combination of these measures cannot be advantageously used.
It should be emphasized that the term "comprising / consisting of" when used in this specification indicates the presence of declared functions, integers, steps or components, but does not exclude the presence or addition of one or more other functions, integers, steps, components or groups thereof.
权利要求:
Claims (8)
[1]
1. An apparatus for controlling access to a location secured by a locking mechanism; wherein the apparatus comprises a mobile unit and a lock control unit for controlling the locking mechanism; wherein the mobile device comprises - a storage device for storing an electronic key, wherein the electronic key indicates a predetermined right of access to the site; - a wireless communication device for wireless communication with the lock control unit adapted to automatically search for the on-site lock controller when the mobile unit is at a predetermined distance from the lock controller, where wireless communication between the mobile unit and the lock controller is established; and for automatically establishing a connection to the lock controller and automatically transferring the electronic key to the lock controller; wherein the lock control unit comprises: - a wireless communication device adapted for wireless communication with the mobile unit and for receiving an electronic key from the mobile unit; control means adapted to verify the received electronic key and to initiate operation of the locking mechanism depending on the result of the verification of the electronic key, wherein one or more of the wireless communication devices has an adjustable transmit power adapted to determine the predefined distance at which wireless communication between the mobile unit and the lock control unit are established.
[2]
An apparatus according to claim 1, wherein the mobile unit is further adapted to search for all wireless communication devices; for building a list of found wireless communication devices; to perform a service search on the list of found wireless communication devices; and wherein the communication device is arranged to connect to a registered wireless communication device if the mobile device recognizes the service number of that wireless communication device; wherein the mobile unit is adapted to check whether the mobile unit has a correct electronic key for the lock control unit; for exchanging the correct electronic key if it is verified that the mobile unit has the correct electronic key and wherein the lock control unit is arranged to initiate transmission of a signal from the lock control unit to a locking mechanism on the door when the lock control unit has received the correct electronic key.
[3]
An apparatus according to claim 1 or 2, wherein the communication devices are radio frequency communication devices.
[4]
An apparatus according to claim 3, wherein the communication devices are communication devices for Bluetooth communication.
[5]
An apparatus according to any one of claims 1-4, further comprising an administrative unit comprising storage means adapted for storing a plurality of electronic keys corresponding to the respective predetermined access rights; means of communication arranged to send at least one electronic key to a selected mobile device out of a number of mobile devices.
[6]
An apparatus according to any one of claims 1-5, wherein the mobile unit storage unit is arranged for storing a plurality of electronic keys for a plurality of respective locations.
[7]
A mobile device for use in an apparatus according to any one of claims 1-6; wherein the mobile device comprises: - a storage medium for storing an electronic key, wherein the electronic key indicates a predetermined right of access to the site; - a wireless communication device for wireless communication with the lock controller arranged to automatically search for the on-site lock controller when the mobile unit is at a predetermined distance from the lock controller, where wireless communication between the mobile unit and the listing controller is established; and for automatically establishing a connection to the listing controller and automatically transferring the electronic key to the listing controller.
[8]
A listing control unit for use in an apparatus according to any one of claims 1-6; wherein the control unit comprises: - a wireless communication device adapted for wireless communication with the mobile device and for receiving an electronic key from the mobile device; control means adapted to verify the received electronic key and to initiate operation of the locking mechanism depending on the result of the verification of the electronic key, wherein the wireless communication unit has an adjustable transmit power adapted to determine the predefined distance, where wireless communication between the mobile unit and the lock control unit is established. DK 2012 00065 U3 1/2 102 /

Fig- 1 2/2 DK 2012 00065 U3

Ftg. 2
类似技术:
公开号 | 公开日 | 专利标题
EP2085934B1|2013-07-17|Method and system of registering a mobile unit used as an electronic access key
EP2701124B1|2021-08-11|Controlling access to a location
US7012503B2|2006-03-14|Electronic key device a system and a method of managing electronic key information
US10181231B2|2019-01-15|Controlling access to a location
CN101222353B|2013-01-02|Remote control of a security system using e-mail
US9367978B2|2016-06-14|Control device access method and apparatus
US20150221147A1|2015-08-06|Remote Guest Access to a Secured Premises
WO2016025927A1|2016-02-18|Electronic access control and location tracking system
US20040247086A1|2004-12-09|Emergency response information distribution
CN101535976B|2012-09-05|A method and apparatus for using sms short code messaging to facilitate the transmission of a status update for a security system
WO2006136662A1|2006-12-28|Communication method of access control system
US8122481B2|2012-02-21|System and method for permission management
US20090210928A1|2009-08-20|Method and a system for managing a user related account information associated with application services distributed over a data network
KR100422377B1|2004-03-11|System and method for maintenance of public security and exit and entrance control using bar code displayed liquid crystal display
WO1999050734A1|1999-10-07|A method of and apparatus for computer security using a transmitting location device
DK201200065U3|2012-07-13|Controlling access to a place
EP1261941B1|2008-01-23|Management of permit codes
KR20140148020A|2014-12-31|Using a mobile device Unmanned Security System and method for providing
KR20020032461A|2002-05-03|The opening and closing device of car dor remote control, monitoring and way of that service
EP1926263A2|2008-05-28|Access control system for controlling the access of a user of mobile equipment to an enclosure.
US20210258721A1|2021-08-19|System and method for remote intercommunication at points of entry into buildings or limited areas and for remote management and control of the entrances
KR20050020388A|2005-03-04|Method for preventing surreptitious use of security information of going in and out and System using the same
KR20060016500A|2006-02-22|A electronic lotto service method and equipment by mobile message
同族专利:
公开号 | 公开日
DK201200065U3|2012-07-13|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

法律状态:
2018-02-09| UUP| Utility model expired|Expiry date: 20180131 |
优先权:
申请号 | 申请日 | 专利标题
EP20080388005|EP2085934B1|2008-01-31|2008-01-31|Method and system of registering a mobile unit used as an electronic access key|
DKBA201200065U|DK201200065U3|2008-01-31|2012-04-16|Controlling access to a place|DKBA201200065U| DK201200065U3|2008-01-31|2012-04-16|Controlling access to a place|
[返回顶部]