![]() SECURED BOX WITH PREDETERMINED CONTENT AND DYNAMIC MANAGEMENT
专利摘要:
The present invention relates to a box (1) with secure closure comprising a container (3) closed by a door (5) movable between a closed position and an open position, said door comprising a locking device (7) adapted to lock the door in the closed position. The box further comprises a controller (9) of said locking device connected to a content identification device (11), said controller being adapted to trigger an alert when a predetermined content is not in the container. 公开号:FR3048257A1 申请号:FR1651602 申请日:2016-02-26 公开日:2017-09-01 发明作者:Stanislas Soufflet 申请人:Mopeasy; IPC主号:
专利说明:
Secure box with predetermined content and dynamic management DESCRIPTION Technical area The present invention relates to the field of safes and secure boxes having a predetermined content that can vary over time. More specifically, the invention relates to a secure closure box comprising a container closed by a movable door between a closed position and an open position, said door having a locking device adapted to lock the door in the closed position. State of the art It is known to those skilled in the art secure boxes for sharing an object such as a key between several people. The simplest mode is a locked box whose key is copied in as many copies as users and which contains another access key to a place (apartment, house, part of house, garage, outbuilding, etc.) or a vehicle. The opening key of the housing can be replaced by various access systems such as, for example, a digital code, a biometric fingerprint, etc. While for the general public these devices are relatively simple and cheap, professional devices are more complex, even those intended for the general public by professional operators. Thus, besides sharing keys in a key cabinet allowing simultaneous use by several people seeking the unique object that is intended for them among several objects, there are solutions of key boxes intended, for example, to provide access to premises distributed by maintenance technicians who are part of relatively complex system architectures implementing means of communication with an authorization server which issues the access authorization at a given moment, for a given user and a user. given place. In the more specific context of vehicle sharing, the most conventional solution, but reserved for closed fleets of vehicles, is the key box containing a multitude of keys corresponding to vehicles parked in a garage. Another solution for vehicle sharing, used in particular in the shares for the general public, is to structurally modify the vehicle to support this type of function. The opening of the car is done by a badge reader and not by a "classic" key provided by the manufacturer of the automobile. The vehicle key is then in a key box inside the vehicle, in the glove box. This transformation of the vehicle brings this solution closer to the closed systems of fleet management. One solution to avoid the transformation of the vehicle is to install a key box near the parking place of the vehicle and therefore potentially on public roads or, at least on a place accessible to the public. This involves equipping it with anti-tampering and anti-vandalism. On the other hand, there is the problem of authenticating the person who presents himself as being the intended temporary user of the vehicle. A second problem to be solved is to correctly associate the vehicle (s) with the content (s) of the key box since, very often, different vehicles will park successively on the same parking space and share therefore the key box (assuming there is a 1 to 1 association between a key box and a parking space). Description of the invention With this objective in view, the device according to the invention, furthermore in accordance with the preamble cited above, is essentially characterized in that said box further comprises a controller of said locking device connected to a content identification device, said controller being adapted to trigger an alert when predetermined content is not in the container. Thus, advantageously, the box may trigger an alert if the key, and / or documents set do not match those of the expected vehicle. Specific features or embodiments, usable alone or in combination, are • the controller is further connected to a first transmitter / receiver adapted to communicate with a first server and the controller is adapted to receive from said server an identification of said predetermined content ; The identification of said predetermined content is an identification code, said identification code being reproduced in the predetermined content; The content identification device is an RFID reader adapted to read an RFID tag associated with the predetermined content and containing the identification code; The alert is transmitted to a user of the box by luminous and / or audible means and to an alert reception server; It furthermore comprises means for authenticating a user connected to the controller, said controller being further adapted to transmit an unlocking command to the locking device only after authentication of the user; The controller is further connected to a second transmitter / receiver adapted to communicate with a second server and the controller is adapted to receive from said server the authentication parameters of said user or to connect the authentication device with said second server and receive from the latter a successful authentication information; • the authentication parameters are single-use and limited in time; The authentication means comprise a keypad and the authentication means are adapted to authenticate the user by entering a predetermined code in the absence of connection with the second server; The door is movable in vertical sliding between the closed position and the open position so that the gravity holds the door in the closed position in the absence of another force, and in that the locking device comprises a notch in said door and a pin secured to the container, said pin being held in the notch by a spring when the door is closed; • the locking device further comprises means for translational movement of the pin adapted to remove it from the notch and thus unlock the door at the order of the controller; and / or • it includes a single maintenance opening lock and no visible fastener. BRIEF DESCRIPTION OF THE DRAWINGS The invention will be better understood on reading the description which follows, given purely by way of example, and with reference to the appended figures in which: FIG. 1 represents a first embodiment of a box according to the invention with its communication environment; FIG. 2 represents a flowchart of a key recording method; FIG. 3 represents a flowchart of a rental taking process; FIG. 4 represents a flowchart of an end of lease and key delivery method; - Figure 5 shows a particular embodiment of the box; and FIGS. 6 and 7 show two detailed views of the locking of the door of the embodiment of FIG. 5. Modes of realization In order to concretize the embodiments described in a context, it is the sharing of vehicles in a general public environment. For example, vehicle-owning users make the vehicle available in a specific place and for a fixed period of time via a website and temporary third-party users, that is to say, other than the owner or his close acquaintances, requests for rental and use of the vehicle, always via the website. The website has several functions: • Manage the available vehicle fleet; • Assign a temporary user to a vehicle based on a variety of parameters, the most important place and time; • Manage the rental of the vehicle by giving access to the vehicle, verifying that the vehicle is returned in the prescribed manner; and • Ensure various associated payments. In this context, a box associated with a parking space and intended to receive the key and the administrative documents of the vehicle located on the parking space will be described. Referring to Figure 1, a box 1 comprises a container 3 closed by a door 5 movable between a closed position and an open position. The door 5 comprises a locking device 7 adapted to lock the door in the closed position. The locking device is for example a lock or any other device known to those skilled in the art to securely close a door. The box 1 further comprises a controller 9 of the locking device. The controller 9 is connected to a content identification device 11. Typically, the controller 9 is an electronic computing unit which controls electric means for operating the locking device 9. The content identification device 11 is for example a reader of radio-labels or RFID tag (of the English "Radio Frequency Identification" for radio-identification), or of barcode, or signal NFC (of the English "Near Field Communication" for Near Field Communication). The key of the vehicle as well as the administrative documents thereof are also associated with one or more tags containing an identification code, or identifier, so that the identification device is able to read the identifier, or the identifiers, key and documents. The controller 9 is connected to an alerting device 13 such as a flashing lamp or a sound signal generator. Thus, if the controller 9 determines that the identifier read does not correspond to an expected identifier, it can trigger an alert on the alert device 13. This alert will signal to the temporary user that, for example, he forgot to put the documents in the box or that he was wrong key. Preferably, the box 1 comprises a transmitter / receiver 15 connected to the controller 9 so as to enable the latter to establish a data communication with an identification server 21. This identification server 21 is for example connected to the web server sharing management. Depending on the expected vehicle in the parking space, it is able to indicate to the controller 9 the identification codes corresponding to the expected vehicle and thus to the identification codes of the keys and documents to be in the box. Conversely, the controller 9 is able to indicate to the identification server 21 either that the keys and documents expected are in the box, or that there is a problem / an alert because no key or document is present, or only part of the expected set is present, or keys and documents not corresponding to the expected vehicle are present. The box 1 further comprises authentication means 17 of a temporary user connected to the controller 9. These authentication means are, for example, a digicode for entering a secret code associated with the temporary user, or an NFC transmitter / receiver for a data link with a smartphone of the temporary user, the latter including an application. dedicated to transmit an identification / authentication to box 1. Thus, the controller 9 transmits an unlock command to the locking device 7 after authentication of the temporary user. Preferably, the controller 9 is connected to a second transmitter / receiver 19 to communicate with a second server 23. The controller 23 can thus receive from the server 23 the authentication parameters of the temporary user to locally practice the predefined authentication procedure. Alternatively, the authentication device 17 is directly related to the second server 23 which performs the authentication procedure and sends the controller 9 successful authentication information, or not. Preferably, the temporary user has unique, non-reusable and time-limited access rights and these rights are managed by the second server 9 as part of the authentication procedure. In other words, not only is the authentication process used to ensure that the temporary user is who he claims to be, but also that he is the person who must use the vehicle at that time. It should be noted that in a variant in which the box 1 has no connection, or has only a limited connection, to the second server 23, there are cryptographic procedures for generating and controlling the identifier for use unique and limited life without the box needs to call a central server but by recalculating the expected identifier. The operating mode of the key box is then as follows. As a preliminary remark, and not to unnecessarily burden the text, only the management of a key will be described. Those skilled in the art will easily generalize the management of a key associated with other objects or documents. To begin, the key registration procedure is described in connection with Figure 2. In a preliminary step, for example using the sharing website, the owner of the vehicle to be rented registered his vehicle and received in return an RFID tag to stick on the vehicle key. Box 1 is in the locked closed state without a key identifier. In step 31, the owner user identifies himself as the person who will deposit a key. In step 33, the box accepts the identification and opens the door. In step 35, the owner user puts the key in the box. In step 37, the identification device 11 reads the identifier of the key that is reassembled to the server 21. In step 39, the door of the box is closed and locked. From this moment, the system considers that the vehicle whose key is in the box is parked on the place associated with the box and is ready to be shared. Referring to Figure 3, the procedure for renting a vehicle includes the following steps. The box 1 is in the closed state locked with a content, a key, identified. In step 41, the temporary user authenticates himself, for example by entering a unique code that has been provided by the sharing web server. In step 43, the box having validated that it is the expected temporary user unlocks the door. If it is not the expected temporary user, the box remains locked and an alert is triggered locally as on the second server (step not shown). In step 45, the temporary user takes the key. The box notes the key taking because the identification device 11 no longer receives an identification signal. The box goes into "empty" status and sends the information to the first server. The system then considers that the temporary user has taken charge of the vehicle and the rental begins. In step 47, after a temporary user action or a timer, the door closes and locks. The procedure for ending the lease and delivery of the key includes the following steps, Figure 4. The box is in the closed state locked and empty. In step 51, the temporary user authenticates himself, for example by entering a unique code that has been provided by the sharing web server. In step 53, the box having validated that it is the expected temporary user unlocks the door. If it is not the expected temporary user, the box remains locked and an alert is triggered locally as on the second server (step not shown). In step 55, the temporary user places the key in the box. In step 57, the box verifies that the key is the expected key. If it's the right key, step 59, the box closes and locks. The system considers that the vehicle has been returned and the lease ends. A notification is sent to the temporary user and the owner user to inform them of the end of the customer journey. If it is not the right key, step 60, the box triggers a local alert and informs the first server. The local alert may allow the temporary user to realize that he has made a mistake, for example, by mistaking the key, or forgetting to put it in the box. With the box open, the temporary user can correct his error by putting the expected key and the procedure continues in step 59. If the error is not corrected after a predetermined time, the alert triggers system-level corrective procedures such as the call of the temporary user and / or the owner user by an operator, etc. Thus, it is advantageously found that by this key identification, there is an exact and permanent knowledge of the fleet of available vehicles whereas, without the key identification, many malfunctions are possible such as forgetting to put the key back in. the box with the consequence that the following temporary user can not use the vehicle until the system has, at least, reminded the previous temporary user to return the key to its place. We will now describe a mechanical embodiment of the key box particularly advantageous in the context of vehicle sharing. It will be readily understood that this mechanical embodiment can be implemented independently of the functionalities described above and that, conversely, the above functionalities can be implemented with boxes having different mechanical structures. With reference to FIG. 5, the box 1 comprises a bottom plate 61 composed of a circular part 63 extended by a substantially rectangular part 65. The bottom plate 61 comprises holes 6 7 making it possible to fix the box firmly on a support such as a wall. It also includes attachment brackets 69 for attaching a protective shell. In its rectangular portion 65, a reinforced container 71 is firmly attached to the bottom plate 61. This container 71 is closed by a door 73. The door 73 slides in a vertical translational movement along two rails 75, 77. The door 73 has an embossing 79 allowing a user to put a finger to lift in the direction of the arrow 81. The assembly is mounted so that the arrow designates the vertical axis upwards. The door 73 has on its high side a notch 83 in which is positioned a pin 85. The pin 85 is mounted on a support 87 secured to the bottom plate 61, and therefore to the container 71. In the figure, the pin 85 is shown in the locking position, that is to say, it prevents the door from going up and thus to give access to the container. Figure 6 shows a rough view of the pin 85 in the locking position. The pin 85 is mounted on the support 87 so as to be able to perform a translational movement perpendicular to the plane of the door 61 between the locked position and an unlocked position allowing the free sliding of the door 61, as shown in FIG. 7. This translation movement of the pin is controlled by an electromagnet 89. For safety, the idle position of the pin corresponds to the locked position. The circular part 63 contains the electronic control part and the protective shells have the appropriate openings to allow obviously direct access to the door but also to position a user interface in the form of a small alphanumeric screen and / or a keyboard of type digicode. The protective shells are arranged, when in position, so as not to reveal any screws or disassembly means without degradation of the equipment. Thus, the circular portion of the shell is snapped onto the attachment supports 69 by a rotational movement and once this circular portion is positioned. The parallelepiped portion of the shell is slid and attached to the attachment brackets 69 of the rectangular portion 65 of the support so that being in position it prevents any rotation of the circular part of the shell and therefore any unlocking. Thus the shells are such that no screw or fastener attachment is apparent and the arrangement of their faces prevent degradation or attempts of burglary. They are locked in position by a single lock whose key is only held by maintenance technicians. The invention has been illustrated and described in detail in the drawings and the foregoing description. This must be considered as illustrative and given by way of example and not as limiting the invention to this description alone. Many alternative embodiments are possible. For example, both servers and transmitters / receivers can be confused into a single server and a single transmitter / receiver. In the claims, the word "comprising" does not exclude other elements and the indefinite article "one" does not exclude a plurality.
权利要求:
Claims (12) [1" id="c-fr-0001] Box (1) with secure closure comprising a container (3) closed by a door (5) movable between a closed position and an open position, said door comprising a locking device (7) adapted to lock the door in the closed position , characterized in that said box further comprises a controller (9) of said locking device connected to a content identification device (11), said controller being adapted to trigger an alert when a predetermined content is not in the container. [2" id="c-fr-0002] 2. Box according to claim 1, characterized in that the controller is further connected to a first transmitter / receiver (15) adapted to communicate with a first server (21) and the controller is adapted to receive from said server an identification of said content predetermined. [3" id="c-fr-0003] 3. Box according to claim 2, characterized in that the identification of said predetermined content is an identification code, said identification code being reproduced in the predetermined content. [4" id="c-fr-0004] 4. Box according to claim 3, characterized in that the content identification device is an RFID reader adapted to read an RFID tag associated with the predetermined content and containing the identification code. [5" id="c-fr-0005] 5. Box according to any one of the preceding claims, characterized in that the alert is transmitted to a user of the box by light and / or sound means (13) and to an alert receiving server. [6" id="c-fr-0006] 6. Box according to any one of the preceding claims, characterized in that it further comprises means of authentication (17) of a user connected to the controller, said controller being further adapted to transmit an unlock command to the locking device only after user authentication. [7" id="c-fr-0007] 7. Box according to claim 6, characterized in that the controller is further connected to a second transmitter / receiver (19) adapted to communicate with a second server (23) and the controller is adapted to receive from said server the parameters of authentication of said user or to connect the authentication device with said second server and receive from the latter a successful authentication information. [8" id="c-fr-0008] 8. Box according to claim 6 or 7, characterized in that the authentication parameters are disposable and limited in time. [9" id="c-fr-0009] 9. Box according to claim 7 or 8, characterized in that the authentication means comprise a keypad and the authentication means are adapted to authenticate the user by entering a predetermined code in the absence of connection with the second server. [10" id="c-fr-0010] 10. Box according to any one of the preceding claims, characterized in that the door (73) is movable in vertical sliding between the closed position and the open position so that the gravity holds the door in the closed position in the absence of a further force, and in that the locking device comprises a notch (83) in said door and an integral pin (85) of the container, said pin being held in the notch by a spring when the door is closed. [11" id="c-fr-0011] 11. Box according to claim 10, characterized in that the locking device further comprises displacement means (89) in translation of the pin adapted to remove it from the notch and thus unlock the door at the order of the controller. [12" id="c-fr-0012] 12. Box according to any one of claims 10 or 11, characterized in that it comprises a single maintenance opening lock and no apparent fastening fastener.
类似技术:
公开号 | 公开日 | 专利标题 FR3048257A1|2017-09-01|SECURED BOX WITH PREDETERMINED CONTENT AND DYNAMIC MANAGEMENT EP2183453B1|2016-05-11|Method of automatically unlocking an opening member of a motor vehicle for a hands-free system, and device for implementing the method EP2969667B1|2017-09-20|Method of making a vehicle available and corresponding system for making a vehicle available EP2284803B1|2013-03-13|Secure system for programming electronically controlled lock devices using encoded acoustic verifications EP1780680B1|2018-01-17|Procedure for control of interlock and lock EP2864966B1|2020-07-15|Electronic padlock, mobile terminal adapted for controlling the electronic padlock, and method for controlling the electronic padlock EP3125201A1|2017-02-01|Method for controlling the opening of a lock by one-time passcode EP2306407A1|2011-04-06|Secure system for programming electronically controlled lock devices using encoded acoustic verifications EP2315192A1|2011-04-27|Method of management for a vehicle parking system EP2315191A1|2011-04-27|Method of management for a vehicle parking system EP2913462B1|2020-12-30|Improved box and method for operating same EP3257028B1|2020-01-08|Semi-automatic display unit for gas cylinders and associated method WO2012143634A1|2012-10-26|Method and device for actuating a lock EP0856624A1|1998-08-05|Safety device for motor vehicle and learning method therefor WO2016042232A1|2016-03-24|Device for unlocking at least one opening leaf and equipment for receiving objects, associated data storage assembly and associated object distribution system BE1016194A3|2006-05-02|User`s biometric identification device for e.g. use as safety device for e.g. suitcase, has memory, biometric unit and microprocessor confined in case, and another memory and microprocessor generating signals confined in another case WO2018210879A1|2018-11-22|Multifunctional integrated device and method for vehicle mobility WO2007042556A1|2007-04-19|Control system with fingerprint sensor FR3042897A1|2017-04-28|CONNECTED ELECTRONIC PADLOCK, METHODS FR3081663A1|2019-11-29|METHOD FOR REMOTELY MANAGING THE OPENING OF AN ELECTRONIC LOCK WITH A USER INTERFACE, TERMINAL, LOCK AND COMPUTER PROGRAM FR2819957A1|2002-07-26|Method for operating a fleet of vehicles, comprises user badges which are loaded with prospective vehicle details and electronic installations and badges in vehicles which respond to user badges EP2728524B1|2017-09-06|Method for controlling access to a premise by reading a graphic code provided on an access coupon, related system and computer program FR3081305A1|2019-11-29|MUTUALIZED PACKAGE BOX FOR COLLECTIVE MAIL DISTRIBUTION SYSTEM AND SYSTEM INTEGRATING SUCH BOX FR3105482A1|2021-06-25|Method of obtaining a password for access to a service WO2021092432A1|2021-05-14|Touchless smart storage box with face recognition system
同族专利:
公开号 | 公开日 FR3048257B1|2021-06-18| WO2017144836A1|2017-08-31| CN109072661A|2018-12-21| US20190085616A1|2019-03-21| EP3420172A1|2019-01-02| EP3420172B1|2022-01-05|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US5295743A|1991-09-06|1994-03-22|Dasco Data Products Limited|Secure cabinets| FR2741103A1|1995-11-15|1997-05-16|Brink S Sa|Electronic control system for locks of cash storage safes in cash dispenser| US20020014961A1|1998-09-11|2002-02-07|Key-Trak, Inc.|Mobile object tracking system| EP2459832A1|2009-07-31|2012-06-06|Raufoss Ammunisjonsfabrikker AS|Safe comprising a door which is linearly displaceable between closed and open position.|CN110469234A|2019-08-31|2019-11-19|荆门市南博智能科技有限公司|A kind of intelligent and safe safety device| CN112664098A|2021-01-26|2021-04-16|麦嘉荣|Intelligent control integrated lock for safe deposit box|GB2425206B|2005-04-14|2007-08-01|Robert Grayson|Secure delivery of goods| KR20090109281A|2008-04-15|2009-10-20|김기동|Key storage case| DE202012100168U1|2012-01-18|2012-02-16|Kruse Sicherheitssysteme Gmbh & Co. Kg|Device for secure storage and release of access keys to a building or a building section| DE102014105243A1|2013-12-05|2015-06-11|Deutsche Post Ag|Access control system|CN108021963B|2016-10-28|2020-12-01|北京东软医疗设备有限公司|Marking device for medical imaging equipment parts| JP6897536B2|2017-12-12|2021-06-30|トヨタ自動車株式会社|Authentication information control system, authentication information control method, and authentication information control program| AT523309A1|2019-08-23|2021-07-15|Knapp Ag|Key storage device|
法律状态:
2017-01-31| PLFP| Fee payment|Year of fee payment: 2 | 2017-09-01| PLSC| Publication of the preliminary search report|Effective date: 20170901 | 2018-01-30| PLFP| Fee payment|Year of fee payment: 3 | 2020-02-26| PLFP| Fee payment|Year of fee payment: 5 | 2021-01-28| PLFP| Fee payment|Year of fee payment: 6 | 2022-02-25| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1651602A|FR3048257B1|2016-02-26|2016-02-26|SECURE BOX WITH PREDETERMINED CONTENT AND DYNAMIC MANAGEMENT|FR1651602A| FR3048257B1|2016-02-26|2016-02-26|SECURE BOX WITH PREDETERMINED CONTENT AND DYNAMIC MANAGEMENT| EP17714845.9A| EP3420172B1|2016-02-26|2017-02-27|Secure housing with predetermined contents and dynamic management| CN201780022081.7A| CN109072661A|2016-02-26|2017-02-27|Safety shell with intended contents and dynamic management| PCT/FR2017/050434| WO2017144836A1|2016-02-26|2017-02-27|Secure housing with predetermined contents and dynamic management| US16/080,072| US20190085616A1|2016-02-26|2017-02-27|Secure housing with predetermined contents and dynamic management| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|