EP2833330A1 - Communication method and system - Google Patents

Communication method and system Download PDF

Info

Publication number
EP2833330A1
EP2833330A1 EP14179202.8A EP14179202A EP2833330A1 EP 2833330 A1 EP2833330 A1 EP 2833330A1 EP 14179202 A EP14179202 A EP 14179202A EP 2833330 A1 EP2833330 A1 EP 2833330A1
Authority
EP
European Patent Office
Prior art keywords
mobile
communication
identifier
communication device
range wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP14179202.8A
Other languages
German (de)
French (fr)
Other versions
EP2833330B1 (en
Inventor
Adam Stroud
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Paxton Access Ltd
Original Assignee
Paxton Access Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=51228377&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP2833330(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from GB1313586.8A external-priority patent/GB2516686B/en
Application filed by Paxton Access Ltd filed Critical Paxton Access Ltd
Publication of EP2833330A1 publication Critical patent/EP2833330A1/en
Application granted granted Critical
Publication of EP2833330B1 publication Critical patent/EP2833330B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00341Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one limited data transmission ranges
    • G07C2009/00349Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one limited data transmission ranges and the lock having only one limited data transmission range
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • G07C2209/64Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor

Definitions

  • the present invention relates to methods and systems for implementing or managing control or access functions, particularly via short range wireless communication with a local device or system associated with a control or access function.
  • wireless communication systems are widespread and such systems have many applications, including but not limited to tracking, identification or tagging, access control, payment, etc.
  • Secure access systems are widely used to ensure only authorised personnel are permitted entry to a building or area, allowing an employee to enter their office but not an unauthorised person, for example.
  • Authentication is typically achieved by use of a short range wireless communications module such as an RFID (Radio Frequency Identification) tag being presented at close range to a reader located near an entry point to a secure area.
  • RFID Radio Frequency Identification
  • the reader, or associated local control unit may contain the necessary information to authenticate the tag or, in many cases, will be connected to a central authentication unit, and if the person is authorised to enter the secure area, the associated door will be unlocked or opened.
  • Secure access systems commonly have more than one entry point, thus requiring a number of readers. If the authentication information is stored in the reader, or associated local control unit, as a result a system having multiple readers can be expensive and requires each reader to be updated separately with any new or changed information. Alternatively, if the readers communicate with a central authentication unit, significant costs and effort are required to install the wires or cables required to connect each reader to the central unit. In any event, the installation of the readers requires each reader to be provided with a power connection irrespective of whether a data communication connection is required so the installation of such systems is expensive and not straightforward.
  • the present invention seeks to provide systems and methods for implementing or managing control or access functions that are convenient for the user and that are simple to install, modify and update.
  • the present invention also seeks to provide versatile and adaptable systems that are capable of many different functions.
  • a communication device having a low-power mode and a higher-power mode for implementing a control or access function, comprising: a short range wireless communication interface; a long range wireless communication interface; a local identifier stored therein; wherein in the low-power mode the communication device is operable to receive a mobile identifier from a mobile device over the short range wireless communication interface and upon receiving the mobile identifier the higher-power mode is enabled; in the higher-power mode the communication device is operable to communicate over the long range wireless communication interface with a remote device having a controller; wherein the communication device is configured to send the local identifier and the received mobile identifier to the remote device; and wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the local identifier and the mobile identifier.
  • the present invention provides a communication device that can be used as an access or control device.
  • the communication device can be used as an access control reader that can be provided beside an access-controlled door or other device to be controlled.
  • the communication device is provided with two power modes: a low power mode, for example the BLE "Whisper Mode", enabling short range communications; and a higher- or normal-power mode enabling longer-range communications.
  • the communication device can communicate both with a mobile device (via a short range wireless communication, for example via Bluetooth Low Energy (BLE) operating in a low-power "Whisper Mode” or Near Field Communications (NFC) which can operate passively) and with a remote device via a long range wireless communication (for example via Bluetooth Low Energy (BLE) connection operating in a higher-power or normal-power mode or Wi-Fi).
  • BLE Bluetooth Low Energy
  • NFC Near Field Communications
  • Wi-Fi Wireless Fidelity
  • This provides a communication device that can use available power sources or a battery due to low-power consumption requirements and no requirement for a wired connection to a data infrastructure as it communicates wirelessly, making it suitable for locations to which it would be uneconomic or difficult to provide data cabling and/or power cabling.
  • This is advantageous because each communication device can be placed in the location that is most suited to its purpose and there is a reduced constraint imposed on locating devices due to wiring requirements.
  • a method of implementing a control or access function in a communication device having a low-power mode and a higher-power mode comprising the steps of: receiving at the communication device while the communication device is operating in a low-power mode a short range wireless communication from a mobile device, the short range wireless communication comprising at least a mobile identifier associated with the mobile device; enabling a higher-power mode of the communication device on receipt of the mobile identifier; transmitting from the communication device a long range wireless communication to a remote device while the communication device is operating in a normal-power mode, the long range wireless communication comprising at least the mobile identifier and a local identifier associated with the communication device; wherein the remote device is operable to receive and process the long range wireless communication in order to perform at least one control or access action based on the information obtained from processing of the long range wireless communication.
  • the short range wireless communication interface and the long range wireless communication interface of the communication device are comprised of one and the same communication interface, preferably operating in different modes.
  • the use of a single communication interface by the communication device reduces device hardware complexity and power usage as only one transceiver and antenna can be used to perform both short and long range communications using different modes.
  • the communication device returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device to the remote device via the long range communication interface.
  • the communication device can reduce or minimise power consumption.
  • the communication device is operable to communicate substantially within a range of approximately 30cm in the low-power mode.
  • the range of communication using a wireless communication interface is restricted.
  • the communication device will operate to detect only mobile devices within a short range of approximately 30cm. This limited range is useful for verifying that the mobile device as it is only possible to communicate with a mobile device that is definitely near the communication device, i.e. within 30cm of the communication device. This also reduces the likelihood that, when a mobile device is detected, a user intends to present to the mobile device to the communication device to trigger an access or control function.
  • the communication device is operable to communicate substantially within a range of 30m in the higher-power mode.
  • the communication device needs to be able to communicate with a remote device usually not located in the vicinity of the communication device but usually located within a range of 30m of the communication device.
  • the communication device further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device.
  • a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device.
  • the second short range wireless communication interface is NFC.
  • NFC provides a protocol that allows the use of passive tokens by users and is supported by most manufacturers of such tokens.
  • the communication device further comprises a battery and the communication device is powered by the battery.
  • the battery is a coin battery.
  • the communication device is designed to reduce or minimise power consumption and due to this reduced or minimised power the use of a battery, preferably a coin battery, is possible to provide power to the device for a useful amount of time without requiring the battery to be regularly replaced or charged.
  • the communication device further comprises a proximity sensor configured to activate the low-power mode of the communication device and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device.
  • a proximity sensor configured to activate the low-power mode of the communication device and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device.
  • the communication device can operate with no power being provided to the communications interfaces until the proximity sensor detects that a user is nearby the communication device.
  • the communication device can further comprise a proximity sensor configured to trigger the communication device to request a mobile identifier from the mobile device via the short range wireless communications interface and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device.
  • the proximity sensor can only accept receipt of mobile identifiers in response to a request sent in response to the proximity sensor verifying that the user or mobile device is near the communication device and that the user is performing an action such as waving a hand or a mobile device near the communication device that indicates that the user is requesting an access or control function to be performed by the communication device.
  • the proximity sensor can also power up one or both communication interfaces as well.
  • the communication device begins communications with the mobile device over the short range wireless communication interface by requesting the mobile identifier from the mobile device.
  • the mobile device can confirm that it is near the communication device thus removing the need to broadcast or otherwise determine when to communicate the mobile identifier.
  • the mobile identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
  • a MAC address e.g. a MAC address
  • a Bluetooth MAC address e.g. a Bluetooth Identifier
  • QR code e.g. a QR code
  • the communication device also receives a unique identifier in addition to the mobile identifier from the mobile device and sends the received unique identifier to the remote device using the long range wireless communication interface along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier. It may be necessary to send both a mobile identifier and a unique identifier from a mobile device to the communication device, for instance the user can have an identifier associated with that user while the mobile device can have an identifier associated with that mobile device enabling both the user to be verified and the mobile device to be verified.
  • the user may have two identifiers associated with them, for instance a personal identifier and a team identifier or the mobile device may have two identifiers associated with it to verify an identifier associated with the mobile device hardware as well as a software provided identifier.
  • the use of a unique identifier allows more flexibility in verification of the combination of user, mobile device and communication device for access or control purposes.
  • the controller of the remote device is further configured to request the mobile device to make a connection using a third long range protocol to verify that the mobile device is within the proximity of the communication device, preferably requesting location data from the mobile device to be transmitted to the remote device wherein the location data can be a GPS location.
  • a direct connection can be established with the mobile device by the remote device to verify that the mobile device is near the communication device, preferably using GPS location data to verify the mobile device location.
  • the location of the communication device is predetermined and stored by the remote device in order to enable the remote device to assess whether the location data provided by the mobile device is within a predetermined range of the communication device, preferably further taking into account a tolerance for incorrect location data reporting.
  • the mobile device and remote device can communicate indirectly via the communication device.
  • the third long range protocol is Wi-Fi.
  • Wi-Fi networks are extremely common in most situations where an access or control system is installed, for example an office or factory, the use of an existing Wi-Fi network to which a mobile device may be connected enables an alternative path to connect the remote device directly to the mobile device to perform verification or data exchange as required for the access or control system.
  • the communication device has a medium-power mode that is used to communicate with the mobile device over the short range wireless communication interface when the communication device receives the mobile identifier from the mobile device.
  • a medium-power mode is used, the range of the communication interface is usually increased in comparison to the range possible in a low-power mode, thus use of a medium-power mode can enable either faster or more efficient or longer range communication between a mobile device and a communication device.
  • the controller of the remote device is operable to send a security query to the mobile device, the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device or via the communication device, any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation.
  • the remote device can communicate either directly or indirectly with the mobile device to perform a further verification step such as requiring the user to correctly answer a security query.
  • the system comprises: a communication device; one or more mobile devices; the remote device comprising a long range wireless communication interface and a controller; wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the communication device.
  • the system can support more than one mobile device, each associated either with a specific user or group of users or a pool of mobile devices to be used by a group of users or single user.
  • the mobile device comprises a mobile communications device, preferably a smartphone, tablet or the like.
  • a mobile communications device preferably a smartphone, tablet or the like.
  • the use of existing user hardware such as smartphones or tablets means that dedicated identity tokens are not required for each user and a more flexible solution is possible.
  • the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is preferably a BLE-enabled smartphone.
  • BLE Bluetooth Low Energy
  • the use of the BLE protocol allows the communication device to operate efficiently in terms of power use and provides a well-supported communication means that many mobile devices support, enabling the access or control system to be supported using existing mobile devices.
  • the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is preferably BLE-enabled.
  • BLE Bluetooth Low Energy
  • the use of the BLE protocol allows the communication device to operate efficiently in terms of power use and provides a communication means that has sufficient range to enable communication between a remote device and communication device.
  • An alternative aspect of the present invention provides a system for implementing a control or access function, the system comprising a mobile device having a mobile identifier stored therein and comprising a short range communication interface and a long range communication interface, a local device having a local identifier stored therein, and a remote device comprising a long range communication interface and a controller, wherein the mobile device is configured for short range communication with the local device for receiving the local identifier, the remote device is configured for long range communication with the mobile device for receiving a communication comprising at least the local identifier and the mobile identifier, and the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the mobile device.
  • This alternative aspect of the present invention provides a system in which a mobile device communicates both with a local device via short range wireless communication and with a remote device via a long range communication. Therefore the remote device does not need to communicate with the local device directly, which is advantageous because it then follows that the local device does not require the significant amount of power that would otherwise be needed for long range communication directly with the remote device.
  • the mobile device has its own mobile identifier and is provided with a local identifier that identifies the local device, both of which the mobile device can transmit to a remote device and the remote device is therefore provided with enough information so that an appropriate control or access action can be performed, the action being relevant to the local device that has been identified via the mobile device.
  • wires or cables are not required to connect each local device to the remote device or the mobile device. Therefore this aspect provides a system that is simple to install and cost effective yet is reliable and enables local control and access to be implemented from a remote location.
  • the local device, mobile device or communication device may be provided with additional wireless communication capabilities in order to support any suitable legacy device that is capable of storing an identifier and that is responsive to short range communication.
  • the local device may be an active device, such as an active token, that comprises an internal power source for powering short range transmission of at least the local identifier to another device.
  • the power source may, for example, be an external power supply or a low power internal battery.
  • the local device may be passive and therefore requires no internal power source.
  • the local device may comprise a passive token.
  • suitable passive tokens are MIFARE tokens, such as the MIFARE UltraLight range of tokens.
  • Passive tokens can be small and lightweight and inexpensive to manufacture, enabling a number of tokens to be installed in an area without significant expense. Furthermore with no power source required, the tokens can easily be installed simply by affixing the token (with adhesive or mechanical fixing means for example) to a suitable location or object with no wiring required and the token does not need to be removable to enable an internal battery to be replaced. This is advantageous because each token can be placed securely in the location that is most suited to its purpose and there is no constraint due to wiring requirements or the need to have the token be removable that might otherwise cause the token to be located in a less than ideal location. Passive tokens are powered by interaction with another device, for example with the mobile device inductively coupling or otherwise providing power to the passive token to enable the token to release information.
  • the local device has an identifier stored therein.
  • the identifier comprises information of any type that identifies either the specific device (i.e. the local identifier is unique to that token) or may identify a group or set of devices.
  • the local identifier is a passive token and may identify the token as being one of a set of tokens that are associated with one or more common systems, or groups of users, as discussed further below.
  • the mobile device may be configured to provide power to the local device when the mobile device is brought into contact or into close proximity with the local device, to enable the local device to release the local identifier to the mobile device.
  • the communication device has an identifier stored therein and in this and other aspects the mobile device can, alternatively or additionally, have an identifier stored therein.
  • the mobile device comprises any suitable device which can be transported to different locations so that it can communicate via short range wireless transmissions with other devices with which the mobile device comes into range.
  • the mobile device can be a dedicated device such as an RFID card equipped additionally with a long range communication interface.
  • the mobile device can, for example, be an active token provided with a short range interface and a long range interface and a power supply, such as a coin cell battery or the like.
  • the mobile device may be an existing device, e.g. a computer, such as a laptop or other portable device, or may be a personal digital organiser (PDA), or a tablet device or a mobile phone, such as a smartphone. Therefore the user of the mobile device does not require a separate or dedicated device to be able to control or access functions of a system and instead can use their existing mobile device.
  • PDA personal digital organiser
  • the mobile device can comprise a short range communication interface which may comprise any suitable short range interface such as, for example, a Bluetooth Low Energy (BLE) interface when operating in a low-power "Whisper Mode", a near field communications (NFC) interface or any other short range, radio frequency (RF) interface such as an RFID interface.
  • BLE Bluetooth Low Energy
  • NFC near field communications
  • RF radio frequency
  • the mobile device may be a BLE-enabled or an NFC-enabled smartphone.
  • the conventional way of adopting NFC is by way of the phone emulating a token or credential.
  • the mobile phone, its SIM card, or both must have a secure element against which secure data can be verified.
  • a trusted service provider (TSP) must perform online verification of the NFC. Compatibility issues with phone manufacturers and SIM card providers makes such systems difficult and complex to implement whereas the present system is advantageous because it enables compatibility with any NFC-enabled phone without the above complications present with emulating a token or credential.
  • the mobile device comprises a long range communication interface which may comprise any suitable long range interface such as, for example, a Bluetooth (e.g. Bluetooth or Bluetooth LE) interface, or a Wi-Fi interface, etc.
  • a Bluetooth e.g. Bluetooth or Bluetooth LE
  • Wi-Fi wireless fidelity
  • the mobile device may be a Bluetooth-enabled smartphone.
  • short range communication is intended to describe systems which require either contact between the two communicating devices or at least for the interfaces of the two communicating devices to be in close proximity with each other, i.e. to be separated from each other by no more than about 0.3m, preferably by no more than about 0.2m or preferably by no more than about 0.1m.
  • NFC, Bluetooth Low Energy (BLE) when operating in a low-power "Whisper Mode” and RFID communications are considered to be short range communications according to embodiments of the present invention.
  • Long range communication is intended to describe systems which typically do not require contact between the two communicating devices nor for the interfaces of the two communicating devices to be in close proximity with each other.
  • Long range communications in accordance with embodiments of the present invention are communications that typically occur over a distance of one or more metres, such as over about 1m or preferably over a range of about 0.5 to 500m, preferably over a range of about 1 to 200m, preferably over a range of about 10 to 100m.
  • Bluetooth, Bluetooth Low Energy (BLE) when operating in a normal-power mode (i.e not operating in a low-power "Whisper Mode") and Wi-Fi communications are considered to be long range communications according to embodiments of the present invention, as are communications over the mobile/cellular/3G/4G/mobile broadband, etc., networks.
  • the remote device can be any suitable device which can receive long range wireless communications from a mobile device or communication device and that can control one or more control or access functions of a system.
  • the remote device may comprise a wireless router or access point that may also be connected either wirelessly and/or via wired connections to one or more devices, appliances, systems, etc.
  • the devices, appliances, systems, etc., which the remote device controls may be related by one or more common features.
  • the devices, appliances, systems, etc. may all be located in the same or in related areas of, for example, a building, e.g. inside an office or an office floor plate of a business premises.
  • the systems may comprise the building/office access systems (e.g.
  • the remote device can advantageously control any one or more of the electronic devices, appliances and systems in an office (or indeed any other) environment in response to receiving a long range communication from a mobile device or communication device that is located in the environment.
  • a token or communication device can be located (e.g. adhered or otherwise affixed) where a light switch would typically be located.
  • a user entering the office can place their smartphone in close proximity to the token or communication device in order to control the lighting system via the remote device to switch on the lights.
  • More than one token or communication device may be located about the office environment to enable the lighting system to be operated from a number of different locations.
  • tokens or communication devices can additionally or alternatively be placed in locations where a light switch may not normally be located (typically due to wiring/cost constraints), such as on a wall next to where an office user sits when at their desk.
  • Tokens or communication devices can also be used to enable the user to gain access to the office environment.
  • a token or communication device can be affixed near to any door that permits access to the environment.
  • a user wishing to enter the office can place their smartphone in close proximity to the token or communication device in order to control the locking mechanism of the door, causing the door at least to be unlocked and also may be opened by the remote device.
  • Any other appliances, systems, devices, etc., in the office can also likewise be controlled by appropriate placement of a token or communication device nearby or on the item and a controlling connection with the remote device. Further examples of such applications are discussed in detail below wherein the token or communication devices can be interchanged or combined.
  • the remote device receives a long range communication from a mobile device or communication device and performs an access or control function accordingly, as discussed above. In some instances, however, it may be desirable for the remote device to perform another control or access action.
  • the controller of the remote device therefore may be configured to perform at least one further control or access action in the absence of the remote device receiving a further communication from the mobile device or communication device, for example in the absence of the remote device receiving a further communication from the mobile device or communication device within a time period. This is advantageous in that if, for example, the user leaves the area where the local device or communication device is located without deactivating the system which the remote device has switched on, then the remote device further controls the system to switch it off again, even without a specific command.
  • the remote device can switch off the lights even without the user bringing their mobile device within short range of a token.
  • the token can be a local device or a communication device. Switching off the lights could be done automatically, for example, after an elapsed time period. Alternatively, after an elapsed period of time the remote device could send a long range communication to the mobile device or communication device and in the absence of a response from the device (thus indicating that the user is no longer in the environment), the remote device can then deactivate the system (e.g. switch off the lights).
  • the remote device can determine whether to perform a further control or access action in response to a different communication from the mobile device or one or more communication devices. For example, if the mobile device or a communication device sends a communication to the remote device to switch on the lighting system, but then the remote device receives a further communication from the mobile device or from the same or another communication to operate the door locking mechanism, the remote device can also operate the lighting system to switch off the lights as operation of the door locking mechanism suggests that the user is leaving the environment. Many different combinations of communications from the mobile device and/or communication device are possible and can inform the remote device of the user's activity and requirements even without the user needing to present their mobile device to a particular local device or communication device.
  • the controller of the remote device can be configured to perform at least one control or access action in response to receiving the communication from the mobile device or communication and can do so in any suitable manner.
  • the controller of the remote device may transmit a control signal to control at least one device or system located in the vicinity of the local device or communication device, and/or may transmit, via the long range wireless communication interface of the remote device, at least one of information and a command to the mobile device.
  • the controller may store information related to the mobile device and/or the local device or communication device in a memory of the remote device. When the remote device transmits a long range communication comprising information and/or a command to the mobile device, this may cause information to be displayed on the mobile device and/or may require a user to input information into the mobile device.
  • the user places their mobile device in the vicinity of the token located near the door as discussed above.
  • the remote device transmits back a long range wireless communication causing an image to be displayed on the mobile device.
  • the user is required to interact with the display (e.g. to touch certain parts of the display to authenticate their request for access) and in response a further long range wireless communication is transmitted to the remote device, which can then control operation of the access function to enable the user to enter the environment if they are entitled to do so.
  • the controller of the remote device can be configured to perform at least one control or access action in response to receiving the communication from the mobile device.
  • the controller of the remote device can be configured to perform at least one control or access action, it may be that no control or access action is necessary in some scenarios and thus no control or access action is actually performed. For example, if an unrecognised mobile device is brought within range of the local device or communication device and if the remote device receives a communication comprising the local identifier and/or a mobile identifier, it may be determined that the mobile device is unrecognised and that no control or access action should be performed.
  • the local device may be unrecognised, for example if a mobile device is brought within range of a local device that is part of another system. If the remote device receives a communication comprising the local identifier and a mobile identifier, it may be determined that the local device is unrecognised and that no control or access action should be performed.
  • the controller of the remote device may be configured to transmit a control signal to a device or system in the vicinity of the local device or communication device to switch on and/or to switch off the device or system.
  • the device or system in the vicinity of the local device or communication device may comprise at least one of a locking mechanism for a door, the door preventing access to at least one area when locked by the locking mechanism, a lighting system for lighting the area in which the local device or communication device is located, a heating and/or cooling system for heating and/or cooling the environment in the vicinity of the local device or communication device, at least one power source for enabling power to be provided to devices and systems located in the vicinity of the local device or communication device, a communications device or system for enabling two-way communication with at least one remote communications device or system, an audio and/or video device or system for providing audio and/or video output to the area in the vicinity of the local device or communication device, and any other powered device or system located in the vicinity of the local device or communication device.
  • a remote device is provided that is ideally suited
  • the local identifier that is released to the mobile device may be encrypted for enhanced security.
  • the identifier is simply released in response to a short range wireless communication and is not encrypted by the local device for transmission.
  • short range local devices such as passive tokens
  • this is not much of a security risk because any other device that wanted to intercept the identifier would need to be within the short range of the local device (typically within about 10cm of the device, e.g.), which would likely be apparent to the genuine user.
  • the mobile device subsequently transmits the local identifier (and indeed its own mobile identifier) over a long range wireless communication to the remote device, which may be more susceptible to interception.
  • the mobile device may further comprise a processor configured for processing the local identifier received from a local device such that the communication transmitted to the remote device comprises the processed local identifier.
  • the processor may be configured for encrypting the local identifier. Therefore even if the local identifier received by the mobile device is unencrypted, the mobile device can encrypt the information before transmitting it for reception by the remote device, protecting the more risky transmission over the longer range.
  • one or more of the communications and/or identifiers may be encrypted in a similar manner.
  • systems in accordance with the present invention advantageously provide the means to implement a control or access function at a local device or communication device using a mobile device or communication device to transmit the necessary communications via its short range and long range interfaces.
  • a method of implementing a control or access function comprising receiving at a mobile device a short range communication from a local device having a local identifier stored in a memory thereof, the short range wireless communication comprising at least the local identifier, transmitting from the mobile device a long range wireless communication to a remote device, the long range wireless communication comprising at least the local identifier and a mobile identifier stored in a memory of the mobile device, receiving and processing the long range wireless communication at the remote device, and performing at least one control or access action based on the information obtained from processing of the long range communication.
  • a method of implementing a control or access function comprising receiving at a communication device a short range communication from a mobile device having a mobile identifier stored in a memory thereof, the short range wireless communication comprising at least the mobile identifier, transmitting from the communication device a long range wireless communication to a remote device, the long range wireless communication comprising at least the mobile identifier and a local identifier stored in a memory of the communication device, receiving and processing the long range wireless communication at the remote device, and performing at least one control or access action based on the information obtained from processing of the long range communication.
  • the method is advantageous because a control or access function can be implemented in any existing devices that are capable of receiving and/or transmitting the wireless communications as set forth in the above method, enabling such a function to be implemented without significant installation costs or efforts.
  • the controller of the remote device may control the performing of the at least one control or access action.
  • the step of transmitting from or receiving at a mobile device a short range wireless communication to/from a local device may comprise establishing any suitable communication, for example a Bluetooth LE communication or Near Field Communication (NFC), with the local device or communication device.
  • the method may further comprise providing power via a short range transmission from the mobile device to the local device, to enable the local device to release the local identifier.
  • short range wireless communications may be communications that occur over a range of only a few cm to under about 1 m. Therefore the method may further comprise moving the mobile device into contact, or into close proximity, with the local device or communication device to initiate the short range communication with the local device or communication device.
  • the step of transmitting from the mobile device or communication device a long range wireless communication to the remote device may comprise establishing any suitable communication, for example a Bluetooth (or Bluetooth LE) communication or Wi-Fi or cellular data communication, with the remote device.
  • a Bluetooth (or Bluetooth LE) communication or Wi-Fi or cellular data communication
  • the method may further comprise performing at least one further control or access action in the absence of receiving a further long range wireless communication from the mobile device or communication device at the remote device within a time period.
  • Any of the actions discussed above may comprise at least one or more of transmitting a control signal to control at least one device or system located in the vicinity of the local device or communication device, transmitting, via the long range wireless communication interface of the remote device or the communication device, at least one of information and a command to the mobile device or communication device, and storing information related to the mobile device and/or the local or communication device in a memory of the remote device.
  • the control or access action may comprise transmitting a control signal to a device or system in the vicinity of the local device or communication device to switch on and/or to switch off the device or system.
  • the control or access action may comprise at least one of operating a locking mechanism of a door, the door preventing access to at least one area when locked by the locking mechanism, operating a lighting system for lighting the area in which the local or communication device is located, operating a heating and/or cooling system for heating and/or cooling the environment in the vicinity of the local or communication device, operating at least one power source for enabling power to be provided to devices and systems located in the vicinity of the local or communication device, operating a communications device or system for enabling two-way communication with at least one remote communications device or system, operating an audio and/or video device or system for providing audio and/or video output to the area in the vicinity of the local or communication device, and operating any other powered device or system located in the vicinity of the local or communication device.
  • the local identifier received at the mobile device may not be in any way altered for security purposes. Therefore the method may further comprise processing at the mobile device the local identifier received from the local device to provide a processed communication, wherein the step of transmitting from the mobile device a long range wireless communication to the remote device comprises transmitting the processed communication.
  • the processed identifier may prevent the identifier being immediately recognisable or readable.
  • the method may comprise processing at the mobile device the local identifier received from the local device to provide an encrypted communication, wherein the step of transmitting from the mobile device a long range wireless communication to the remote device comprises transmitting the encrypted communication.
  • some or all identifiers transmitted to the remote device can be similarly processed.
  • a method of providing a system for implementing a control or access function comprising registering a local device or communication device with a remote device by moving the local device or communication device within communication range of a short range reader of the remote device, storing information in a memory of the remote device comprising at least a local identifier of the local device or of the communication device, associating the local identifier stored in the memory of the remote device with at least one remotely located controllable system or device, and placing the local device or communication device in the vicinity of the remotely located controllable system or device such that the local device or communication device is visible to a user of the remotely located controllable system or device, wherein the local device is capable of releasing the local identifier only over a short range wireless communication or the mobile device is capable of
  • one or more local devices or communication devices can be registered with a remote device and then the tokens placed wherever it is required for their control or access function to be performed, which may be in a different location to the remote device.
  • the token when the token is to be used for accessing premises (i.e. to perform an access control function), the token can be stuck on the relevant door or on a wall next to the door, whereas the remote device may be located inside the premises, perhaps in an area that is not accessible to the user.
  • the token By simply interacting with the token via a mobile device, the user is able to communicate with the remote device and access desired functions.
  • a method of registering a mobile device for use with a system for implementing a control or access function comprising providing information relating to a mobile device to a remote device, the information relating to the mobile device comprising at least one address or number associated with the mobile device, transmitting a unique identifier from the remote device to the at least one address or number associated with the mobile device, providing to the mobile device an application having information for establishing secure communications with the remote device, processing the unique identifier with the application on the mobile device, the application determining whether the mobile device is to be registered with the system, and registering the mobile device with the system when the outcome of the determining step is positive.
  • a user's mobile device such as a smartphone can be provide with software, e.g. an application (or 'app'), that enables a code or unique identifier sent to the device from a remote device to be processed by the app and if the unique identifier has not previously been registered, the app is enabled on the mobile device for accessing the system.
  • software e.g. an application (or 'app')
  • an application or 'app'
  • a mobile device such as a smartphone can be used in the systems and methods in accordance with the present invention, for example by having an app on the mobile device to control and/or authenticate the various communications.
  • a method of implementing a control or access function with a mobile device comprising a short range communication interface, a long range communication interface and a memory with a mobile identifier stored therein, the method comprising receiving a short range communication comprising a local identifier from a local device and transmitting a long range communication comprising the local identifier and the mobile identifier to a remote device, the communication for enabling the remote device to control or perform at least one control or access action in relation to a system or device located in the vicinity of the local device.
  • the remote device can be any suitable device, such as an access point or wireless router.
  • the remote device may control the implementation of the control or access function.
  • a controller for implementing a control or access function comprising a long range wireless communication interface for receiving a communication from a mobile device or communication device, and at least one control interface for controlling at least one system or device located in the vicinity of a local device or communication device, wherein the controller is configured to determine whether a mobile device is authorised to use the control or access function based on information contained in a long range wireless communication received from the mobile device or communication device, and the control interface is configured to control a system or device identified by an identifier contained in the long range wireless communication received from the mobile device or communication device when it is determined that the mobile device is authorised to use the control or access function.
  • a controller that can recognise a permitted or authenticated device in a system and can implement a control or access function in the vicinity of the
  • the systems and methods described above involve long range wireless communication between a mobile device or communication device and a remote device that are separated by a distance of more than a few metres and typically would be separated to the extent that the mobile device could not readily be located near to the remote device.
  • the mobile device and the remote device may be located in different areas or rooms of a building or floorplate or may be in different buildings or floorplates entirely.
  • the long range communication between the mobile device or communication device and the remote device can be direct communication, i.e. from the mobile device or communication device directly to the remote device and vice versa or the long range wireless communication can be indirect, i.e. the mobile device or communication device communicates with an intermediate device within long range wireless communication and the intermediate device communicates (either directly or indirectly) with the remote device.
  • the mobile device or communication device may communicate with an access point or router within long range wireless communication and that router communicates with the remote device either via a wireless or wired connection (e.g. via WiFi, a LAN, a WAN or the like).
  • systems in accordance with embodiments of the present invention can comprise more than one remote device with communications between the mobile device or communication device and the controlling remote device being via one or more other remote devices.
  • FIG. 1 illustrates a system 10 for implementing a control or access function in accordance with embodiments of the present invention.
  • a mobile device 30, which in this illustration is a smartphone 30, has a short range communication interface comprising an near field communication chip and a long range communication interface comprising a Bluetooth LE chip.
  • a remote device 40 comprises a wireless access point or controller 40 which is also Bluetooth LE enabled for receiving long range Bluetooth LE communications.
  • Local device 20 is a passive token 20 and is located in the vicinity of an appliance or system which the user of the smartphone 30 may wish to operate or control. Prior to the token 20 being placed in the vicinity of the appliance/system, it is registered as part of the system 10 for implementing a control or access function as follows.
  • the token 20 is presented to a reader at the server that controls the system, which in the Figure 1 embodiment is the access point 40, but could for example be a remote server with which the access point 40 communications (such as server 40c as shown in Figure 3 ).
  • the server 40 recognises the token 20 and associates it with the appliance/system near to which it will soon be placed.
  • the functionality that is required when the token 20 is used is selected at the server.
  • a token 20 is associated with a lockable door 52 and the functionality required is for the door 52 to be locked or unlocked.
  • the mobile device 30 to be used in conjunction with tokens 20, such as the smartphone 30, must be registered with the system for implementing a control or access function.
  • a credential can be issued to the smartphone 30 as follows. At the server 40 or any appropriately connected computer or the like, a user record is identified in the software. To register the smartphone 30 a credential is added, the credential being selected as 'NFC' type. An identifying address of the user of the smartphone 30 is entered, such as an e-mail address or a/the mobile phone 30 number and then the software sends a unique identifier and a link to the appropriate app to the user (via SMS or e-mail, e.g.).
  • the user can then download the appropriate app to the smartphone 30 and enter the unique identifier into the app when it is first run on the smartphone 30.
  • the app confirms whether the unique identifier has been previously registered with the system and if not, the smartphone 30 is enabled for use with the system.
  • the user interacts with the system via the registered smartphone 30 by bringing the smartphone 30 within range of a passive token 20 (i.e. by placing the smartphone 30 in contact with or very close to (within a few cms) the token 20).
  • An identifier of the token 20 is transmitted via an NFC-protocol communication 22 to the smartphone 30.
  • power for the transmission is provided by the smartphone 30 by inductive coupling.
  • the app on the smartphone 30 takes the identifier of the token 20 and transmits it, along with a smartphone identifier (which may be a user ID, the credential created when the smartphone 30 is first registered, its phone number, an e-mail address, etc.) to the access point 40 via a long range communication 32, which in this embodiment is a Bluetooth LE communication.
  • the transmission can be encrypted by the app prior to transmission for increased security.
  • the access point 40 recognises the smartphone 30 and also the token 20 and its associated appliance/system, from the transmitted local identifier.
  • the access point 40 can therefore immediately operate or control the appliance/system associated with the token 20 from the single long range communication 32.
  • FIG. 2 a typical office environment 60 is schematically illustrated.
  • the office 60 has an entry point which is closed by an electrically locked door 52.
  • a lighting system 58 and a computer 54 which is connected to a power supply 56. All of these appliances and systems are connected via a power bus 44 or other suitable system to a remote device 40 which is located in a server room some distance away from the office 60 and in a secure area that is inaccessible to a user of the office 60.
  • a user wishing to enter the office 60 approaches the door 52 and needs only to place their registered smartphone 30 within close proximity of the door token 20a (preferably by touching it against the token 20a for an NFC communication).
  • the token 20a transmits its local identifier to the smartphone 30 via, e.g.
  • NFC which transmits the local identifier and its own mobile identifier to the remote device 40, e.g. via Bluetooth LE.
  • the remote device 40 recognises that the user has interacted with the door token 20a, by virtue of the local identifier and recognises that the smartphone 30 is registered, via the mobile identifier and performs an action via connection 44a to unlock the door 52 so the user can gain access to the office 60.
  • the user may wish to switch on the lighting system 58 once inside the office 60. This is achieved by holding the smartphone 30 close to one of the lighting tokens 20b located at various positions in the office 60 to instruct the remote device 40 to operate the lighting system 58 via connection 44b.
  • the lighting tokens 20b may each have a unique identifier or each lighting token 20b may have the same identifier as another lighting token 20b (but that differs to all other tokens 20, such as the door token 20a and power token 20c). Whilst in this embodiment the user turns on the lighting system 58 if lighting is required, it is within the scope of the invention for the lighting system 58 to additionally or alternatively be operated by the remote device 40 in response to, for example, other actions of the user.
  • the remote device 40 could automatically turn on the lighting system 58 in response to the user interacting with the door token 20a, because it is assumed that by opening the door 52, the user wants to access the office 60 and the lighting system 58 will therefore need operating. This could be done only at certain times if desired, for example after a certain time in the evening when the office 60 might become dark.
  • the remote device 40 can also deactivate the lighting system 58 even if the user does not interact with a lighting token 20b.
  • the remote device 40 might determine that, in the absence of any other interactions of the user's smartphone 30 with any token 20 in the office 60 after a certain time period, the user has in all probability left the office 60 and therefore the lights should be turned off.
  • the remote device 40 might transmit a long range signal requesting a response from the smartphone 30 to check whether the smartphone 30 is still in the office 60. If there is no response, the lighting system 58 can be switched off.
  • a computer 54 which is powered from a power socket 56 which is connected to the remote device 40.
  • the smartphone 30 can be touched to or placed very near to the computer token 20c that is stuck on the side of the computer 54.
  • the computer token 20c transmits its identifier to the smartphone 30 so that the remote device 40 can switch on the power to socket 56 via connection 44c. It may be that the user is only permitted to use the computer 54 for a period of time, e.g. for one hour.
  • the remote device 40 can determine this based on either the mobile identifier transmitted from the smartphone 30 and/or from the data in its database. In such a scenario, the remote device 40 can automatically switch of the computer 54 after the time has elapsed.
  • Figure 3 schematically illustrates a similar system to the figure 2 arrangement but in this scenario more than one remote device is provided because the local office is part of a large environment having multiple controllers and/or access points, etc.
  • a door 52 permits entry to one specific area and has an electric locking mechanism as before.
  • a smartphone 30 is presented to a door token 20 as in other examples and transmits its identifier via a short range communication 22 to the smartphone 30.
  • the local identifier and an identifier of the smartphone 30 are transmitted via a long range communication 32 to a remote device 40a that is within the long range.
  • remote device 40a is not the controlling device/server of the system, which is instead controller 40c.
  • the remote device 40a that communicates with the smartphone 30 transmits onwards the long range communication 42a to a network 43 (which may, for example be a local area network, or a wide area network or the Internet, etc.).
  • the network transmits the communication 43a onwards to another device 40b of the system which is in long range communication 42b with the controller 40c of the system.
  • the controller 40c on receiving the long range communication 42b recognises the token 20 and the smartphone 30 and operates the door 52 via connection 44 to enable the user to enter the building through door 52.
  • Figure 4 schematically illustrates a similar system to the Figure 3 arrangement, but the remote device 40 that is within long range communication of the token 20 (and thus the mobile device 30) is the system controller.
  • the smartphone 30 is placed close to the token 20 as before to receive the local identifier via a short range communication 22 and transmits the local identifier and its mobile identifier to the remote device 40 via a long range communication 32a.
  • the controller 40 recognises the local identifier and the smartphone 30 and determines an extra security step is required before the door 52 can be opened.
  • the controller 40 sends a command 42 back to the smartphone 30 and the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to the controller 40 for further authentication and if the input is authenticated, the controller 40 operates the door 52 via the connection 44.
  • an input such as a PIN, another code, a set of movements, facial recognition or any other identifier or code.
  • FIG. 5 illustrates a system 10 for implementing a control or access function in accordance with an alternative embodiment of the present invention.
  • a mobile device 30' which in this illustration is a smartphone 30', has a communication interface comprising a Bluetooth LE chip that provides both a short range communication interface and long range communication interface.
  • a remote device 40 comprises a wireless access point or controller 40 which is also Bluetooth LE-enabled for receiving long range Bluetooth LE communications.
  • Local device 20' is a communication device 20' provided with Bluetooth LE chip that provides both a short range communication interface when operating in low-power "Whisper Mode" and long range communication interface when operating in a normal-power mode.
  • Local device 20' is located in the vicinity of an appliance or system which the user of the smartphone 30' may wish to operate or control.
  • Local device 20' is registered as part of the system 10 for implementing a control or access function.
  • the remote device 40 is provided with details for the local device 20' and associates it with the appliance/system near to which it is located. The functionality that is required when the local device 20' is used is selected at the remote device 40.
  • a local device 20' is associated with a lockable door 52 and therefore the functionality required is for the door 52 to be locked or unlocked.
  • the local device 20' is taken to appliance/system and placed in an appropriate location.
  • the local device 20' is affixed (e.g. glued or otherwise stuck) next to the door 52.
  • the system will be functional.
  • the mobile device 30' to be used in conjunction with local devices 20' must be registered with the system for implementing a control or access function.
  • a credential can be issued to the smartphone 30' as follows.
  • a user record is identified in the software.
  • a credential is added, the credential being selected as a Bluetooth Low Energy or 'BLE' type.
  • An identifying address of the user of the smartphone 30' is entered, such as an e-mail address or a/the mobile phone 30' number and then the software sends a unique identifier and a link to the appropriate app to the user (via SMS or e-mail, e.g.).
  • the user can then download the appropriate app to the smartphone 30' and enter the unique identifier into the app when it is first run on the smartphone 30'.
  • the app confirms whether the unique identifier has been previously registered with the system and if not, the smartphone 30' is enabled for use with the system.
  • the user interacts with the system via the registered smartphone 30' by bringing the smartphone 30' within range of a local device 20' (i.e. by placing the smartphone 30' in contact with or very close to (within a few cms) the local device 20').
  • An identifier of the mobile device 30' is transmitted via an Bluetooth LE communication 22' to the local device 20'.
  • the local device 20' is operating in a power saving mode, with only Bluetooth LE 'Whisper Mode' active, thereby reducing the range within which it can communicate with the mobile device 30'.
  • the local device 20' takes the identifier of the mobile device 30' (which may be a user ID, the credential created when the smartphone 30' is first registered, its phone number, an e-mail address, etc.) and powers up to operate in a higher-power or normal-power Bluetooth LE mode and then transmits the mobile identifier, along with a local identifier, to the remote device 40 via a long range communication 32', which in this embodiment is a higher-power or normal-power Bluetooth LE communication.
  • the transmission can be encrypted by either or both of the mobile 30' and local 20' device(s) prior to transmission for increased security.
  • the remote device 40 recognises the identifiers associated with the smartphone 30' and also the local device 20' and its associated appliance/system, from the transmitted identifiers.
  • the remote device 40 can therefore immediately operate or control the appliance/system associated with the local device 20' from the single long range communication 32'.
  • the above-described local devices 20' can be substituted for the tokens 20a and 20b to enable a user wishing to enter the office 60 using their registered smartphone 30' and to enable the user to switch on the lighting system 58 once inside the office 60 using their smartphone 30'.
  • the computer 54 can be similarly activated using the smartphone 30' touched to or placed very near to the computer token 20c, in this alternative embodiment substituted for a local device 20', that is stuck on the side of the computer 54.
  • Figure 6 schematically illustrates a similar system to the alternative Figure 2 arrangement described above but in this scenario more than one remote device 40a, 40b, 40c is provided because the local office is part of a large environment having multiple controllers and/or access points, etc.
  • a door 52 permits entry to one specific area and has an electric locking mechanism as before.
  • a smartphone 30' is presented to a local device 20' as in other examples and transmits its mobile identifier via a short range communication 22' to the local device 20'.
  • the local identifier of the local device 20' and mobile identifier of the smartphone 30' are transmitted by the local device 20' via a long range communication 32 to a remote device 40a that is within the long range.
  • remote device 40a is not the controlling device/server of the system, which is instead controller 40c.
  • the remote device 40a that communicates with the local device 20' transmits onwards the long range communication 42a to a network 43 (which may, for example be a local area network, or a wide area network or the Internet, etc.).
  • the network transmits the communication 43a onwards to another device 40b of the system which is in long range communication 42b with the controller 40c of the system.
  • the controller 40c on receiving the long range communication 42b recognises the local device 20' and the smartphone 30' and operates the door 52 via connection 44 to enable the user to enter the building through door 52.
  • Figure 7 schematically illustrates a similar system to the Figure 6 arrangement, but the remote device 40 that is within long range communication of the local device 20' (and thus the mobile device 30') is the system controller.
  • the smartphone 30' is placed close to the local device 20' as before to receive the mobile identifier via a short range communication 22' and transmits the local identifier and mobile identifier to the remote device 40 via a long range communication 32a.
  • the controller 40 recognises the local identifier and the mobile identifier and determines an extra security step is required before the door 52 can be opened.
  • the controller 40 sends a command 42 back to the smartphone 30' via a suitable long range communication protocol, in this example also Bluetooth LE but could be Wi-Fi or a cellular data network for example, and the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to the controller 40 for further authentication and if the input is authenticated, the controller 40 operates the door 52 via the connection 44.
  • a suitable long range communication protocol in this example also Bluetooth LE but could be Wi-Fi or a cellular data network for example
  • the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to the controller 40 for further authentication and if the input is authenticated, the controller 40 operates the
  • systems and methods for intelligently managing control and access functions in which a user does not need to carry a dedicated control or access device and are therefore convenient, in which a low-power battery-powered local device can be used instead of mains-powered devices so that significant energy is conserved or in which a wireless local device can be used so that data cabling need not be installed to connect the local device to a remote device and the installation of the tokens is greatly simplified compared with the need to wire in and power conventional local devices.
  • the systems and methods enable a user to be securely identified and granted control or access where appropriate by identifying the user and the appliance, system or device where the user is located and triggering an appropriate event at the locality of the user if access or control should be granted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system (10) for implementing a control or access function is described. The system (10) comprises a mobile device (30) having a mobile identifier, a short range communication interface and a long range communication interface. The system (10) also comprises a local device (20) having a local identifier. The system (10) also comprises a remote device (40) comprising a long range communication interface and a controller. The mobile device (30) is configured for short range communication (22) with the local device (20) for receiving the local identifier, and the remote device (40) is configured for long range communication (32) with the mobile device (30) for receiving a communication comprising at least the local identifier and the mobile identifier. The controller of the remote device (40) is configured to perform at least one control or access action in response to receiving the communication from the mobile device (30). A controller for implementing a control or access function is also described. Methods of implementing a control or access function and of providing a system (10) for implementing a control or access function are also described, as are methods of registering a mobile device (30) for use with a system (10) for implementing a control or access function, and of implementing a control or access function with a mobile device (30) having a mobile identifier and comprising a short range communication interface and a long range communication interface

Description

  • The present invention relates to methods and systems for implementing or managing control or access functions, particularly via short range wireless communication with a local device or system associated with a control or access function.
  • The use of wireless communication systems is widespread and such systems have many applications, including but not limited to tracking, identification or tagging, access control, payment, etc. Secure access systems are widely used to ensure only authorised personnel are permitted entry to a building or area, allowing an employee to enter their office but not an unauthorised person, for example. Authentication is typically achieved by use of a short range wireless communications module such as an RFID (Radio Frequency Identification) tag being presented at close range to a reader located near an entry point to a secure area. The reader, or associated local control unit, may contain the necessary information to authenticate the tag or, in many cases, will be connected to a central authentication unit, and if the person is authorised to enter the secure area, the associated door will be unlocked or opened.
  • Secure access systems commonly have more than one entry point, thus requiring a number of readers. If the authentication information is stored in the reader, or associated local control unit, as a result a system having multiple readers can be expensive and requires each reader to be updated separately with any new or changed information. Alternatively, if the readers communicate with a central authentication unit, significant costs and effort are required to install the wires or cables required to connect each reader to the central unit. In any event, the installation of the readers requires each reader to be provided with a power connection irrespective of whether a data communication connection is required so the installation of such systems is expensive and not straightforward.
  • The present invention seeks to provide systems and methods for implementing or managing control or access functions that are convenient for the user and that are simple to install, modify and update. The present invention also seeks to provide versatile and adaptable systems that are capable of many different functions.
  • According to a first aspect of the present invention, there is provided a communication device having a low-power mode and a higher-power mode for implementing a control or access function, comprising: a short range wireless communication interface; a long range wireless communication interface; a local identifier stored therein; wherein in the low-power mode the communication device is operable to receive a mobile identifier from a mobile device over the short range wireless communication interface and upon receiving the mobile identifier the higher-power mode is enabled; in the higher-power mode the communication device is operable to communicate over the long range wireless communication interface with a remote device having a controller; wherein the communication device is configured to send the local identifier and the received mobile identifier to the remote device; and wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the local identifier and the mobile identifier.
  • The present invention provides a communication device that can be used as an access or control device. For example the communication device can be used as an access control reader that can be provided beside an access-controlled door or other device to be controlled. To conserve power, the communication device is provided with two power modes: a low power mode, for example the BLE "Whisper Mode", enabling short range communications; and a higher- or normal-power mode enabling longer-range communications. The communication device can communicate both with a mobile device (via a short range wireless communication, for example via Bluetooth Low Energy (BLE) operating in a low-power "Whisper Mode" or Near Field Communications (NFC) which can operate passively) and with a remote device via a long range wireless communication (for example via Bluetooth Low Energy (BLE) connection operating in a higher-power or normal-power mode or Wi-Fi). While waiting for a mobile device to move into range and transmit a mobile identifier to the communication device, the communication device can conserve power by not operating in a higher- or normal-power mode constantly or for long periods of time. When a mobile identifier is received, the communication device engages the higher- or normal-power mode to enable the long range wireless communications required to communicate with the remote device. This provides a communication device that can use available power sources or a battery due to low-power consumption requirements and no requirement for a wired connection to a data infrastructure as it communicates wirelessly, making it suitable for locations to which it would be uneconomic or difficult to provide data cabling and/or power cabling. This is advantageous because each communication device can be placed in the location that is most suited to its purpose and there is a reduced constraint imposed on locating devices due to wiring requirements.
  • According to a second aspect of the invention, there is provided a method of implementing a control or access function in a communication device having a low-power mode and a higher-power mode comprising the steps of: receiving at the communication device while the communication device is operating in a low-power mode a short range wireless communication from a mobile device, the short range wireless communication comprising at least a mobile identifier associated with the mobile device; enabling a higher-power mode of the communication device on receipt of the mobile identifier; transmitting from the communication device a long range wireless communication to a remote device while the communication device is operating in a normal-power mode, the long range wireless communication comprising at least the mobile identifier and a local identifier associated with the communication device; wherein the remote device is operable to receive and process the long range wireless communication in order to perform at least one control or access action based on the information obtained from processing of the long range wireless communication.
  • Preferably, the short range wireless communication interface and the long range wireless communication interface of the communication device are comprised of one and the same communication interface, preferably operating in different modes. The use of a single communication interface by the communication device reduces device hardware complexity and power usage as only one transceiver and antenna can be used to perform both short and long range communications using different modes.
  • Preferably, the communication device returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device to the remote device via the long range communication interface. By returning to a low-power mode after transmitting the identifiers, the communication device can reduce or minimise power consumption.
  • Preferably, the communication device is operable to communicate substantially within a range of approximately 30cm in the low-power mode. When operating in a low-power mode, thus reducing or minimising power consumption, the range of communication using a wireless communication interface is restricted. As a result of the range of the communication being restricted, the communication device will operate to detect only mobile devices within a short range of approximately 30cm. This limited range is useful for verifying that the mobile device as it is only possible to communicate with a mobile device that is definitely near the communication device, i.e. within 30cm of the communication device. This also reduces the likelihood that, when a mobile device is detected, a user intends to present to the mobile device to the communication device to trigger an access or control function.
  • Preferably, the communication device is operable to communicate substantially within a range of 30m in the higher-power mode. When operating in higher-power or normal-power mode, the communication device needs to be able to communicate with a remote device usually not located in the vicinity of the communication device but usually located within a range of 30m of the communication device. Alternatively, there may be provided one or more intermediate nodes using the long-range communication protocol enabling the communication device and remote device to communicate via the intermediate nodes.
  • Preferably, the communication device further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device. Some systems are likely to operate a hybrid arrangement where existing identification tokens are still used by one or more users and thus the communication device can support both legacy active or passive identification tokens using the second short range communication interface and also user mobile devices using the (first) short range communications interface.
  • Preferably, the second short range wireless communication interface is NFC. NFC provides a protocol that allows the use of passive tokens by users and is supported by most manufacturers of such tokens.
  • Preferably, the communication device further comprises a battery and the communication device is powered by the battery. Further preferably, the battery is a coin battery. The communication device is designed to reduce or minimise power consumption and due to this reduced or minimised power the use of a battery, preferably a coin battery, is possible to provide power to the device for a useful amount of time without requiring the battery to be regularly replaced or charged.
  • Preferably, the communication device further comprises a proximity sensor configured to activate the low-power mode of the communication device and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device. Through the use of a proximity sensor, the communication device can operate with no power being provided to the communications interfaces until the proximity sensor detects that a user is nearby the communication device.
  • Alternatively, the communication device can further comprise a proximity sensor configured to trigger the communication device to request a mobile identifier from the mobile device via the short range wireless communications interface and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device. Through the use of a proximity sensor, the communication device can only accept receipt of mobile identifiers in response to a request sent in response to the proximity sensor verifying that the user or mobile device is near the communication device and that the user is performing an action such as waving a hand or a mobile device near the communication device that indicates that the user is requesting an access or control function to be performed by the communication device. In this alternative, the proximity sensor can also power up one or both communication interfaces as well.
  • Preferably, the communication device begins communications with the mobile device over the short range wireless communication interface by requesting the mobile identifier from the mobile device. By requesting the mobile identifier from the mobile device, the mobile device can confirm that it is near the communication device thus removing the need to broadcast or otherwise determine when to communicate the mobile identifier.
  • Preferably, the mobile identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier. The use of an existing identifier such as a MAC address or a Bluetooth MAC address for example enables the re-use of an integral and unique feature of a mobile device while the use of a dedicated identifier or QR code allows a user to store such an identifier on their mobile device to add the functionality required for the access or control system.
  • Preferably, the communication device also receives a unique identifier in addition to the mobile identifier from the mobile device and sends the received unique identifier to the remote device using the long range wireless communication interface along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier. It may be necessary to send both a mobile identifier and a unique identifier from a mobile device to the communication device, for instance the user can have an identifier associated with that user while the mobile device can have an identifier associated with that mobile device enabling both the user to be verified and the mobile device to be verified. Alternatively, the user may have two identifiers associated with them, for instance a personal identifier and a team identifier or the mobile device may have two identifiers associated with it to verify an identifier associated with the mobile device hardware as well as a software provided identifier. The use of a unique identifier allows more flexibility in verification of the combination of user, mobile device and communication device for access or control purposes.
  • Preferably, the controller of the remote device is further configured to request the mobile device to make a connection using a third long range protocol to verify that the mobile device is within the proximity of the communication device, preferably requesting location data from the mobile device to be transmitted to the remote device wherein the location data can be a GPS location. As a further verification that the user's mobile device is in the proximity of the communication device, a direct connection can be established with the mobile device by the remote device to verify that the mobile device is near the communication device, preferably using GPS location data to verify the mobile device location. Preferably the location of the communication device is predetermined and stored by the remote device in order to enable the remote device to assess whether the location data provided by the mobile device is within a predetermined range of the communication device, preferably further taking into account a tolerance for incorrect location data reporting. As an alternative, the mobile device and remote device can communicate indirectly via the communication device.
  • Preferably, the third long range protocol is Wi-Fi. As Wi-Fi networks are extremely common in most situations where an access or control system is installed, for example an office or factory, the use of an existing Wi-Fi network to which a mobile device may be connected enables an alternative path to connect the remote device directly to the mobile device to perform verification or data exchange as required for the access or control system.
  • Preferably, the communication device has a medium-power mode that is used to communicate with the mobile device over the short range wireless communication interface when the communication device receives the mobile identifier from the mobile device. Where a medium-power mode is used, the range of the communication interface is usually increased in comparison to the range possible in a low-power mode, thus use of a medium-power mode can enable either faster or more efficient or longer range communication between a mobile device and a communication device.
  • Preferably, the controller of the remote device is operable to send a security query to the mobile device, the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device or via the communication device, any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation. Where further verification of a user is required, to ensure that an unauthorised user is not simply using an authorised device to gain access or control in place of an authorised user, the remote device can communicate either directly or indirectly with the mobile device to perform a further verification step such as requiring the user to correctly answer a security query.
  • Preferably, the system comprises: a communication device; one or more mobile devices; the remote device comprising a long range wireless communication interface and a controller; wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the communication device. The system can support more than one mobile device, each associated either with a specific user or group of users or a pool of mobile devices to be used by a group of users or single user.
  • Preferably, the mobile device comprises a mobile communications device, preferably a smartphone, tablet or the like. The use of existing user hardware such as smartphones or tablets means that dedicated identity tokens are not required for each user and a more flexible solution is possible.
  • Preferably, the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is preferably a BLE-enabled smartphone. The use of the BLE protocol allows the communication device to operate efficiently in terms of power use and provides a well-supported communication means that many mobile devices support, enabling the access or control system to be supported using existing mobile devices.
  • Preferably, the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is preferably BLE-enabled. The use of the BLE protocol allows the communication device to operate efficiently in terms of power use and provides a communication means that has sufficient range to enable communication between a remote device and communication device.
  • An alternative aspect of the present invention provides a system for implementing a control or access function, the system comprising a mobile device having a mobile identifier stored therein and comprising a short range communication interface and a long range communication interface, a local device having a local identifier stored therein, and a remote device comprising a long range communication interface and a controller, wherein the mobile device is configured for short range communication with the local device for receiving the local identifier, the remote device is configured for long range communication with the mobile device for receiving a communication comprising at least the local identifier and the mobile identifier, and the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the mobile device.
  • This alternative aspect of the present invention provides a system in which a mobile device communicates both with a local device via short range wireless communication and with a remote device via a long range communication. Therefore the remote device does not need to communicate with the local device directly, which is advantageous because it then follows that the local device does not require the significant amount of power that would otherwise be needed for long range communication directly with the remote device. The mobile device has its own mobile identifier and is provided with a local identifier that identifies the local device, both of which the mobile device can transmit to a remote device and the remote device is therefore provided with enough information so that an appropriate control or access action can be performed, the action being relevant to the local device that has been identified via the mobile device. Advantageously, wires or cables are not required to connect each local device to the remote device or the mobile device. Therefore this aspect provides a system that is simple to install and cost effective yet is reliable and enables local control and access to be implemented from a remote location.
  • In all aspects, the local device, mobile device or communication device may be provided with additional wireless communication capabilities in order to support any suitable legacy device that is capable of storing an identifier and that is responsive to short range communication. For example, the local device may be an active device, such as an active token, that comprises an internal power source for powering short range transmission of at least the local identifier to another device. The power source may, for example, be an external power supply or a low power internal battery. Alternatively, for example, the local device may be passive and therefore requires no internal power source. For example the local device may comprise a passive token. Examples of suitable passive tokens are MIFARE tokens, such as the MIFARE UltraLight range of tokens. Passive tokens can be small and lightweight and inexpensive to manufacture, enabling a number of tokens to be installed in an area without significant expense. Furthermore with no power source required, the tokens can easily be installed simply by affixing the token (with adhesive or mechanical fixing means for example) to a suitable location or object with no wiring required and the token does not need to be removable to enable an internal battery to be replaced. This is advantageous because each token can be placed securely in the location that is most suited to its purpose and there is no constraint due to wiring requirements or the need to have the token be removable that might otherwise cause the token to be located in a less than ideal location. Passive tokens are powered by interaction with another device, for example with the mobile device inductively coupling or otherwise providing power to the passive token to enable the token to release information.
  • In the alternative aspect, the local devicehas an identifier stored therein. The identifier comprises information of any type that identifies either the specific device (i.e. the local identifier is unique to that token) or may identify a group or set of devices. For example the local identifier is a passive token and may identify the token as being one of a set of tokens that are associated with one or more common systems, or groups of users, as discussed further below. The mobile device may be configured to provide power to the local device when the mobile device is brought into contact or into close proximity with the local device, to enable the local device to release the local identifier to the mobile device. In other aspects, the communication device has an identifier stored therein and in this and other aspects the mobile device can, alternatively or additionally, have an identifier stored therein.
  • The mobile device comprises any suitable device which can be transported to different locations so that it can communicate via short range wireless transmissions with other devices with which the mobile device comes into range. The mobile device can be a dedicated device such as an RFID card equipped additionally with a long range communication interface. The mobile device can, for example, be an active token provided with a short range interface and a long range interface and a power supply, such as a coin cell battery or the like. Alternatively the mobile device may be an existing device, e.g. a computer, such as a laptop or other portable device, or may be a personal digital organiser (PDA), or a tablet device or a mobile phone, such as a smartphone. Therefore the user of the mobile device does not require a separate or dedicated device to be able to control or access functions of a system and instead can use their existing mobile device.
  • In the aspects above, the mobile device can comprise a short range communication interface which may comprise any suitable short range interface such as, for example, a Bluetooth Low Energy (BLE) interface when operating in a low-power "Whisper Mode", a near field communications (NFC) interface or any other short range, radio frequency (RF) interface such as an RFID interface. The mobile device may be a BLE-enabled or an NFC-enabled smartphone. The conventional way of adopting NFC is by way of the phone emulating a token or credential. For such conventional systems to be secure, the mobile phone, its SIM card, or both, must have a secure element against which secure data can be verified. In addition, a trusted service provider (TSP) must perform online verification of the NFC. Compatibility issues with phone manufacturers and SIM card providers makes such systems difficult and complex to implement whereas the present system is advantageous because it enables compatibility with any NFC-enabled phone without the above complications present with emulating a token or credential.
  • The mobile device comprises a long range communication interface which may comprise any suitable long range interface such as, for example, a Bluetooth (e.g. Bluetooth or Bluetooth LE) interface, or a Wi-Fi interface, etc. The mobile device may be a Bluetooth-enabled smartphone.
  • References throughout the specification to "short range" and "long range" communications, interfaces, etc., are intended to distinguish between localised communication and communication with another device that is remote from the local device. In particular, short range communication is intended to describe systems which require either contact between the two communicating devices or at least for the interfaces of the two communicating devices to be in close proximity with each other, i.e. to be separated from each other by no more than about 0.3m, preferably by no more than about 0.2m or preferably by no more than about 0.1m. As discussed above, NFC, Bluetooth Low Energy (BLE) when operating in a low-power "Whisper Mode" and RFID communications are considered to be short range communications according to embodiments of the present invention. Long range communication is intended to describe systems which typically do not require contact between the two communicating devices nor for the interfaces of the two communicating devices to be in close proximity with each other. Long range communications in accordance with embodiments of the present invention are communications that typically occur over a distance of one or more metres, such as over about 1m or preferably over a range of about 0.5 to 500m, preferably over a range of about 1 to 200m, preferably over a range of about 10 to 100m. As discussed above, Bluetooth, Bluetooth Low Energy (BLE) when operating in a normal-power mode (i.e not operating in a low-power "Whisper Mode") and Wi-Fi communications are considered to be long range communications according to embodiments of the present invention, as are communications over the mobile/cellular/3G/4G/mobile broadband, etc., networks.
  • The remote device can be any suitable device which can receive long range wireless communications from a mobile device or communication device and that can control one or more control or access functions of a system. For example, the remote device may comprise a wireless router or access point that may also be connected either wirelessly and/or via wired connections to one or more devices, appliances, systems, etc. The devices, appliances, systems, etc., which the remote device controls may be related by one or more common features. For example, the devices, appliances, systems, etc., may all be located in the same or in related areas of, for example, a building, e.g. inside an office or an office floor plate of a business premises. In such an example, the systems may comprise the building/office access systems (e.g. controlling the door locking mechanisms), the lighting systems, the communications systems, the heating and/or cooling systems, etc. The devices or appliances may comprise power sockets, lighting units, heating units, computers or other IT equipment, audio and/or video equipment, etc. Thus the remote device can advantageously control any one or more of the electronic devices, appliances and systems in an office (or indeed any other) environment in response to receiving a long range communication from a mobile device or communication device that is located in the environment.
  • The above examples are particularly advantageous when combined with passive tokens as discussed above or with the communication devices of the first aspect of the present invention. For example, in an office environment as described above, a token or communication device can be located (e.g. adhered or otherwise affixed) where a light switch would typically be located. A user entering the office can place their smartphone in close proximity to the token or communication device in order to control the lighting system via the remote device to switch on the lights. More than one token or communication device may be located about the office environment to enable the lighting system to be operated from a number of different locations. Advantageously, tokens or communication devices can additionally or alternatively be placed in locations where a light switch may not normally be located (typically due to wiring/cost constraints), such as on a wall next to where an office user sits when at their desk. Tokens or communication devices can also be used to enable the user to gain access to the office environment. For example, a token or communication device can be affixed near to any door that permits access to the environment. A user wishing to enter the office can place their smartphone in close proximity to the token or communication device in order to control the locking mechanism of the door, causing the door at least to be unlocked and also may be opened by the remote device. Any other appliances, systems, devices, etc., in the office can also likewise be controlled by appropriate placement of a token or communication device nearby or on the item and a controlling connection with the remote device. Further examples of such applications are discussed in detail below wherein the token or communication devices can be interchanged or combined.
  • The remote device receives a long range communication from a mobile device or communication device and performs an access or control function accordingly, as discussed above. In some instances, however, it may be desirable for the remote device to perform another control or access action. The controller of the remote device therefore may be configured to perform at least one further control or access action in the absence of the remote device receiving a further communication from the mobile device or communication device, for example in the absence of the remote device receiving a further communication from the mobile device or communication device within a time period. This is advantageous in that if, for example, the user leaves the area where the local device or communication device is located without deactivating the system which the remote device has switched on, then the remote device further controls the system to switch it off again, even without a specific command.
  • In the example of an office environment in which one or more tokens is located to enable activation of a lighting system via a mobile device, then if the user leaves the office, the remote device can switch off the lights even without the user bringing their mobile device within short range of a token. The token can be a local device or a communication device. Switching off the lights could be done automatically, for example, after an elapsed time period. Alternatively, after an elapsed period of time the remote device could send a long range communication to the mobile device or communication device and in the absence of a response from the device (thus indicating that the user is no longer in the environment), the remote device can then deactivate the system (e.g. switch off the lights).
  • Alternatively or additionally, the remote device can determine whether to perform a further control or access action in response to a different communication from the mobile device or one or more communication devices. For example, if the mobile device or a communication device sends a communication to the remote device to switch on the lighting system, but then the remote device receives a further communication from the mobile device or from the same or another communication to operate the door locking mechanism, the remote device can also operate the lighting system to switch off the lights as operation of the door locking mechanism suggests that the user is leaving the environment. Many different combinations of communications from the mobile device and/or communication device are possible and can inform the remote device of the user's activity and requirements even without the user needing to present their mobile device to a particular local device or communication device.
  • The controller of the remote device can be configured to perform at least one control or access action in response to receiving the communication from the mobile device or communication and can do so in any suitable manner. The controller of the remote device may transmit a control signal to control at least one device or system located in the vicinity of the local device or communication device, and/or may transmit, via the long range wireless communication interface of the remote device, at least one of information and a command to the mobile device. The controller may store information related to the mobile device and/or the local device or communication device in a memory of the remote device. When the remote device transmits a long range communication comprising information and/or a command to the mobile device, this may cause information to be displayed on the mobile device and/or may require a user to input information into the mobile device. For example for implementing an access function to enable a person to enter an office environment, the user places their mobile device in the vicinity of the token located near the door as discussed above. In response to the long range wireless communication from the mobile device or communication device, the remote device transmits back a long range wireless communication causing an image to be displayed on the mobile device. The user is required to interact with the display (e.g. to touch certain parts of the display to authenticate their request for access) and in response a further long range wireless communication is transmitted to the remote device, which can then control operation of the access function to enable the user to enter the environment if they are entitled to do so.
  • As stated above, the controller of the remote device can be configured to perform at least one control or access action in response to receiving the communication from the mobile device. However, although the controller of the remote device can be configured to perform at least one control or access action, it may be that no control or access action is necessary in some scenarios and thus no control or access action is actually performed. For example, if an unrecognised mobile device is brought within range of the local device or communication device and if the remote device receives a communication comprising the local identifier and/or a mobile identifier, it may be determined that the mobile device is unrecognised and that no control or access action should be performed. In another scenario, the local device may be unrecognised, for example if a mobile device is brought within range of a local device that is part of another system. If the remote device receives a communication comprising the local identifier and a mobile identifier, it may be determined that the local device is unrecognised and that no control or access action should be performed.
  • As discussed above, the controller of the remote device may be configured to transmit a control signal to a device or system in the vicinity of the local device or communication device to switch on and/or to switch off the device or system. The device or system in the vicinity of the local device or communication device may comprise at least one of a locking mechanism for a door, the door preventing access to at least one area when locked by the locking mechanism, a lighting system for lighting the area in which the local device or communication device is located, a heating and/or cooling system for heating and/or cooling the environment in the vicinity of the local device or communication device, at least one power source for enabling power to be provided to devices and systems located in the vicinity of the local device or communication device, a communications device or system for enabling two-way communication with at least one remote communications device or system, an audio and/or video device or system for providing audio and/or video output to the area in the vicinity of the local device or communication device, and any other powered device or system located in the vicinity of the local device or communication device. Thus a remote device is provided that is ideally suited to controlling an environment such as an office or the like.
  • In the alternative aspect, the local identifier that is released to the mobile device may be encrypted for enhanced security. However for some local devices, particularly for passive tokens, the identifier is simply released in response to a short range wireless communication and is not encrypted by the local device for transmission. For short range local devices such as passive tokens, this is not much of a security risk because any other device that wanted to intercept the identifier would need to be within the short range of the local device (typically within about 10cm of the device, e.g.), which would likely be apparent to the genuine user. Nevertheless, the mobile device subsequently transmits the local identifier (and indeed its own mobile identifier) over a long range wireless communication to the remote device, which may be more susceptible to interception. Therefore the mobile device may further comprise a processor configured for processing the local identifier received from a local device such that the communication transmitted to the remote device comprises the processed local identifier. The processor may be configured for encrypting the local identifier. Therefore even if the local identifier received by the mobile device is unencrypted, the mobile device can encrypt the information before transmitting it for reception by the remote device, protecting the more risky transmission over the longer range. In other aspects, one or more of the communications and/or identifiers may be encrypted in a similar manner.
  • As discussed above, systems in accordance with the present invention advantageously provide the means to implement a control or access function at a local device or communication device using a mobile device or communication device to transmit the necessary communications via its short range and long range interfaces.
  • From a further broad aspect, according to the present invention there is provided a method of implementing a control or access function comprising receiving at a mobile device a short range communication from a local device having a local identifier stored in a memory thereof, the short range wireless communication comprising at least the local identifier, transmitting from the mobile device a long range wireless communication to a remote device, the long range wireless communication comprising at least the local identifier and a mobile identifier stored in a memory of the mobile device, receiving and processing the long range wireless communication at the remote device, and performing at least one control or access action based on the information obtained from processing of the long range communication.
  • In an alternative broad aspect, according to the present invention there is provided a method of implementing a control or access function comprising receiving at a communication device a short range communication from a mobile device having a mobile identifier stored in a memory thereof, the short range wireless communication comprising at least the mobile identifier, transmitting from the communication device a long range wireless communication to a remote device, the long range wireless communication comprising at least the mobile identifier and a local identifier stored in a memory of the communication device, receiving and processing the long range wireless communication at the remote device, and performing at least one control or access action based on the information obtained from processing of the long range communication.
  • The method is advantageous because a control or access function can be implemented in any existing devices that are capable of receiving and/or transmitting the wireless communications as set forth in the above method, enabling such a function to be implemented without significant installation costs or efforts. The controller of the remote device may control the performing of the at least one control or access action.
  • The step of transmitting from or receiving at a mobile device a short range wireless communication to/from a local device may comprise establishing any suitable communication, for example a Bluetooth LE communication or Near Field Communication (NFC), with the local device or communication device. Particularly for methods implemented for passive tokens, the method may further comprise providing power via a short range transmission from the mobile device to the local device, to enable the local device to release the local identifier. As discussed above, short range wireless communications may be communications that occur over a range of only a few cm to under about 1 m. Therefore the method may further comprise moving the mobile device into contact, or into close proximity, with the local device or communication device to initiate the short range communication with the local device or communication device.
  • The step of transmitting from the mobile device or communication device a long range wireless communication to the remote device may comprise establishing any suitable communication, for example a Bluetooth (or Bluetooth LE) communication or Wi-Fi or cellular data communication, with the remote device.
  • As discussed above, additional actions may be performed under other circumstances. The method may further comprise performing at least one further control or access action in the absence of receiving a further long range wireless communication from the mobile device or communication device at the remote device within a time period.
  • Any of the actions discussed above may comprise at least one or more of transmitting a control signal to control at least one device or system located in the vicinity of the local device or communication device, transmitting, via the long range wireless communication interface of the remote device or the communication device, at least one of information and a command to the mobile device or communication device, and storing information related to the mobile device and/or the local or communication device in a memory of the remote device. The control or access action may comprise transmitting a control signal to a device or system in the vicinity of the local device or communication device to switch on and/or to switch off the device or system. The control or access action may comprise at least one of operating a locking mechanism of a door, the door preventing access to at least one area when locked by the locking mechanism, operating a lighting system for lighting the area in which the local or communication device is located, operating a heating and/or cooling system for heating and/or cooling the environment in the vicinity of the local or communication device, operating at least one power source for enabling power to be provided to devices and systems located in the vicinity of the local or communication device, operating a communications device or system for enabling two-way communication with at least one remote communications device or system, operating an audio and/or video device or system for providing audio and/or video output to the area in the vicinity of the local or communication device, and operating any other powered device or system located in the vicinity of the local or communication device.
  • As discussed above and in particular in the alternative aspect where a passive token or the like is used, the local identifier received at the mobile device may not be in any way altered for security purposes. Therefore the method may further comprise processing at the mobile device the local identifier received from the local device to provide a processed communication, wherein the step of transmitting from the mobile device a long range wireless communication to the remote device comprises transmitting the processed communication. The processed identifier may prevent the identifier being immediately recognisable or readable. The method may comprise processing at the mobile device the local identifier received from the local device to provide an encrypted communication, wherein the step of transmitting from the mobile device a long range wireless communication to the remote device comprises transmitting the encrypted communication. Thus security of the communication to the remote device is increased. In other aspects, some or all identifiers transmitted to the remote device can be similarly processed.
  • The above method may be implemented on components of an existing system. This may be simply implemented by setting up the system by registering the various components for use with the system and installing any necessary software or applications, etc. From a further broad aspect, in accordance with the present invention there is provided a method of providing a system for implementing a control or access function, the method comprising registering a local device or communication device with a remote device by moving the local device or communication device within communication range of a short range reader of the remote device, storing information in a memory of the remote device comprising at least a local identifier of the local device or of the communication device, associating the local identifier stored in the memory of the remote device with at least one remotely located controllable system or device, and placing the local device or communication device in the vicinity of the remotely located controllable system or device such that the local device or communication device is visible to a user of the remotely located controllable system or device, wherein the local device is capable of releasing the local identifier only over a short range wireless communication or the mobile device is capable of releasing the mobile identifier only over a short range wireless communication, the remote device is capable of communicating over a long range wireless communication, and the local device or communication device when located in the vicinity of the remotely located controllable system or device is within the long range wireless communication of the remote device or communication device. Thus one or more local devices or communication devices, for example local devices implemented as passive tokens, can be registered with a remote device and then the tokens placed wherever it is required for their control or access function to be performed, which may be in a different location to the remote device. For example, when the token is to be used for accessing premises (i.e. to perform an access control function), the token can be stuck on the relevant door or on a wall next to the door, whereas the remote device may be located inside the premises, perhaps in an area that is not accessible to the user. By simply interacting with the token via a mobile device, the user is able to communicate with the remote device and access desired functions.
  • The above method may be implemented using an existing mobile device, such as a mobile computer, tablet, phone or smartphone. This may be simply implemented by registering the mobile device for use with the system and installing any necessary software or applications, etc., on the mobile device From a further broad aspect, in accordance with the present invention there is provided a method of registering a mobile device for use with a system for implementing a control or access function, the method comprising providing information relating to a mobile device to a remote device, the information relating to the mobile device comprising at least one address or number associated with the mobile device, transmitting a unique identifier from the remote device to the at least one address or number associated with the mobile device, providing to the mobile device an application having information for establishing secure communications with the remote device, processing the unique identifier with the application on the mobile device, the application determining whether the mobile device is to be registered with the system, and registering the mobile device with the system when the outcome of the determining step is positive. Thus a user's mobile device such as a smartphone can be provide with software, e.g. an application (or 'app'), that enables a code or unique identifier sent to the device from a remote device to be processed by the app and if the unique identifier has not previously been registered, the app is enabled on the mobile device for accessing the system.
  • As discussed above, a mobile device such as a smartphone can be used in the systems and methods in accordance with the present invention, for example by having an app on the mobile device to control and/or authenticate the various communications. From a further broad aspect, in accordance with the present invention there is provided a method of implementing a control or access function with a mobile device comprising a short range communication interface, a long range communication interface and a memory with a mobile identifier stored therein, the method comprising receiving a short range communication comprising a local identifier from a local device and transmitting a long range communication comprising the local identifier and the mobile identifier to a remote device, the communication for enabling the remote device to control or perform at least one control or access action in relation to a system or device located in the vicinity of the local device.
  • The remote device according to embodiments of the present invention can be any suitable device, such as an access point or wireless router. The remote device may control the implementation of the control or access function. From a further broad aspect, in accordance with the present invention, there is provided a controller for implementing a control or access function, the controller comprising a long range wireless communication interface for receiving a communication from a mobile device or communication device, and at least one control interface for controlling at least one system or device located in the vicinity of a local device or communication device, wherein the controller is configured to determine whether a mobile device is authorised to use the control or access function based on information contained in a long range wireless communication received from the mobile device or communication device, and the control interface is configured to control a system or device identified by an identifier contained in the long range wireless communication received from the mobile device or communication device when it is determined that the mobile device is authorised to use the control or access function. Thus there is provided a controller that can recognise a permitted or authenticated device in a system and can implement a control or access function in the vicinity of the permitted device in response to a communication from the device either directly or via a communication device.
  • The systems and methods described above involve long range wireless communication between a mobile device or communication device and a remote device that are separated by a distance of more than a few metres and typically would be separated to the extent that the mobile device could not readily be located near to the remote device. For example the mobile device and the remote device may be located in different areas or rooms of a building or floorplate or may be in different buildings or floorplates entirely.
  • The long range communication between the mobile device or communication device and the remote device can be direct communication, i.e. from the mobile device or communication device directly to the remote device and vice versa or the long range wireless communication can be indirect, i.e. the mobile device or communication device communicates with an intermediate device within long range wireless communication and the intermediate device communicates (either directly or indirectly) with the remote device. For example, the mobile device or communication device may communicate with an access point or router within long range wireless communication and that router communicates with the remote device either via a wireless or wired connection (e.g. via WiFi, a LAN, a WAN or the like).
  • Therefore systems in accordance with embodiments of the present invention can comprise more than one remote device with communications between the mobile device or communication device and the controlling remote device being via one or more other remote devices.
  • Embodiments of the present invention will now be described, by way of example only and with reference to the accompanying drawings, in which:
    • Figure 1 schematically illustrates a system in accordance with embodiments of the present invention, in which a token communicates over a short range communication with a mobile device that communicates over a long range communication with a remote device;
    • Figure 2 schematically illustrates a system in accordance with embodiments of the present invention, in which a remote device controls various functions of an office environment in response to a long range communication from a mobile device;
    • Figure 3 schematically illustrates a system in accordance with embodiments of the present invention, in which a remote device controls an access function in response to an indirect long range communication from a mobile device;
    • Figure 4 schematically illustrates a system in accordance with embodiments of the present invention, in which a remote device controls an access function in response to a direct long range communication and subsequent authentication from a mobile device;
    • Figure 5 schematically illustrates a system in accordance with an alternative embodiment of the present invention, in which a local device communicates over a short range communication with a mobile device and also communicates over a long range communication with a remote device;
    • Figure 6 schematically illustrates a system in accordance with an alternative embodiment of the present invention, in which a remote device controls various functions of an office environment in response to an indirect long range communication from a local device; and
    • Figure 7 schematically illustrates a system in accordance with embodiments of the present invention, in which a remote device controls an access function in response to a direct long range communication from a local device and subsequent authentication from a mobile device.
  • Figure 1 illustrates a system 10 for implementing a control or access function in accordance with embodiments of the present invention. A mobile device 30, which in this illustration is a smartphone 30, has a short range communication interface comprising an near field communication chip and a long range communication interface comprising a Bluetooth LE chip. A remote device 40 comprises a wireless access point or controller 40 which is also Bluetooth LE enabled for receiving long range Bluetooth LE communications. Local device 20 is a passive token 20 and is located in the vicinity of an appliance or system which the user of the smartphone 30 may wish to operate or control. Prior to the token 20 being placed in the vicinity of the appliance/system, it is registered as part of the system 10 for implementing a control or access function as follows. The token 20 is presented to a reader at the server that controls the system, which in the Figure 1 embodiment is the access point 40, but could for example be a remote server with which the access point 40 communications (such as server 40c as shown in Figure 3). The server 40 recognises the token 20 and associates it with the appliance/system near to which it will soon be placed. The functionality that is required when the token 20 is used is selected at the server. For example, in the embodiments of Figures 2 to 4 a token 20 is associated with a lockable door 52 and the functionality required is for the door 52 to be locked or unlocked. Once the setup at the server 40 is completed, the token 20 is taken to appliance/system and placed in an appropriate location. For example, with reference again to the door 52 example, the token 20 is affixed (e.g. glued or otherwise stuck) next to the door 52. As long as there is then a remote device 40 within long range communication of the token 20, the system will be functional.
  • The mobile device 30 to be used in conjunction with tokens 20, such as the smartphone 30, must be registered with the system for implementing a control or access function. A credential can be issued to the smartphone 30 as follows. At the server 40 or any appropriately connected computer or the like, a user record is identified in the software. To register the smartphone 30 a credential is added, the credential being selected as 'NFC' type. An identifying address of the user of the smartphone 30 is entered, such as an e-mail address or a/the mobile phone 30 number and then the software sends a unique identifier and a link to the appropriate app to the user (via SMS or e-mail, e.g.). The user can then download the appropriate app to the smartphone 30 and enter the unique identifier into the app when it is first run on the smartphone 30. The app confirms whether the unique identifier has been previously registered with the system and if not, the smartphone 30 is enabled for use with the system.
  • The user interacts with the system via the registered smartphone 30 by bringing the smartphone 30 within range of a passive token 20 (i.e. by placing the smartphone 30 in contact with or very close to (within a few cms) the token 20). An identifier of the token 20 is transmitted via an NFC-protocol communication 22 to the smartphone 30. As the token 20 is passive, power for the transmission is provided by the smartphone 30 by inductive coupling. The app on the smartphone 30 takes the identifier of the token 20 and transmits it, along with a smartphone identifier (which may be a user ID, the credential created when the smartphone 30 is first registered, its phone number, an e-mail address, etc.) to the access point 40 via a long range communication 32, which in this embodiment is a Bluetooth LE communication. The transmission can be encrypted by the app prior to transmission for increased security. As the smartphone 30 is registered with the system, the access point 40 recognises the smartphone 30 and also the token 20 and its associated appliance/system, from the transmitted local identifier. The access point 40 can therefore immediately operate or control the appliance/system associated with the token 20 from the single long range communication 32.
  • In Figure 2 a typical office environment 60 is schematically illustrated. The office 60 has an entry point which is closed by an electrically locked door 52. Inside the office there is a lighting system 58 and a computer 54, which is connected to a power supply 56. All of these appliances and systems are connected via a power bus 44 or other suitable system to a remote device 40 which is located in a server room some distance away from the office 60 and in a secure area that is inaccessible to a user of the office 60. A user wishing to enter the office 60 approaches the door 52 and needs only to place their registered smartphone 30 within close proximity of the door token 20a (preferably by touching it against the token 20a for an NFC communication). The token 20a transmits its local identifier to the smartphone 30 via, e.g. NFC, which transmits the local identifier and its own mobile identifier to the remote device 40, e.g. via Bluetooth LE. The remote device 40 recognises that the user has interacted with the door token 20a, by virtue of the local identifier and recognises that the smartphone 30 is registered, via the mobile identifier and performs an action via connection 44a to unlock the door 52 so the user can gain access to the office 60.
  • The user may wish to switch on the lighting system 58 once inside the office 60. This is achieved by holding the smartphone 30 close to one of the lighting tokens 20b located at various positions in the office 60 to instruct the remote device 40 to operate the lighting system 58 via connection 44b. The lighting tokens 20b may each have a unique identifier or each lighting token 20b may have the same identifier as another lighting token 20b (but that differs to all other tokens 20, such as the door token 20a and power token 20c). Whilst in this embodiment the user turns on the lighting system 58 if lighting is required, it is within the scope of the invention for the lighting system 58 to additionally or alternatively be operated by the remote device 40 in response to, for example, other actions of the user. For example, the remote device 40 could automatically turn on the lighting system 58 in response to the user interacting with the door token 20a, because it is assumed that by opening the door 52, the user wants to access the office 60 and the lighting system 58 will therefore need operating. This could be done only at certain times if desired, for example after a certain time in the evening when the office 60 might become dark. The remote device 40 can also deactivate the lighting system 58 even if the user does not interact with a lighting token 20b. For example the remote device 40 might determine that, in the absence of any other interactions of the user's smartphone 30 with any token 20 in the office 60 after a certain time period, the user has in all probability left the office 60 and therefore the lights should be turned off. In this scenario, the remote device 40 might transmit a long range signal requesting a response from the smartphone 30 to check whether the smartphone 30 is still in the office 60. If there is no response, the lighting system 58 can be switched off.
  • Inside the office 60 there is also a computer 54 which is powered from a power socket 56 which is connected to the remote device 40. If the user wishes to operate the computer 54, the smartphone 30 can be touched to or placed very near to the computer token 20c that is stuck on the side of the computer 54. The computer token 20c transmits its identifier to the smartphone 30 so that the remote device 40 can switch on the power to socket 56 via connection 44c. It may be that the user is only permitted to use the computer 54 for a period of time, e.g. for one hour. The remote device 40 can determine this based on either the mobile identifier transmitted from the smartphone 30 and/or from the data in its database. In such a scenario, the remote device 40 can automatically switch of the computer 54 after the time has elapsed.
  • Figure 3 schematically illustrates a similar system to the figure 2 arrangement but in this scenario more than one remote device is provided because the local office is part of a large environment having multiple controllers and/or access points, etc. A door 52 permits entry to one specific area and has an electric locking mechanism as before. A smartphone 30 is presented to a door token 20 as in other examples and transmits its identifier via a short range communication 22 to the smartphone 30. The local identifier and an identifier of the smartphone 30 are transmitted via a long range communication 32 to a remote device 40a that is within the long range. However remote device 40a is not the controlling device/server of the system, which is instead controller 40c. In this arrangement, the remote device 40a that communicates with the smartphone 30 transmits onwards the long range communication 42a to a network 43 (which may, for example be a local area network, or a wide area network or the Internet, etc.). The network transmits the communication 43a onwards to another device 40b of the system which is in long range communication 42b with the controller 40c of the system. The controller 40c on receiving the long range communication 42b recognises the token 20 and the smartphone 30 and operates the door 52 via connection 44 to enable the user to enter the building through door 52.
  • Figure 4 schematically illustrates a similar system to the Figure 3 arrangement, but the remote device 40 that is within long range communication of the token 20 (and thus the mobile device 30) is the system controller. In this embodiment, the smartphone 30 is placed close to the token 20 as before to receive the local identifier via a short range communication 22 and transmits the local identifier and its mobile identifier to the remote device 40 via a long range communication 32a. The controller 40 recognises the local identifier and the smartphone 30 and determines an extra security step is required before the door 52 can be opened. Therefore the controller 40 sends a command 42 back to the smartphone 30 and the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to the controller 40 for further authentication and if the input is authenticated, the controller 40 operates the door 52 via the connection 44.
  • Therefore there are provided systems and methods for intelligently managing control and access functions in which a user does not need to carry a dedicated control or access device and are therefore convenient, in which passive tokens can be used instead of powered devices so that significant energy is conserved and the installation of the tokens is greatly simplified compared with the need to wire in and power conventional local devices. The systems and methods enable a user to be securely identified and granted control or access where appropriate by identifying the user and the appliance, system or device where the user is located and triggering an appropriate event at the locality of the user if access or control should be granted. Figure 5 illustrates a system 10 for implementing a control or access function in accordance with an alternative embodiment of the present invention. A mobile device 30', which in this illustration is a smartphone 30', has a communication interface comprising a Bluetooth LE chip that provides both a short range communication interface and long range communication interface. A remote device 40 comprises a wireless access point or controller 40 which is also Bluetooth LE-enabled for receiving long range Bluetooth LE communications. Local device 20' is a communication device 20' provided with Bluetooth LE chip that provides both a short range communication interface when operating in low-power "Whisper Mode" and long range communication interface when operating in a normal-power mode. Local device 20' is located in the vicinity of an appliance or system which the user of the smartphone 30' may wish to operate or control. Local device 20' is registered as part of the system 10 for implementing a control or access function. The remote device 40 is provided with details for the local device 20' and associates it with the appliance/system near to which it is located. The functionality that is required when the local device 20' is used is selected at the remote device 40.
  • For example, in the embodiments of Figures 6 and 7 a local device 20' is associated with a lockable door 52 and therefore the functionality required is for the door 52 to be locked or unlocked. Once the setup at the remote device 40 is completed, the local device 20' is taken to appliance/system and placed in an appropriate location. For example, in order to lock or unlock the door 52, the local device 20' is affixed (e.g. glued or otherwise stuck) next to the door 52. As long as there is then a server 40 within long range communication of the local device 20', the system will be functional.
  • The mobile device 30' to be used in conjunction with local devices 20', for example a smartphone 30', must be registered with the system for implementing a control or access function. A credential can be issued to the smartphone 30' as follows. At the remote device 40 or any appropriately connected server or computer or the like, a user record is identified in the software. To register the smartphone 30' a credential is added, the credential being selected as a Bluetooth Low Energy or 'BLE' type. An identifying address of the user of the smartphone 30' is entered, such as an e-mail address or a/the mobile phone 30' number and then the software sends a unique identifier and a link to the appropriate app to the user (via SMS or e-mail, e.g.). The user can then download the appropriate app to the smartphone 30' and enter the unique identifier into the app when it is first run on the smartphone 30'. The app confirms whether the unique identifier has been previously registered with the system and if not, the smartphone 30' is enabled for use with the system.
  • The user interacts with the system via the registered smartphone 30' by bringing the smartphone 30' within range of a local device 20' (i.e. by placing the smartphone 30' in contact with or very close to (within a few cms) the local device 20'). An identifier of the mobile device 30' is transmitted via an Bluetooth LE communication 22' to the local device 20'. The local device 20' is operating in a power saving mode, with only Bluetooth LE 'Whisper Mode' active, thereby reducing the range within which it can communicate with the mobile device 30'. The local device 20' takes the identifier of the mobile device 30' (which may be a user ID, the credential created when the smartphone 30' is first registered, its phone number, an e-mail address, etc.) and powers up to operate in a higher-power or normal-power Bluetooth LE mode and then transmits the mobile identifier, along with a local identifier, to the remote device 40 via a long range communication 32', which in this embodiment is a higher-power or normal-power Bluetooth LE communication. The transmission can be encrypted by either or both of the mobile 30' and local 20' device(s) prior to transmission for increased security. As the smartphone 30' is registered with the system, the remote device 40 recognises the identifiers associated with the smartphone 30' and also the local device 20' and its associated appliance/system, from the transmitted identifiers. The remote device 40 can therefore immediately operate or control the appliance/system associated with the local device 20' from the single long range communication 32'.
  • In the above described embodiment in relation to Figure 2 there is described an electrically locked door 52, a lighting system 58 and a computer 54 connected to a power supply 56. All of these appliances and systems are connected via a power bus 44 or other suitable system to a remote device 40 which is located in a server room some distance away from the office 60 and in a secure area that is inaccessible to a user of the office 60. As an alternative to this embodiment, the above-described local devices 20' can be substituted for the tokens 20a and 20b to enable a user wishing to enter the office 60 using their registered smartphone 30' and to enable the user to switch on the lighting system 58 once inside the office 60 using their smartphone 30'. The computer 54 can be similarly activated using the smartphone 30' touched to or placed very near to the computer token 20c, in this alternative embodiment substituted for a local device 20', that is stuck on the side of the computer 54.
  • Figure 6 schematically illustrates a similar system to the alternative Figure 2 arrangement described above but in this scenario more than one remote device 40a, 40b, 40c is provided because the local office is part of a large environment having multiple controllers and/or access points, etc. A door 52 permits entry to one specific area and has an electric locking mechanism as before. A smartphone 30' is presented to a local device 20' as in other examples and transmits its mobile identifier via a short range communication 22' to the local device 20'. The local identifier of the local device 20' and mobile identifier of the smartphone 30' are transmitted by the local device 20' via a long range communication 32 to a remote device 40a that is within the long range. However, remote device 40a is not the controlling device/server of the system, which is instead controller 40c. In this arrangement, the remote device 40a that communicates with the local device 20' transmits onwards the long range communication 42a to a network 43 (which may, for example be a local area network, or a wide area network or the Internet, etc.). The network transmits the communication 43a onwards to another device 40b of the system which is in long range communication 42b with the controller 40c of the system. The controller 40c on receiving the long range communication 42b recognises the local device 20' and the smartphone 30' and operates the door 52 via connection 44 to enable the user to enter the building through door 52.
  • Figure 7 schematically illustrates a similar system to the Figure 6 arrangement, but the remote device 40 that is within long range communication of the local device 20' (and thus the mobile device 30') is the system controller. In this embodiment, the smartphone 30' is placed close to the local device 20' as before to receive the mobile identifier via a short range communication 22' and transmits the local identifier and mobile identifier to the remote device 40 via a long range communication 32a. The controller 40 recognises the local identifier and the mobile identifier and determines an extra security step is required before the door 52 can be opened. Therefore the controller 40 sends a command 42 back to the smartphone 30' via a suitable long range communication protocol, in this example also Bluetooth LE but could be Wi-Fi or a cellular data network for example, and the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to the controller 40 for further authentication and if the input is authenticated, the controller 40 operates the door 52 via the connection 44.
  • Therefore there are provided systems and methods for intelligently managing control and access functions in which a user does not need to carry a dedicated control or access device and are therefore convenient, in which a low-power battery-powered local device can be used instead of mains-powered devices so that significant energy is conserved or in which a wireless local device can be used so that data cabling need not be installed to connect the local device to a remote device and the installation of the tokens is greatly simplified compared with the need to wire in and power conventional local devices. The systems and methods enable a user to be securely identified and granted control or access where appropriate by identifying the user and the appliance, system or device where the user is located and triggering an appropriate event at the locality of the user if access or control should be granted.
    • CLAUSE 1: A communication device having a low-power mode and a higher-power mode for implementing a control or access function, comprising: a short range wireless communication interface; a long range wireless communication interface; a local identifier stored therein; wherein in the low-power mode the communication device is operable to receive a mobile identifier from a mobile device over the short range wireless communication interface and upon receiving the mobile identifier the higher-power mode is enabled; in the higher-power mode the communication device is operable to communicate over the long range wireless communication interface with a remote device having a controller; wherein the communication device is configured to send the local identifier and the received mobile identifier to the remote device; and wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the local identifier and the mobile identifier.
    • CLAUSE 2: The communication device of CLAUSE 1, wherein the short range wireless communication interface and the long range wireless communication interface of the communication device are comprised of one and the same communication interface, the communication interface preferably operating in different modes.
    • CLAUSE 3: The communication device of any preceding CLAUSE, wherein the communication device returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device to the remote device via the long range communication interface.
    • CLAUSE 4: The communication device of any preceding CLAUSE, wherein the communication device is operable to communicate substantially within a range of approximately 30cm in the low-power mode.
    • CLAUSE 5: The communication device of any preceding CLAUSE, wherein the communication device is operable to communicate substantially within a range of 30m in the higher-power mode.
    • CLAUSE 6: The communication device of any preceding CLAUSE, wherein the communication device further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device.
    • CLAUSE 7: The communication device of CLAUSE 6 wherein the second short range wireless communication interface is NFC.
    • CLAUSE 8: The communication device of any preceding CLAUSE, further comprising a battery wherein the communication device is powered by the battery, and wherein preferably the battery is a coin battery.
    • CLAUSE 9: The communication device of any preceding CLAUSE, further comprising a proximity sensor configured to activate the low-power mode of the communication device and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device.
    • CLAUSE 10: The communication device of any preceding CLAUSE, wherein the communication device begins communications with the mobile device over the short range wireless communication interface by requesting the mobile identifier from the mobile device.
    • CLAUSE 11: The communication device of any preceding CLAUSE, wherein the mobile identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
    • CLAUSE 12: The communication device of any preceding CLAUSE, wherein the communication device also receives a unique identifier in addition to the mobile identifier from the mobile device and sends the received unique identifier to the remote device using the long range wireless communication interface along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
    • CLAUSE 13: The communication device of any preceding CLAUSE, wherein the controller of the remote device is further configured to request the mobile device to make a connection using a third long range protocol to verify that the mobile device is within the proximity of the communication device, preferably requesting location data from the mobile device to be transmitted to the remote device wherein the location data can be a GPS location.
    • CLAUSE 14: The communication device of CLAUSE 13, wherein the third long range protocol is Wi-Fi.
    • CLAUSE 15: The communication device of any preceding CLAUSE, wherein the communication device has a medium-power mode that is used to communicate with the mobile device over the short range wireless communication interface when the communication device receives the mobile identifier from the mobile device.
    • CLAUSE 16: The communication device of any preceding CLAUSE, wherein the controller of the remote device is operable to send a security query to the mobile device, the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device or via the communication device, any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation.
    • CLAUSE 17: A system for implementing a control or access function, the system comprising: a communication device of any previous CLAUSE; one or more mobile devices; the remote device comprising a long range wireless communication interface and a controller; wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the communication device.
    • CLAUSE 18: The system of CLAUSE 17, wherein the mobile device comprises a mobile communications device, preferably a smartphone, tablet or the like.
    • CLAUSE 19: The system of any one of CLAUSES 17 or 18, wherein the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is preferably a BLE-enabled smartphone.
    • CLAUSE 20: The system of any of CLAUSES 17 to 19, wherein the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is preferably BLE-enabled.
    • CLAUSE 21: A method of implementing a control or access function in a communication device having a low-power mode and a higher-power mode comprising the steps of: receiving at the communication device while the communication device is operating in a low-power mode a short range wireless communication from a mobile device, the short range wireless communication comprising at least a mobile identifier associated with the mobile device; enabling a higher-power mode of the communication device on receipt of the mobile identifier; transmitting from the communication device a long range wireless communication to a remote device while the communication device is operating in a normal-power mode, the long range wireless communication comprising at least the mobile identifier and a local identifier associated with the communication device; wherein the remote device is operable to receive and process the long range wireless communication in order to perform at least one control or access action based on the information obtained from processing of the long range wireless communication.
    • CLAUSE 22: The method of CLAUSE 21, wherein the short range wireless communication interface and the long range wireless communication interface of the communication device are comprised of one and the same communication interface, the communication interface preferably operating in different modes.
    • CLAUSE 23: The method of any of CLAUSES 21 or 22, wherein the communication device returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device to the remote device via the long range communication interface.
    • CLAUSE 24: The method of any of CLAUSES 21 to 23, wherein the communication device communicates substantially within a range of approximately 30cm in the low-power mode.
    • CLAUSE 25: The method of any of CLAUSES 21 to 24, wherein the communication device communicates substantially within a range of 30m in the normal-power mode.
    • CLAUSE 26: The method of any of CLAUSES 21 to 25, wherein the communication device further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device.
    • CLAUSE 27: The method of CLAUSE 26 wherein the second short range wireless communication interface is NFC.
    • CLAUSE 28: The method of any of CLAUSES 21 to 27, further comprising a battery and wherein the communication device is powered by a battery, preferably the battery is a coin battery.
    • CLAUSE 29: The method of any of CLAUSES 21 to 28, wherein the communication device further comprises a proximity sensor wherein the proximity sensor performs the steps of: detecting any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device; and the step of activating the low-power mode of the communication device.
    • CLAUSE 30: The method of any of CLAUSES 21 to 29, wherein the communication device begins communications with the mobile device over the short range wireless communication interface by requesting the mobile identifier from the mobile device.
    • CLAUSE 31: The method of any of CLAUSES 21 to 30, wherein the mobile identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
    • CLAUSE 32: The method of any of CLAUSES 21 to 31, wherein the communication device also receives a unique identifier in addition to the mobile identifier from the mobile device and sends the received unique identifier to the remote device using the long range wireless communication interface along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
    • CLAUSE 33: The method of any of CLAUSES 21 to 32, wherein the remote device further requests the mobile device to make a connection using a third long range protocol to verify that the mobile device is within the proximity of the communication device.
    • CLAUSE 34: The method of CLAUSE 33, wherein the third long range protocol is Wi-Fi.
    • CLAUSE 35: The method of any of CLAUSES 21 to 34, wherein the communication device has a medium power mode that is used to communicate with the mobile device over the short range wireless communication interface when the communication device receives the mobile identifier from the mobile device.
    • CLAUSE 36: The method of any of CLAUSES 21 to 35, wherein the remote device sends a security query to the mobile device, the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device or via the communication device, any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation.
    • CLAUSE 37: The method of any of CLAUSES 21 to 36, wherein the mobile device comprises a mobile communications device, preferably a smartphone, tablet or the like.
    • CLAUSE 38: The method of any of CLAUSES 21 to 37, wherein the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is preferably a BLE-enabled smartphone.
    • CLAUSE 39: The method of any of CLAUSES 21 to 38, wherein the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is preferably BLE-enabled.

Claims (15)

  1. A communication device having a low-power mode and a higher-power mode for implementing a control or access function, comprising:
    a short range wireless communication interface;
    a long range wireless communication interface;
    a local identifier stored therein; wherein
    in the low-power mode the communication device is operable to receive a mobile identifier from a mobile device over the short range wireless communication interface and upon receiving the mobile identifier the higher-power mode is enabled;
    in the higher-power mode the communication device is operable to communicate over the long range wireless communication interface with a remote device having a controller; wherein the communication device is configured to send the local identifier and the received mobile identifier to the remote device; and
    wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the local identifier and the mobile identifier.
  2. A method of implementing a control or access function in a communication device having a low-power mode and a higher-power mode comprising the steps of:
    receiving at the communication device while the communication device is operating in a low-power mode a short range wireless communication from a mobile device, the short range wireless communication comprising at least a mobile identifier associated with the mobile device;
    enabling a higher-power mode of the communication device on receipt of the mobile identifier;
    transmitting from the communication device a long range wireless communication to a remote device while the communication device is operating in the higher-power mode, the long range wireless communication comprising at least the mobile identifier and a local identifier associated with the communication device;
    wherein the remote device is operable to receive and process the long range wireless communication in order to perform at least one control or access action based on the information obtained from processing of the long range wireless communication.
  3. The method of claim 2 wherein the communication device further comprises a short range wireless communication interface and a long range wireless communication interface, or the communication device of claim 1, wherein the short range wireless communication interface and the long range wireless communication interface of the communication device are comprised of one and the same communication interface, the communication interface optionally operating in different modes.
  4. The device of claims 1 or 3 or the method of claims 2 or 3, wherein the communication device (a) returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device to the remote device via the long range communication interface, and/or (b) communicates substantially within a range of approximately 30cm in the low-power mode, and/or (c) communicates substantially within a range of 30m in the higher-power mode.
  5. The device of any of claims 1, 3 or 4 or the method of any of claims 2 to 4, wherein the communication device further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device, optionally wherein the second short range wireless communication interface is NFC.
  6. The device of any of claims 1 or 3 to 5 or the method of any of claims 2 to 5, further comprising a battery and wherein the communication device is powered by the battery and wherein optionally the battery is a coin battery.
  7. The device of any of claims 1 or 3 to 6 or the method of any of claims 2 to 6, wherein the communication device further comprises a proximity sensor wherein the proximity sensor performs the steps of: detecting any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device; and the step of activating the low-power mode of the communication device.
  8. The device of any of claims 1 or 3 to 7 or the method of any of claims 2 to 7, wherein either or both the communication device begins communications with the mobile device over the short range wireless communication interface by requesting the mobile identifier from the mobile device and/or the mobile identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
  9. The device of any of claims 1 or 3 to 8 or method of any of claims 2 to 8, wherein the communication device also receives a unique identifier in addition to the mobile identifier from the mobile device and sends the received unique identifier to the remote device using the long range wireless communication interface along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
  10. The device of any of claims 1 or 3 to 10 or method of any of claims 2 to 9, wherein the remote device further requests the mobile device to make a connection using a third long range protocol to verify that the mobile device is within the proximity of the communication device, optionally wherein the third long range protocol is Wi-Fi.
  11. The device of any of claims 1 or 3 to 11 or method of any of claims 2 to 10, wherein the communication device has a medium power mode that is used to communicate with the mobile device over the short range wireless communication interface when the communication device receives the mobile identifier from the mobile device.
  12. The device of any of claims 1 or 3 to 12 or method of any of claims 2 to 11, wherein the remote device sends a security query to the mobile device, the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device or via the communication device, any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation.
  13. The device of any of claims 1 or 3 to 13 or method of any of claims 2 to 12, wherein either the mobile device comprises a mobile communications device, optionally a smartphone, tablet or the like.
  14. The device of any of claims 1 or 3 to 14 or method of any of claims 2 to 13, wherein either or both the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is optionally a BLE-enabled smartphone, and/or the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is optionally BLE-enabled.
  15. A communication device for implementing a control or access function, operable to perform the method of any of claims 2 to 14; or a system for implementing a control or access function, operable to perform the method of any of claims 2 to 14: wherein optionally the system comprises: a communication device operable to perform the method of any of claims 2 to 14; one or more mobile devices; a remote device comprising a long range wireless communication interface and a controller; wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the communication device; and/or wherein the mobile device comprises a mobile communications device, optionally a smartphone, tablet or the like; and/or wherein the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is optionally a BLE-enabled smartphone; and/or wherein the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is optionally BLE-enabled.
EP14179202.8A 2013-07-30 2014-07-30 Communication method and system Active EP2833330B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1313586.8A GB2516686B (en) 2013-07-30 2013-07-30 Communication method and system
GB1405133.8A GB2516715B (en) 2013-07-30 2014-03-21 Communication method and system

Publications (2)

Publication Number Publication Date
EP2833330A1 true EP2833330A1 (en) 2015-02-04
EP2833330B1 EP2833330B1 (en) 2018-07-18

Family

ID=51228377

Family Applications (1)

Application Number Title Priority Date Filing Date
EP14179202.8A Active EP2833330B1 (en) 2013-07-30 2014-07-30 Communication method and system

Country Status (1)

Country Link
EP (1) EP2833330B1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778767A (en) * 2015-02-16 2015-07-15 北極星科技全球有限公司 RFID-to-Bluetooth selective adapter
CN105719375A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Intelligent access control device and communication method thereof
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
NL2015145B1 (en) * 2015-07-10 2017-02-01 Boekit B V System for managing devices in a building, device and mobile communication device for use in such a system.
IT201700069463A1 (en) * 2017-06-22 2018-12-22 One4 S R L System and method for managing and optimizing spaces and services in business contexts.
WO2020111499A1 (en) * 2018-11-26 2020-06-04 주식회사 두빛나래소프트 Method, apparatus, and system for transmitting and receiving information by using qr code
FR3105534A1 (en) * 2019-12-24 2021-06-25 Imprimerie Nationale Method and system for sharing authentication data for access control and data erasure after use

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004034334A1 (en) * 2002-10-07 2004-04-22 Dorma Gmbh + Co. Kg Access control system for doors and method for operating an access control system of this type
US20060170533A1 (en) * 2005-02-03 2006-08-03 France Telecom Method and system for controlling networked wireless locks
NL1033539C2 (en) * 2007-03-13 2008-09-17 Nedap Nv Access control system using mobile phone with NFC technology, compares authorization information on server with identification codes for phone and electronic lock
EP1965595B1 (en) * 2007-02-27 2009-10-28 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
EP2192560A1 (en) * 2008-11-25 2010-06-02 Rockwell Automation Limited Access control

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10246668A1 (en) * 2002-10-07 2004-04-22 Dorma Gmbh + Co. Kg Access control system has reader for identifying person, radio transmitter/receiver with interface for wirelessly sending reader data to central station for return and processing by central station
DE502004011533D1 (en) 2004-01-06 2010-09-23 Kaba Ag ACCESS CONTROL SYSTEM AND METHOD OF OPERATION THEREOF
NZ564196A (en) 2007-12-10 2010-08-27 Resonance Holdings Ltd Electronic lock for security system and key on a wireless device including methods of encoding data
US9057210B2 (en) 2011-03-17 2015-06-16 Unikey Technologies, Inc. Wireless access control system and related methods
US8811685B1 (en) 2011-06-21 2014-08-19 Google Inc. Proximity wakeup

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004034334A1 (en) * 2002-10-07 2004-04-22 Dorma Gmbh + Co. Kg Access control system for doors and method for operating an access control system of this type
US20060170533A1 (en) * 2005-02-03 2006-08-03 France Telecom Method and system for controlling networked wireless locks
EP1965595B1 (en) * 2007-02-27 2009-10-28 Lucent Technologies Inc. Wireless communication techniques for controlling access granted by a security device
NL1033539C2 (en) * 2007-03-13 2008-09-17 Nedap Nv Access control system using mobile phone with NFC technology, compares authorization information on server with identification codes for phone and electronic lock
EP2192560A1 (en) * 2008-11-25 2010-06-02 Rockwell Automation Limited Access control

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778767A (en) * 2015-02-16 2015-07-15 北極星科技全球有限公司 RFID-to-Bluetooth selective adapter
CN104778767B (en) * 2015-02-16 2018-01-16 北極星科技全球有限公司 Possess the RFID Bluetooth adapters and its initial configuration method of selectivity function
NL2015145B1 (en) * 2015-07-10 2017-02-01 Boekit B V System for managing devices in a building, device and mobile communication device for use in such a system.
CN105719375A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Intelligent access control device and communication method thereof
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
IT201700069463A1 (en) * 2017-06-22 2018-12-22 One4 S R L System and method for managing and optimizing spaces and services in business contexts.
WO2020111499A1 (en) * 2018-11-26 2020-06-04 주식회사 두빛나래소프트 Method, apparatus, and system for transmitting and receiving information by using qr code
US11367078B2 (en) 2018-11-26 2022-06-21 Doobitnaraesoft Co., Ltd. Method, apparatus, and system for transmitting and receiving information by using QR code
FR3105534A1 (en) * 2019-12-24 2021-06-25 Imprimerie Nationale Method and system for sharing authentication data for access control and data erasure after use
WO2021129999A1 (en) * 2019-12-24 2021-07-01 Imprimerie Nationale Method and system for sharing authentication data for an access control and deletion of the data after use

Also Published As

Publication number Publication date
EP2833330B1 (en) 2018-07-18

Similar Documents

Publication Publication Date Title
US10158968B2 (en) Communication method and system
EP2833330B1 (en) Communication method and system
JP6747691B2 (en) Electronic access control device and access control method
GB2533675A (en) Communication method and system
EP3259741B1 (en) Method and system for credential management
KR101829018B1 (en) Digital doorlock system
US10181230B2 (en) System and method for controlling access at access point
KR101963437B1 (en) System and method for doorlock
US10740995B2 (en) Access control and location tracking system
EP3178242B1 (en) Context-aware controlling of multiple systems of controllable devices
KR101912349B1 (en) Entrance Access Management System
JP2023500019A (en) mobile digital lock technology
KR101861057B1 (en) Digital door lock based on composite signal and the method for operating the same
KR20150131792A (en) Door lock apparatus and control method for the same
WO2018213253A1 (en) Access control system with wireless communication
KR101996258B1 (en) Remote information processing system for user apparatus in stroage
US11558744B2 (en) Location-based asset usage control
WO2015052120A1 (en) Method and system for detection and identification of a wearable device
KR20140122398A (en) Near field departure prevention system

Legal Events

Date Code Title Description
17P Request for examination filed

Effective date: 20140730

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

R17P Request for examination filed (corrected)

Effective date: 20150724

17Q First examination report despatched

Effective date: 20160218

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20180207

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1020174

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180815

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602014028586

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180718

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1020174

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180718

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181118

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181019

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181018

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181018

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602014028586

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180730

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20180731

PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180731

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190201

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180731

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PLAX Notice of opposition and request to file observation + time limit sent

Free format text: ORIGINAL CODE: EPIDOSNOBS2

26 Opposition filed

Opponent name: DORMAKABA DEUTSCHLAND GMBH

Effective date: 20190418

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180731

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180730

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180918

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

PLBB Reply of patent proprietor to notice(s) of opposition received

Free format text: ORIGINAL CODE: EPIDOSNOBS3

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180730

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20140730

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: MK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180718

PLCK Communication despatched that opposition was rejected

Free format text: ORIGINAL CODE: EPIDOSNREJ1

PLBN Opposition rejected

Free format text: ORIGINAL CODE: 0009273

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: OPPOSITION REJECTED

27O Opposition rejected

Effective date: 20201225

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230530

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230728

Year of fee payment: 10