EP3348752A1 - Lock assembly for providing a channel through a lock - Google Patents

Lock assembly for providing a channel through a lock Download PDF

Info

Publication number
EP3348752A1
EP3348752A1 EP18151732.7A EP18151732A EP3348752A1 EP 3348752 A1 EP3348752 A1 EP 3348752A1 EP 18151732 A EP18151732 A EP 18151732A EP 3348752 A1 EP3348752 A1 EP 3348752A1
Authority
EP
European Patent Office
Prior art keywords
lock
housing
hole
controller
door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP18151732.7A
Other languages
German (de)
French (fr)
Inventor
Jeroen Lennard Van Oorschot
Petrus Robinus Van den Oord
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Loqed Holding BV
Original Assignee
Loqed Holding BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Loqed Holding BV filed Critical Loqed Holding BV
Publication of EP3348752A1 publication Critical patent/EP3348752A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0091Retrofittable electric locks, e.g. an electric module can be attached to an existing manual lock
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/02Movement of the bolt by electromagnetic means; Adaptation of locks, latches, or parts thereof, for movement of the bolt by electromagnetic means
    • E05B47/026Movement of the bolt by electromagnetic means; Adaptation of locks, latches, or parts thereof, for movement of the bolt by electromagnetic means the bolt moving rectilinearly
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B63/00Locks or fastenings with special structural characteristics
    • E05B63/0034Locks for use instead of cylinder locks, e.g. locks with cylinder lock profile and a low security operating mechanism
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • G07C2209/64Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor

Definitions

  • This disclosure relates to a lock assembly, to a housing for a rotatable member, in particular for a cylinder of a cylinder lock, and to a lock case.
  • Keyless entry systems conveniently allow a person to access an area, such as his home, without having to insert a key into a lock.
  • Remotely controlled locks are known in the art that may be unlocked by a user pressing a button on a transponder, the transponder transmitting a signal to the lock wherein the signal triggers an electronic motor for unlocking the mechanical lock mechanism.
  • Modifying an existing, conventional lock so that it can be opened without the insertion of a key into the lock, i.e. to implement a "keyless functionality" into an existing lock, may be cumbersome.
  • keyless lock systems require a wired electrical connection between a power supply or controller on one side of the door and an electrical device, such as an antenna for receiving wireless signals from a transponder, on another side of the door.
  • an electrical device such as an antenna for receiving wireless signals from a transponder
  • a lock assembly comprising a lock case comprising a through-hole, the lock assembly further comprising a housing accommodating a rotatable member, wherein the housing is mated to and mounted in the through-hole, and wherein at least one of the housing and the through-hole provide a channel through the lock case.
  • the lock assembly provides a channel through the lock when the lock assembly is mounted on a door, which obviates the need to drill an additional hole through the door when a keyless functionality is to be implemented into an existing lock.
  • the rotatable member is a cylinder of a cylinder lock.
  • the housing provides the channel through the lock case.
  • the housing comprises a recess running along a length of the housing.
  • the recess is located in a bottom part of the housing.
  • the channel provides a passage for electrical wiring.
  • the through-hole is shaped in accordance with a standardized lock profile.
  • the through-hole is shaped in accordance with the Euro Profile lock standard, for example in accordance with the standard as disclosed by at least one of the documents DIN 18250, DIN 18251 and DIN 18252 published by the Deutsches Institut fur Normung (German Institute for Standardization).
  • the through-hole is shaped in accordance with an Oval lock standard, such as a UK Oval lock standard, Scandinavian Oval lock standard or Australian Oval lock standard.
  • Oval lock standard such as a UK Oval lock standard, Scandinavian Oval lock standard or Australian Oval lock standard.
  • the through-hole is shaped in accordance with the Swiss profile lock standard.
  • the through-hole is shaped in accordance with the KIK lock standard.
  • a front face of the housing does not comprise an opening for receiving a mechanical key.
  • One aspect of this disclosure relates to housing for accommodating a rotatable member, the housing being mated to a through-hole in a lock case, wherein the housing is configured to provide a channel through the lock case when the housing is mounted in the through-hole.
  • the housing comprises a recess running along the length of the housing.
  • the lock case for use in a lock assembly.
  • the lock case comprises a through-hole mated to a housing, wherein the through-hole is configured to provide a channel through the lock case when the housing is mounted in the through-hole.
  • the invention relates to a module for controlling an electronic lock, the module being configured to unlock the lock in at least two phases, a first phase and a second phase; wherein the module may comprise: an electric motor configured to drive a mechanical locking mechanism for unlocking the lock; a controller that is configured to control the electric motor and to receive one or more wireless signals from an electronic key; a user interface connected to the controller configured to detect a user interaction; wherein the controller is further configured to: determine on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiate the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detect interaction with the user interface of the lock; and, after completion of the first phase, initiate on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • the module may comprise: an electric motor configured to drive a mechanical locking mechanism for unlocking the lock; a controller that is configured to control the electric motor and to receive one or more wireless signals
  • the invention relates to a method for controlling an electronic lock to unlock in at least two phases, a first phase and a second phase, the method comprising: controlling an electronic motor driving a mechanical locking mechanism and receiving one or more wireless signals from an electronic key; determining on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiating the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detecting interaction with a user interface of the lock; after completion of the first phase, initiating on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • the invention relates to a controller for a module as describe above, the controller comprising: a computer readable storage medium having computer readable program code embodied therewith, and, a processor, preferably a microprocessor, coupled to the computer readable storage medium, wherein responsive to executing the computer readable program code, the processor is configured to perform executable operations comprising the method steps as described above.
  • Mechanical locking mechanisms in particular mechanical locking mechanism such as the European cylinder door lock mechanisms, exist wherein the cylinder has to turn multiple times, e.g. over 960 degrees, before the lock is unlocked.
  • fully unlocking the lock may take considerable time after the user has pressed the button of the transponder.
  • the user may experience an undesirable waiting time before he can actually open a door. This waiting time may even get worse as a result of some conflicting requirements of an electronic lock.
  • an electric motor of a lock is preferably small. Small motors namely tend to be more energy efficient, which is important because frequent change of batteries is undesired. In addition, small motors can be elegantly integrated with existing locks and can be conveniently mounted on doors. On the other hand, an electric motor must be able to deliver a certain threshold force or torque in order to drive the mechanical lock mechanism, which may include a cylinder of a cylinder lock. In principle, larger electric motors are able to deliver higher forces.
  • gearing enables to amplify an input force or torque delivered by the electric motor to the gearing system.
  • the amplified output torque may then be sufficient to drive the mechanical parts of the lock.
  • a small electric motor can indeed cause a force or torque of sufficient magnitude for driving mechanical parts of the lock.
  • amplifying a torque by means of gearing is associated with a reduction in velocity, for example a reduction in the angular velocity of a cylinder of a cylinder lock.
  • the module, method and controller disclosed herein enable improved keyless entry systems that at least reduce the waiting time for a user that intends to unlock a lock, for example a lock on a door of the user's home.
  • the module is configured to unlock the lock in two phases.
  • the first phase is initiated by the controller in response to determining that an electronic key, and presumably a person holding the key, is within a predetermined distance of the lock.
  • an appropriately chosen distance allows the controller to already initiate the first phase while the user is approaching and has not yet reached the lock.
  • the lock will have already partially unlocked when the user arrives at the lock.
  • the controller will initiate the second phase and further unlock, e.g. completely unlock so that the user can access a house, locker, etc.
  • the second phase may only start once a user has interacted with the lock, for example touching the lock, therefore the risk of unintentionally completely unlocking the lock is avoided.
  • the electronic key may be associated with the lock and/or may comprise a smartphone or any other portable device that can transmit wireless signals.
  • the controller may be configured to control the transceiver module to transmit and receive messages from the key.
  • the mere reception of the signal from the key may be sufficient for the controller to determine that the key is within the predetermined distance from the lock.
  • the predetermined distance may be a distance in the range of 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Measures may be taken to neglect an electronic key if it is within the predetermined distance from the lock, yet already in the area for which access controlled, the "inside" area, e.g. already in the house.
  • Such measures may comprise at least one of the electronic key and the controller determining that the electronic key is in the "inside” area on the basis of Wifi and/or geofencing.
  • the user interaction may be indicative of an intention of the user to unlock the lock.
  • one or more wireless signals comprise an identifier of the electronic key and/or an authentication code.
  • the controller is configured for, and the method comprises, enabling on the basis of the received identifier and/or on the basis of the authentication code initiation of the first phase. This embodiment provides convenient security measures for opening the lock.
  • the module comprises a rotatable member, such as a rotatable cylinder, coupled to the electric motor, the rotatable member being configured to drive the mechanical locking mechanism of the lock by rotating.
  • the controller is configured for, and the method comprises, controlling the electric motor to rotate the member in the first phase over a first angular distance from a first angular position to an intermediate angular position and controlling the electric motor to rotate the member in the second phase over a second angular distance from the intermediate angular position to a second angular position.
  • the direction of said respective rotations in the first and second phase may be the same. Also, the second angular distance may be smaller than the first angular distance.
  • the mechanical locking mechanism comprises a dead bolt and a latch bolt.
  • the controller is configured for, and/or the method comprises, retracting the deadbolt in the first phase and retracting the latch bolt in the second phase.
  • the user interface comprises a touch sensitive surface and the interaction comprises the user touching the touch sensitive surface.
  • the touch surface may be, when the module is mounted on the lock for controlling the lock, at the outside of the door.
  • the controller is configured for, and/or the method comprises, establishing a secure connection with the electronic key.
  • the secure connection may be established using techniques known in the art.
  • the controller is configured for, and/or the method comprises, determining a power of the one or more wireless signals as received, determining that the power as received exceeds a threshold value and in response determining that the key is within the predetermined distance from the lock.
  • the controller may be configured to determine, or calibrate, the threshold value on the basis of an indication of a power of the signal as transmitted by the electronic key. If for example the key transmits signals of lower power, the threshold value may be lower, whereas the threshold value may be higher if the key transmits signals of higher power.
  • the controller may additionally or alternatively be configured to calculate a round-trip time of a signal.
  • the controller may be configured to determine that the electronic key is within the predetermined distance on the basis of the calculated round-trip time, for example on the basis of the calculated round-trip time being shorter than a predetermined time.
  • the controller is configured for, and/or the method comprises, establishing a wireless connection with the electronic key; and for monitoring a quality of the connection and determining on the basis of the quality of the connection that the electronic key is within the predetermined distance.
  • the controller may be configured to repeatedly measure the quality of the connection, for example by measuring a power of the signal as received, such as an RSSI (Received Signal Strength Indicator).
  • the key may be configured to determine the quality of the connection, for example by measuring a power of a further signal as received by the key, wherein the further signal is transmitted by the transceiver module to the key. The key may then transmit the quality as measured by the key to the module.
  • controller is configured for, and/or the method comprises, receiving a second wireless signal from the key and determining, prior to initiation of the second phase, on the basis of the received second signal that the key is within a predetermined second distance from the lock and in response enabling initiating the second phase, preferably the second distance being smaller than the predetermined distance.
  • This embodiment is advantageous because it prevents that a door can be opened by a malicious person when the first phase has completed, although the owner holding the key does not (yet) intend to unlock the door, for example because he is still sitting in his car near the lock.
  • the controller may thus be configured to only open the lock if at least two conditions i) and ii) are satisfied, namely i) the detector has detected an action of the user and ii) the key is within the predetermined second distance of the lock.
  • the second distance may be in the range of 0-5 meters, preferably 0-2 meters, more preferably 0-1 meter.
  • the module is mountable on a lock.
  • the lock in locked state is configured to secure a member, such as a door, for restricting access to an area and in these embodiments the module further comprises a sensor that is configured to generate a position signal that is indicative of a position of the member. In embodiments, the controller is configured for, and/or the method comprises, controlling the lock to lock itself on the basis of the position signal.
  • This embodiment enables that the lock automatically locks a door once the door is closed again after it has been opened.
  • the controller may be configured to determine on the basis of the position signal that the member has moved from a position in which the member provides access to the area to be accessed to a position in which the member restricts access and in response control the lock to lock itself.
  • the sensor may comprise a magnetic sensor that is configured to measure a magnetic field strength for example a magnetic field strength caused by a (permanent) magnet mounted on a door and/or a magnetic field strength of the earth's magnetic field.
  • a magnetic field strength for example a magnetic field strength caused by a (permanent) magnet mounted on a door and/or a magnetic field strength of the earth's magnetic field.
  • the sensor may be understood to comprise a compass.
  • a compass mounted on for example a door enables the controller to determine the orientation of the door which allows to determine whether the door is open or shut.
  • the controller is configured for, and/or the method comprises, controlling the lock to fully lock after the first phase has completed in response to at least one of:
  • the first time period may for 20-60 seconds, preferably for 25-35 seconds.
  • the second time period may last for 5-30 seconds, preferably 10-20 seconds.
  • a module is provided according to claim 13.
  • aspects of the present invention may be embodied as a system, a method or a computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit,” “module” or “system.” Functions described in this disclosure may be implemented as an algorithm executed by a processor/microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied, e.g., stored, thereon.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a computer readable storage medium may include, but are not limited to, the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain, or store, a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof.
  • a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java(TM), Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider an Internet Service Provider
  • These computer program instructions may be provided to a processor, in particular a microprocessor or a central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • a processor in particular a microprocessor or a central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • embodiments of the present invention may relate to a computer-implemented method for controlling a lock.
  • a computer program for carrying out the methods described herein, as well as a non-transitory computer readable storage-medium storing the computer program are provided.
  • a computer program may, for example, be downloaded (updated) to the existing controller (e.g. to the existing or be stored upon manufacturing of these systems.
  • Fig. 1 schematically shows a system for controlling an electronic lock according to an embodiment of the invention.
  • Fig. 1 depicts a system for controlling an electronic lock comprising a module 2 for controlling an electronic lock and an electronic key that is configured to wirelessly communicate with the electronic lock.
  • the module 2 may be mounted on a door 1, which may be a door of a house, locker, cabinet, etc. connected to lock 12 of the door 1.
  • the lock 12 comprises at least one mechanical part 14, i.e. a mechanical locking mechanism, which may comprise dead bolt and/or latch bolt which may, when the door is in a closed position, be extended from the door into a mortise in a doorjamb (not shown) in order to secure the door and restrict access to the area behind the door 1.
  • the module may also control locks of other access restricting members, such as a hatch, lid, etc.
  • Module 2 may comprise an electric motor 6, a detector 10 and a transceiver module 8 which may be controlled by a controller 4. Further electric motor 4 is coupled to the at least one mechanical part 14 and may thus set the mechanical part 14 in motion.
  • An electronic key 16 is configured to communicate with the controller of the electronic lock. In particular, it may transmit one or more wireless signals to the module 2, which may be detected by transceiver module 8 and relayed to the controller 4 for further processing.
  • the electronic key 16 may be implemented as a mobile device, e.g. a transponder that is configured to wirelessly communicate with the lock or as an software application on a mobile communication device such as a smart phone or the like.
  • Fig. 1 shows that the electronic key is located at a predetermined distance 20 away from the lock. Communication between the electronic key and the electronic lock may be possible within an area which may be defined by an maximum communication distance 18 away from the lock 12. If distance between the electronic key and the electronic lock is smaller than the maximum communication distance wireless communication between the electronic key and the electronic lock is possible.
  • the maximum communication distance 18 may depend on the radio interface and the protocol that is used for establishing a radio connection between the electronic key and the electronic lock.
  • the maximum communication distance be in the range 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Fig. 2 is a flow diagram illustrating a method for controlling the electronic lock according to an embodiment of the invention. The method may be executed by the system described with reference to Fig. 1 .
  • the module 2 repeatedly transmits, e.g. broadcasts, notification messages comprising an identifier ID of the module 2.
  • notification messages comprising an identifier ID of the module 2.
  • the electronic key 16 will receive one or more of these notification messages, one notification message indicated by arrow 24.
  • the electronic key 16 is "in reach" of the module 2, and in particular of transceiver module 8.
  • the electronic key 16 and the controller 4 may establish a wireless connection (step 26).
  • the wireless connection may be a secure connection based on encryption techniques known in the art, such as the Elliptic curve Diffie-Hellman algorithm part of the Bluetooth 4.0 core spec.
  • One precondition for establishing the connection 26 may be that the electronic key 16 is a so-called trusted device of the module 2.
  • the wireless connection and the signaling between the module 2 and the electronic key 16 may be may be based on any suitable wireless protocol.
  • a wireless protocol may be used that is configured to execute proximity monitoring between the electronic key and the electronic lock, such as a Bluetooth protocol, in particular the Bluetooth Proximity Profile.
  • a Bluetooth protocol in particular the Bluetooth Proximity Profile.
  • This Proximity Profile protocol is 1.0.1 adopted on 14 July 2015, the specification of which is incorporated herein by reference in its entirety.
  • the proximity monitoring process may provide a measure for the distance between the electronic key and the electronic lock.
  • an authentication procedure may be executed in which the controller authenticates the electronic key 16.
  • the controller may determine whether the electronic key is registered with the controller. To that end, the controller 4 may use an identifier of the electronic key 16, that is transmitted to the controller. The controller 4 may then verify whether electronic key 16 is allowed to unlock the lock 12, for example by finding the identifier of the electronic key 16 in a database comprising identifiers of electronic keys that are allowed to open the lock 12. Said database may be stored in a memory of the controller. Additionally or alternatively, said database may be stored on a remote server.
  • the controller 4 receives, for example via the connection 26, an authentication code from the electronic key 16 and the controller 4 may be configured to determine on the basis of this authentication code that the electronic key 16 is allowed to open the lock 12.
  • the controller 4 is configured to monitor the distance between the electronic key 16 and the module 4.
  • the controller 4 is configured to monitor the distance by monitoring the connection 26, optionally in conformance with a protocol such as the Bluetooth Proximity Profile protocol.
  • the controller 4 may be configured to repeatedly determine the power as received of the signals, such as the RSSI, from the electronic key 16.
  • Step 32 depicts controller 4 determining that the electronic key is within a first distance 18 (the maximum communication distance as described with reference to Fig. 1 ) of the lock 12 and/or module 2.
  • the controller 4 may be configured to compare the monitored distance to the first distance, which may be stored in a memory of the controller 4 and/or to compare a determined power of a signal as received from the electronic key 16 with a threshold power.
  • partially unlocking may comprise partially retracting a bolt, for example retracting back into a door 1.
  • partially unlocking may comprise fully retracting a bolt, such as a dead bolt, of the lock, yet without fully unlocking the lock because another bolt, such as a latch bolt, is still extended, in an example extended from a door 1 into a mortise of a door jamb, the latch bolt securing the door 1.
  • step 38 the controller determines that the electronic key 16 is within a second distance, indicated in Fig. 1 by reference numeral 22, of the lock and/or module 2. It should be appreciated that any of the above described techniques may be used for determining the distance between the electronic key 16 and the lock 12.
  • the controller 4 may be configured to enable initiation of the second phase illustrated in step 40. It should be appreciated that by default initiation of the second phase is disabled and that the controller is configured, e.g. programmed, to only initiate the second if at least the controller 4 has determined that the electronic key 16 is within a second distance 22 from the lock.
  • the controller 4 is configured to initiate the second phase on the basis of a detected action of a user.
  • the first phase must have been completed before the second phase can be initiated.
  • Step 42 illustrates that the module 2, in particular the detector 10, detects the action of the user.
  • the controller 4 initiates the second phase in step 44, in an example by controlling the electric motor 6 to further unlock the lock 12, which is depicted by step 46.
  • the first phase has completed prior to detection of the user action, so that upon detection of the user action the second phase can be initiated without delay caused by the first phase not having completed yet.
  • Fig. 3 is an exploded view of a lock assembly according to an embodiment of the invention.
  • the door 1 comprises a cavity 3 and two opposing holes 5 that provide an open connection through the cavity 3 between the interior I on one side of the door and the exterior E on another side of the door.
  • a lock case 12 comprising a through-hole 58 is mounted in the cavity 3.
  • the through-hole 58 aligns with the two holes 5 in the door 1, as a result of which an open connection between interior and exterior is provided.
  • a cylinder housing 54 accommodating a cylinder 52 is mounted in the open connection.
  • the cylinder 52 comprises a cam 62 that upon rotation of the cylinder 52 drives mechanical components in the lock case 12 for retracting into or extending from the lock case 12 a latch bolt 14a and dead bolt 14b. As known, these bolts, when extended from the lock case 12, sit in a mortise in a door jamb (not shown) for securing the door 1.
  • the cylinder housing 54 is configured to provide a channel through the lock when it is mounted in the through-hole 58 in the sense that it comprises a recess that runs along a length of the housing 54.
  • the channel provides a passage for electrical wiring, for example to electrically connect a detector 10 on the exterior side E of the door to a power supply on the interior side I of the door 1.
  • the power supply (not shown) may be positioned inside housing 59.
  • the lock case 12 may be a conventional lock case.
  • Mounting plate 56 provides additional stability for a housing 59 when mounted on door 1.
  • Housing 59 may accommodate at least one of the electric motor, the transceiver module 10 and controller 4 as described herein.
  • a rotatable handle 60 such as a rotatable door knob, may be mounted on the housing 59.
  • the rotatable handle 60 is coupled to the cylinder 52, so that a rotation of handle causes 60 a rotation of the cylinder 52.
  • the handle 60 may be thus on the inside I of the door and may enable a user to manually open the door.
  • the lock may thus be both controllable by the module 2 and by a handle on the inside according to mechanisms known in the art.
  • the assembly of elements depicted in Fig. 3 may be installed in a door 1.
  • Door 1 may be a door of a house.
  • the arrows I and E respectively indicate the inside area and the outside area associated with the lock 12 and/or door 1.
  • the inside area may be an area to which access is to be controlled by means of the lock 12, such as the inside of a home, the outside area may be a freely accessible area, such as a public area.
  • a handle 50 when mounted, has a fixed position with respect to the lock.
  • the lock 12 may not be controllable by a handle on the outside of the lock, which is typical for front doors of houses.
  • Detector 10 may comprise a display 11 and one or more buttons 13.
  • the display 11 and/or the buttons 13 may comprise touch sensitive areas thus forming a user interface for the electronic lock.
  • the display 11, which may thus be a touch-sensitive display, and the one or more buttons 13 enable a user to interact with the module 2.
  • the detector 10 comprises electrical wiring 48 which can be connected to the controller 4 (not shown) and/or a power supply of the module 2.
  • the electrical wiring 48 enables data communication between the controller and the detector 10. Power may also be provided to the detector 10 through the electrical wiring 48.
  • Fig. 5 shows a housing 54 and cylinder 52 of a cylinder lock according to an embodiment of the invention.
  • the housing and the cylinder may be configured to cooperate with a standardized locking mechanism, such as the European cylinder door lock mechanism.
  • the cylinder 52 may comprises at least one cam 62 that is configured to drive at least one mechanical part of the lock 12, such as a sprocket-wheel.
  • Cylinder 52 may comprise a recess 53 along at least part of a length of the cylinder 52, the recess 53 enabling other parts to grasp the cylinder. Further, the front face of the housing is closed and does not comprise an opening for receiving a mechanical key.
  • the housing comprises a recess 64 that runs along a length of the housing.
  • the recess 64 provides a channel for electrical wiring 48.
  • Fig. 6 shows an exemplary shape of a through-hole 58a in a lock.
  • the shape is a standard shape of an Euro profile lock.
  • Fig. 7A shows a profile of a housing 54a associated with the shape shown in Fig. 6 according to one embodiment.
  • the profile of the support structure 54a comprises a cutaway part 64 in the bottom part of the support structure 54a.
  • FIG. 7B shows a profile of a housing 54b according to one embodiment.
  • the housing 54b is associated with the through hole 58a shown in FIG. 6 .
  • the housing comprises a through-hole 55, which provides the channel when the housing 54b is mounted in through-hole 58a shown in FIG. 6 .
  • FIG. 7C shows an embodiment wherein the through-hole 58c is configured to provide a channel through the lock when the housing 54c is mounted in the through-hole.
  • through-hole 58c comprises an additional notch 65, that provides a through-hole through the lock case when a conventional cylinder housing 54c is mounted in it.
  • FIGs. 6 and 7A, 7B and 7C illustrate that the housing 54 may be mated to the through-hole 58 and/or mated to the shape of the through-hole, in the sense that a profile of the housing 54 has substantially the same shape as the through-hole and/or in the sense that, when the housing is mounted in the through-hole, a shape of at least part of the housing in the through-hole substantially corresponds to the shape of the through-hole 58 so that the housing tightly fits into the through-hole 58.
  • Figs. 8A-C depicts various flow diagrams of methods for controlling an electronic lock according to various embodiments of the invention.
  • Fig. 8A depicts a flow diagram wherein in a first step 180 the lock may transmit at a predetermined intervals a signal comprising lock identifier, which may be a unique identifier.
  • a wireless connection between the lock and an electronic (trusted) device, the electronic key may be formed when the trusted device receives the signal comprising the lock identifier (step 182).
  • an authentication procedure may be executed between the lock and the trusted device. The authentication procedure may comprise exchanging identifiers and/or authentication codes.
  • the lock may monitor the distance between lock and the trusted device.
  • the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection (step 188).
  • connection may be terminated if the distance between the lock and the electronic key is or remains larger than a predetermined distance x (step 190). If the device is within a predetermined distance the electronic motor is controlled for driving the mechanical locking mechanism, wherein the driving retracting a deadbolt of the lock (step 192).
  • Fig. 8B depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving retracting a deadbolt of the lock (step 192).
  • step 194 the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection. In that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 196).
  • the user interface of the lock may detect an interaction, e.g. somebody touching the user interface, while the distance between the lock and the device is larger than predetermined second distance Z. In that case, the state of the lock does not change, because the controller does not enable initiation of the second phase if the electronic key is not within the predetermined second distance (step 200).
  • the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 204).
  • Fig. 8C depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving fully retracting a deadbolt of the lock (step 192).
  • the electronic lock may determine that the distance between the lock and the device may be smaller than predetermined second distance Z (step 206).
  • the electronic motor may be controlled for driving the mechanical locking mechanism, the driving retracting a latch bolt (step 210), in order to fully open the lock (step 212).
  • the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 216).
  • Fig. 9 depicts a block diagram illustrating an exemplary data processing system that may be used in a computing system as described with reference to Fig. 2 .
  • the data processing system 100 may include at least one processor 102 coupled to memory elements 104 through a system bus 106. As such, the data processing system may store program code within memory elements 104. Further, the processor 102 may execute the program code accessed from the memory elements 104 via a system bus 106. In one aspect, the data processing system may be implemented as a computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the data processing system 100 may be implemented in the form of any system including a processor and a memory that is capable of performing the functions described within this specification.
  • the memory elements 104 may include one or more physical memory devices such as, for example, local memory 108 and one or more bulk storage devices 110.
  • the local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code.
  • a bulk storage device may be implemented as a hard drive or other persistent data storage device.
  • the processing system 100 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from the bulk storage device 110 during execution.
  • I/O devices depicted as an input device 112 and an output device 114 optionally can be coupled to the data processing system.
  • input devices may include, but are not limited to, a keyboard, a pointing device such as a mouse, or the like.
  • output devices may include, but are not limited to, a monitor or a display, speakers, or the like.
  • Input and/or output devices may be coupled to the data processing system either directly or through intervening I/O controllers.
  • the input and the output devices may be implemented as a combined input/output device (illustrated in Fig. 9 with a dashed line surrounding the input device 112 and the output device 114).
  • a combined device is a touch sensitive display, also sometimes referred to as a "touch screen display” or simply "touch screen”.
  • input to the device may be provided by a movement of a physical object, such as e.g. a stylus or a finger of a user, on or near the touch screen display.
  • a network adapter 116 may also be coupled to the data processing system to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks.
  • the network adapter may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to the data processing system 100, and a data transmitter for transmitting data from the data processing system 100 to said systems, devices and/or networks.
  • Modems, cable modems, and Ethernet cards are examples of different types of network adapter that may be used with the data processing system 100.
  • the memory elements 104 may store an application 118.
  • the application 118 may be stored in the local memory 108, the one or more bulk storage devices 110, or apart from the local memory and the bulk storage devices.
  • the data processing system 100 may further execute an operating system (not shown in Fig. 9 ) that can facilitate execution of the application 118.
  • the application 118 being implemented in the form of executable program code, can be executed by the data processing system 100, e.g., by the processor 102. Responsive to executing the application, the data processing system 100 may be configured to perform one or more operations or method steps described herein.
  • the data processing system 100 may represent a controller as described herein. In one aspect of the present invention, the data processing system 100 may represent an electronic key as described herein.
  • the data processing system 100 may represent a client data processing system.
  • the application 118 may represent a client application that, when executed, configures the data processing system 100 to perform the various functions described herein with reference to a "client".
  • client can include, but are not limited to, a personal computer, a portable computer, a mobile phone, or the like.
  • the data processing system x00 may represent a server.
  • the data processing system may represent an (HTTP) server, in which case the application x18, when executed, may configure the data processing system to perform (HTTP) server operations.
  • HTTP HyperText Transfer Protocol
  • Various embodiments of the invention may be implemented as a program product for use with a computer system, where the program(s) of the program product define functions of the embodiments (including the methods described herein).
  • the program(s) can be contained on a variety of non-transitory computer-readable storage media, where, as used herein, the expression "non-transitory computer readable storage media" comprises all computer-readable media, with the sole exception being a transitory, propagating signal.
  • the program(s) can be contained on a variety of transitory computer-readable storage media.
  • Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.
  • the computer program may be run on the processor 102 described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

This disclosure relates to a lock assembly comprising a lock case and a housing. The lock case comprises a through-hole. The housing accommodates a rotatable member. In an example, the housing is a cylinder housing accommodating a cylinder of a cylinder lock. Further, the housing is mated to and mounted in the through-hole. At least one of the housing and the through-hole provide a channel through the lock case.

Description

    FIELD OF THE INVENTION
  • This disclosure relates to a lock assembly, to a housing for a rotatable member, in particular for a cylinder of a cylinder lock, and to a lock case.
  • BACKGROUND OF THE INVENTION
  • Keyless entry systems conveniently allow a person to access an area, such as his home, without having to insert a key into a lock. Remotely controlled locks are known in the art that may be unlocked by a user pressing a button on a transponder, the transponder transmitting a signal to the lock wherein the signal triggers an electronic motor for unlocking the mechanical lock mechanism.
  • Modifying an existing, conventional lock so that it can be opened without the insertion of a key into the lock, i.e. to implement a "keyless functionality" into an existing lock, may be cumbersome. Typically, keyless lock systems require a wired electrical connection between a power supply or controller on one side of the door and an electrical device, such as an antenna for receiving wireless signals from a transponder, on another side of the door. Hence, if a home owner wants to implement a keyless functionality into an existing lock, he will have to drill a hole through the door for forming a passage through the door for electrical wiring.
  • Hence, from the above, it follows that there is a need in the art for technology that facilitates implementing a keyless functionality into an existing lock.
  • SUMMARY
  • One aspect of this disclosure relates to a lock assembly comprising a lock case comprising a through-hole, the lock assembly further comprising a housing accommodating a rotatable member, wherein the housing is mated to and mounted in the through-hole, and wherein at least one of the housing and the through-hole provide a channel through the lock case.
  • Advantageously, the lock assembly provides a channel through the lock when the lock assembly is mounted on a door, which obviates the need to drill an additional hole through the door when a keyless functionality is to be implemented into an existing lock.
  • In one embodiment, the rotatable member is a cylinder of a cylinder lock.
  • In one embodiment, the housing provides the channel through the lock case.
  • In one embodiment, the housing comprises a recess running along a length of the housing.
  • In one embodiment, the recess is located in a bottom part of the housing.
  • In one embodiment, the channel provides a passage for electrical wiring.
  • In one embodiment, the through-hole is shaped in accordance with a standardized lock profile.
  • In one embodiment, the through-hole is shaped in accordance with the Euro Profile lock standard, for example in accordance with the standard as disclosed by at least one of the documents DIN 18250, DIN 18251 and DIN 18252 published by the Deutsches Institut fur Normung (German Institute for Standardization).
  • In one embodiment, the through-hole is shaped in accordance with an Oval lock standard, such as a UK Oval lock standard, Scandinavian Oval lock standard or Australian Oval lock standard.
  • In one embodiment, the through-hole is shaped in accordance with the Swiss profile lock standard.
  • In one embodiment, the through-hole is shaped in accordance with the KIK lock standard.
  • In one embodiment, a front face of the housing does not comprise an opening for receiving a mechanical key.
  • One aspect of this disclosure relates to housing for accommodating a rotatable member, the housing being mated to a through-hole in a lock case, wherein the housing is configured to provide a channel through the lock case when the housing is mounted in the through-hole.
  • In one embodiment, the housing comprises a recess running along the length of the housing.
  • One aspect of this disclosure relates to a lock case for use in a lock assembly. The lock case comprises a through-hole mated to a housing, wherein the through-hole is configured to provide a channel through the lock case when the housing is mounted in the through-hole.
  • In an aspect, the invention relates to a module for controlling an electronic lock, the module being configured to unlock the lock in at least two phases, a first phase and a second phase; wherein the module may comprise: an electric motor configured to drive a mechanical locking mechanism for unlocking the lock; a controller that is configured to control the electric motor and to receive one or more wireless signals from an electronic key; a user interface connected to the controller configured to detect a user interaction; wherein the controller is further configured to: determine on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiate the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detect interaction with the user interface of the lock; and, after completion of the first phase, initiate on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • In a further aspect, the invention relates to a method for controlling an electronic lock to unlock in at least two phases, a first phase and a second phase, the method comprising: controlling an electronic motor driving a mechanical locking mechanism and receiving one or more wireless signals from an electronic key; determining on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiating the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detecting interaction with a user interface of the lock; after completion of the first phase, initiating on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • In a further aspect, the invention relates to a controller for a module as describe above, the controller comprising: a computer readable storage medium having computer readable program code embodied therewith, and, a processor, preferably a microprocessor, coupled to the computer readable storage medium, wherein responsive to executing the computer readable program code, the processor is configured to perform executable operations comprising the method steps as described above.
  • Mechanical locking mechanisms, in particular mechanical locking mechanism such as the European cylinder door lock mechanisms, exist wherein the cylinder has to turn multiple times, e.g. over 960 degrees, before the lock is unlocked. When trying to implement a keyless entry system on the basis of such mechanical locking mechanism fully unlocking the lock may take considerable time after the user has pressed the button of the transponder. As a result, the user may experience an undesirable waiting time before he can actually open a door. This waiting time may even get worse as a result of some conflicting requirements of an electronic lock.
  • On one hand, an electric motor of a lock is preferably small. Small motors namely tend to be more energy efficient, which is important because frequent change of batteries is undesired. In addition, small motors can be elegantly integrated with existing locks and can be conveniently mounted on doors. On the other hand, an electric motor must be able to deliver a certain threshold force or torque in order to drive the mechanical lock mechanism, which may include a cylinder of a cylinder lock. In principle, larger electric motors are able to deliver higher forces.
  • One way to address these conflicting requirements is to implement gearing. Gearing enables to amplify an input force or torque delivered by the electric motor to the gearing system. The amplified output torque may then be sufficient to drive the mechanical parts of the lock. Hence, a small electric motor can indeed cause a force or torque of sufficient magnitude for driving mechanical parts of the lock. However, as known, amplifying a torque by means of gearing is associated with a reduction in velocity, for example a reduction in the angular velocity of a cylinder of a cylinder lock.
  • As a result, once a user has indicated that he wants to open an electronic lock known from the prior art, he typically has to wait for considerable time before the lock has completely unlocked. For example, if a small electric motor were to drive mechanical locking mechanisms such as the European cylinder door lock mechanisms, aided by appropriate gearing, the user may have to wait ten seconds before he can open the door.
  • The module, method and controller disclosed herein enable improved keyless entry systems that at least reduce the waiting time for a user that intends to unlock a lock, for example a lock on a door of the user's home. Hereto, the module is configured to unlock the lock in two phases. The first phase is initiated by the controller in response to determining that an electronic key, and presumably a person holding the key, is within a predetermined distance of the lock. As will be understood, an appropriately chosen distance allows the controller to already initiate the first phase while the user is approaching and has not yet reached the lock. Hence, the lock will have already partially unlocked when the user arrives at the lock. If the user then indicates that he indeed intends to unlock, the controller will initiate the second phase and further unlock, e.g. completely unlock so that the user can access a house, locker, etc. The second phase may only start once a user has interacted with the lock, for example touching the lock, therefore the risk of unintentionally completely unlocking the lock is avoided.
  • The electronic key may be associated with the lock and/or may comprise a smartphone or any other portable device that can transmit wireless signals. The controller may be configured to control the transceiver module to transmit and receive messages from the key.
  • The mere reception of the signal from the key may be sufficient for the controller to determine that the key is within the predetermined distance from the lock.
  • The predetermined distance may be a distance in the range of 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Measures may be taken to neglect an electronic key if it is within the predetermined distance from the lock, yet already in the area for which access controlled, the "inside" area, e.g. already in the house. Such measures may comprise at least one of the electronic key and the controller determining that the electronic key is in the "inside" area on the basis of Wifi and/or geofencing.
  • The user interaction may be indicative of an intention of the user to unlock the lock.
  • In embodiments of the module, method and controller one or more wireless signals comprise an identifier of the electronic key and/or an authentication code. In these embodiments, the controller is configured for, and the method comprises, enabling on the basis of the received identifier and/or on the basis of the authentication code initiation of the first phase. This embodiment provides convenient security measures for opening the lock.
  • In one embodiment the module comprises a rotatable member, such as a rotatable cylinder, coupled to the electric motor, the rotatable member being configured to drive the mechanical locking mechanism of the lock by rotating. In embodiments of the module and/or of the method, the controller is configured for, and the method comprises, controlling the electric motor to rotate the member in the first phase over a first angular distance from a first angular position to an intermediate angular position and controlling the electric motor to rotate the member in the second phase over a second angular distance from the intermediate angular position to a second angular position. These embodiments are advantageous because they enable that existing cylinder locks can be conveniently controlled.
  • The direction of said respective rotations in the first and second phase may be the same. Also, the second angular distance may be smaller than the first angular distance.
  • In one embodiment the mechanical locking mechanism comprises a dead bolt and a latch bolt. In embodiments, the controller is configured for, and/or the method comprises, retracting the deadbolt in the first phase and retracting the latch bolt in the second phase.
  • These embodiments allow easy calibration of the module, because the end of the first phase is clearly recognizable. At the end of the first phase, the dead bolt may namely be fully retracted, whereas the latch bolt may have not retracted at all.
  • In one embodiment the user interface comprises a touch sensitive surface and the interaction comprises the user touching the touch sensitive surface.
  • The touch surface may be, when the module is mounted on the lock for controlling the lock, at the outside of the door.
  • In embodiments, the controller is configured for, and/or the method comprises, establishing a secure connection with the electronic key. The secure connection may be established using techniques known in the art.
  • In embodiments, the controller is configured for, and/or the method comprises, determining a power of the one or more wireless signals as received, determining that the power as received exceeds a threshold value and in response determining that the key is within the predetermined distance from the lock.
  • The controller may be configured to determine, or calibrate, the threshold value on the basis of an indication of a power of the signal as transmitted by the electronic key. If for example the key transmits signals of lower power, the threshold value may be lower, whereas the threshold value may be higher if the key transmits signals of higher power. The controller may additionally or alternatively be configured to calculate a round-trip time of a signal. The controller may be configured to determine that the electronic key is within the predetermined distance on the basis of the calculated round-trip time, for example on the basis of the calculated round-trip time being shorter than a predetermined time.
  • In embodiments, the controller is configured for, and/or the method comprises, establishing a wireless connection with the electronic key; and for monitoring a quality of the connection and determining on the basis of the quality of the connection that the electronic key is within the predetermined distance.
  • The controller may be configured to repeatedly measure the quality of the connection, for example by measuring a power of the signal as received, such as an RSSI (Received Signal Strength Indicator). Also, the key may be configured to determine the quality of the connection, for example by measuring a power of a further signal as received by the key, wherein the further signal is transmitted by the transceiver module to the key. The key may then transmit the quality as measured by the key to the module.
  • In one embodiments, controller is configured for, and/or the method comprises, receiving a second wireless signal from the key and determining, prior to initiation of the second phase, on the basis of the received second signal that the key is within a predetermined second distance from the lock and in response enabling initiating the second phase, preferably the second distance being smaller than the predetermined distance.
  • This embodiment is advantageous because it prevents that a door can be opened by a malicious person when the first phase has completed, although the owner holding the key does not (yet) intend to unlock the door, for example because he is still sitting in his car near the lock.
  • It should be understood that in this embodiment the controller may thus be configured to only open the lock if at least two conditions i) and ii) are satisfied, namely i) the detector has detected an action of the user and ii) the key is within the predetermined second distance of the lock.
  • The second distance may be in the range of 0-5 meters, preferably 0-2 meters, more preferably 0-1 meter.
  • In one embodiment the module is mountable on a lock.
  • In one embodiment, the lock in locked state is configured to secure a member, such as a door, for restricting access to an area and in these embodiments the module further comprises a sensor that is configured to generate a position signal that is indicative of a position of the member. In embodiments, the controller is configured for, and/or the method comprises, controlling the lock to lock itself on the basis of the position signal.
  • This embodiment enables that the lock automatically locks a door once the door is closed again after it has been opened.
  • The controller may be configured to determine on the basis of the position signal that the member has moved from a position in which the member provides access to the area to be accessed to a position in which the member restricts access and in response control the lock to lock itself.
  • The sensor may comprise a magnetic sensor that is configured to measure a magnetic field strength for example a magnetic field strength caused by a (permanent) magnet mounted on a door and/or a magnetic field strength of the earth's magnetic field. In the latter case the sensor may be understood to comprise a compass. A compass mounted on for example a door enables the controller to determine the orientation of the door which allows to determine whether the door is open or shut.
  • In embodiments, the controller is configured for, and/or the method comprises, controlling the lock to fully lock after the first phase has completed in response to at least one of:
    • the controller determining that an established connection between the electronic key and the transceiver module has terminated;
    • the controller determining that a first time period since completion of the first phase has passed without determining that the key is in the second area;
    • the controller determining that a second time period has passed since determining that the key is in the second area.
  • These embodiments provide additional security measures in the sense that the lock will not be partially unlocked for a long time.
  • The first time period may for 20-60 seconds, preferably for 25-35 seconds. The second time period may last for 5-30 seconds, preferably 10-20 seconds.
  • In one embodiment a module is provided according to claim 13.
  • As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, a method or a computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module" or "system." Functions described in this disclosure may be implemented as an algorithm executed by a processor/microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied, e.g., stored, thereon.
  • Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a computer readable storage medium may include, but are not limited to, the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of the present invention, a computer readable storage medium may be any tangible medium that can contain, or store, a program for use by or in connection with an instruction execution system, apparatus, or device.
  • A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java(TM), Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor, in particular a microprocessor or a central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
  • In one aspect, embodiments of the present invention may relate to a computer-implemented method for controlling a lock.
  • Moreover, a computer program for carrying out the methods described herein, as well as a non-transitory computer readable storage-medium storing the computer program are provided. A computer program may, for example, be downloaded (updated) to the existing controller (e.g. to the existing or be stored upon manufacturing of these systems.
  • Embodiments of the present invention will be further illustrated with reference to the attached drawings, which schematically will show embodiments according to the invention. It will be understood that the present invention is not in any way restricted to these specific embodiments.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Aspects of this disclosure will be explained in greater detail by reference to exemplary embodiments shown in the drawings in which:
    • Fig. 1 schematically shows a system for controlling an electronic lock according to an embodiment of the invention;
    • Fig. 2 depicts a flow diagram of a method for controlling the electronic lock according to an embodiment of the invention;
    • Fig. 3 is an exploded view of one embodiment;
    • Fig. 4 shows an assembly of a lock, module and door according to one embodiment;
    • Fig. 5-7 show in detail a cylinder and housing according to an embodiment;
    • Figs. 8A-C depicts various flow diagrams of methods for controlling the electronic lock according to various embodiments of the invention;
    • Fig. 9 depicts a block diagram illustrating an exemplary data processing system that may be used in a controller or electronic key.
    DETAILED DESCRIPTION OF THE DRAWINGS
  • Fig. 1 schematically shows a system for controlling an electronic lock according to an embodiment of the invention. In particular, Fig. 1 depicts a system for controlling an electronic lock comprising a module 2 for controlling an electronic lock and an electronic key that is configured to wirelessly communicate with the electronic lock.
  • The module 2 may be mounted on a door 1, which may be a door of a house, locker, cabinet, etc. connected to lock 12 of the door 1. The lock 12 comprises at least one mechanical part 14, i.e. a mechanical locking mechanism, which may comprise dead bolt and/or latch bolt which may, when the door is in a closed position, be extended from the door into a mortise in a doorjamb (not shown) in order to secure the door and restrict access to the area behind the door 1. The module may also control locks of other access restricting members, such as a hatch, lid, etc.
  • Module 2 may comprise an electric motor 6, a detector 10 and a transceiver module 8 which may be controlled by a controller 4. Further electric motor 4 is coupled to the at least one mechanical part 14 and may thus set the mechanical part 14 in motion.
  • An electronic key 16 is configured to communicate with the controller of the electronic lock. In particular, it may transmit one or more wireless signals to the module 2, which may be detected by transceiver module 8 and relayed to the controller 4 for further processing. The electronic key 16 may be implemented as a mobile device, e.g. a transponder that is configured to wirelessly communicate with the lock or as an software application on a mobile communication device such as a smart phone or the like.
  • Fig. 1 shows that the electronic key is located at a predetermined distance 20 away from the lock. Communication between the electronic key and the electronic lock may be possible within an area which may be defined by an maximum communication distance 18 away from the lock 12. If distance between the electronic key and the electronic lock is smaller than the maximum communication distance wireless communication between the electronic key and the electronic lock is possible. The maximum communication distance 18 may depend on the radio interface and the protocol that is used for establishing a radio connection between the electronic key and the electronic lock. The maximum communication distance be in the range 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Fig. 2 is a flow diagram illustrating a method for controlling the electronic lock according to an embodiment of the invention. The method may be executed by the system described with reference to Fig. 1.
  • In a first step 24, the module 2 repeatedly transmits, e.g. broadcasts, notification messages comprising an identifier ID of the module 2. Once the electronic key 16 is close enough to the transceiver module 8, the electronic key 16 will receive one or more of these notification messages, one notification message indicated by arrow 24. The electronic key 16 is "in reach" of the module 2, and in particular of transceiver module 8. Once the electronic key 16 may receive notification message 24, the electronic key 16 and the controller 4 may establish a wireless connection (step 26).
  • In an embodiment, the wireless connection may be a secure connection based on encryption techniques known in the art, such as the Elliptic curve Diffie-Hellman algorithm part of the Bluetooth 4.0 core spec. One precondition for establishing the connection 26 may be that the electronic key 16 is a so-called trusted device of the module 2.
  • It should be appreciated that the wireless connection and the signaling between the module 2 and the electronic key 16 may be may be based on any suitable wireless protocol. In an embodiment, a wireless protocol may be used that is configured to execute proximity monitoring between the electronic key and the electronic lock, such as a Bluetooth protocol, in particular the Bluetooth Proximity Profile. One version of this Proximity Profile protocol is 1.0.1 adopted on 14 July 2015, the specification of which is incorporated herein by reference in its entirety. The proximity monitoring process may provide a measure for the distance between the electronic key and the electronic lock.
  • After the connection between electronic key 16 and controller 4 has been established, an authentication procedure may be executed in which the controller authenticates the electronic key 16. During the authentication, the controller may determine whether the electronic key is registered with the controller. To that end, the controller 4 may use an identifier of the electronic key 16, that is transmitted to the controller. The controller 4 may then verify whether electronic key 16 is allowed to unlock the lock 12, for example by finding the identifier of the electronic key 16 in a database comprising identifiers of electronic keys that are allowed to open the lock 12. Said database may be stored in a memory of the controller. Additionally or alternatively, said database may be stored on a remote server.
  • In one embodiment the controller 4 receives, for example via the connection 26, an authentication code from the electronic key 16 and the controller 4 may be configured to determine on the basis of this authentication code that the electronic key 16 is allowed to open the lock 12.
  • In one embodiment, the controller 4 is configured to monitor the distance between the electronic key 16 and the module 4. In an example, the controller 4 is configured to monitor the distance by monitoring the connection 26, optionally in conformance with a protocol such as the Bluetooth Proximity Profile protocol. In particular, the controller 4 may be configured to repeatedly determine the power as received of the signals, such as the RSSI, from the electronic key 16.
  • Step 32 depicts controller 4 determining that the electronic key is within a first distance 18 (the maximum communication distance as described with reference to Fig. 1) of the lock 12 and/or module 2. Hereto, the controller 4 may be configured to compare the monitored distance to the first distance, which may be stored in a memory of the controller 4 and/or to compare a determined power of a signal as received from the electronic key 16 with a threshold power.
  • Once the controller has determined that the electronic key 16 is within the first distance 18, the controller 4 controls in step 34 the electric motor 6 to drive at least one mechanical part 14 of the lock to partially unlock. It should be appreciated that partially unlocking may comprise partially retracting a bolt, for example retracting back into a door 1. In another example partially unlocking may comprise fully retracting a bolt, such as a dead bolt, of the lock, yet without fully unlocking the lock because another bolt, such as a latch bolt, is still extended, in an example extended from a door 1 into a mortise of a door jamb, the latch bolt securing the door 1.
  • In step 38 the controller determines that the electronic key 16 is within a second distance, indicated in Fig. 1 by reference numeral 22, of the lock and/or module 2. It should be appreciated that any of the above described techniques may be used for determining the distance between the electronic key 16 and the lock 12. In response, the controller 4 may be configured to enable initiation of the second phase illustrated in step 40. It should be appreciated that by default initiation of the second phase is disabled and that the controller is configured, e.g. programmed, to only initiate the second if at least the controller 4 has determined that the electronic key 16 is within a second distance 22 from the lock.
  • The controller 4 is configured to initiate the second phase on the basis of a detected action of a user. In one embodiment the first phase must have been completed before the second phase can be initiated. Step 42 illustrates that the module 2, in particular the detector 10, detects the action of the user. In response, the controller 4 initiates the second phase in step 44, in an example by controlling the electric motor 6 to further unlock the lock 12, which is depicted by step 46. Preferably, the first phase has completed prior to detection of the user action, so that upon detection of the user action the second phase can be initiated without delay caused by the first phase not having completed yet.
  • Fig. 3 is an exploded view of a lock assembly according to an embodiment of the invention. The door 1 comprises a cavity 3 and two opposing holes 5 that provide an open connection through the cavity 3 between the interior I on one side of the door and the exterior E on another side of the door. When the lock assembly is mounted in the door 1 (as shown in fig. 4), a lock case 12 comprising a through-hole 58 is mounted in the cavity 3. The through-hole 58 aligns with the two holes 5 in the door 1, as a result of which an open connection between interior and exterior is provided. Then, a cylinder housing 54 accommodating a cylinder 52 is mounted in the open connection. The cylinder 52 comprises a cam 62 that upon rotation of the cylinder 52 drives mechanical components in the lock case 12 for retracting into or extending from the lock case 12 a latch bolt 14a and dead bolt 14b. As known, these bolts, when extended from the lock case 12, sit in a mortise in a door jamb (not shown) for securing the door 1.
  • In this embodiment, the cylinder housing 54 is configured to provide a channel through the lock when it is mounted in the through-hole 58 in the sense that it comprises a recess that runs along a length of the housing 54. The channel provides a passage for electrical wiring, for example to electrically connect a detector 10 on the exterior side E of the door to a power supply on the interior side I of the door 1. The power supply (not shown) may be positioned inside housing 59. Advantageously, in this embodiment, the lock case 12 may be a conventional lock case. Thus, when, someone wishes to implement a keyless functionality into an existing lock assembly that comprises a conventional lock case, he will not have to replace the lock case, nor will he have to drill an additional hole through the door for electrical wiring.
  • Mounting plate 56 provides additional stability for a housing 59 when mounted on door 1. Housing 59 may accommodate at least one of the electric motor, the transceiver module 10 and controller 4 as described herein. A rotatable handle 60, such as a rotatable door knob, may be mounted on the housing 59. The rotatable handle 60 is coupled to the cylinder 52, so that a rotation of handle causes 60 a rotation of the cylinder 52. The handle 60 may be thus on the inside I of the door and may enable a user to manually open the door. The lock may thus be both controllable by the module 2 and by a handle on the inside according to mechanisms known in the art.
  • The assembly of elements depicted in Fig. 3 may be installed in a door 1. Door 1 may be a door of a house. The arrows I and E respectively indicate the inside area and the outside area associated with the lock 12 and/or door 1. The inside area may be an area to which access is to be controlled by means of the lock 12, such as the inside of a home, the outside area may be a freely accessible area, such as a public area. In the embodiment shown, a handle 50, when mounted, has a fixed position with respect to the lock. The lock 12 may not be controllable by a handle on the outside of the lock, which is typical for front doors of houses.
  • Detector 10 may comprise a display 11 and one or more buttons 13. The display 11 and/or the buttons 13 may comprise touch sensitive areas thus forming a user interface for the electronic lock. The display 11, which may thus be a touch-sensitive display, and the one or more buttons 13 enable a user to interact with the module 2. The detector 10 comprises electrical wiring 48 which can be connected to the controller 4 (not shown) and/or a power supply of the module 2. The electrical wiring 48 enables data communication between the controller and the detector 10. Power may also be provided to the detector 10 through the electrical wiring 48.
  • In this embodiment,
    Fig. 5 shows a housing 54 and cylinder 52 of a cylinder lock according to an embodiment of the invention. In an embodiment, the housing and the cylinder may be configured to cooperate with a standardized locking mechanism, such as the European cylinder door lock mechanism.
  • The cylinder 52 may comprises at least one cam 62 that is configured to drive at least one mechanical part of the lock 12, such as a sprocket-wheel. Cylinder 52 may comprise a recess 53 along at least part of a length of the cylinder 52, the recess 53 enabling other parts to grasp the cylinder. Further, the front face of the housing is closed and does not comprise an opening for receiving a mechanical key.
  • In this embodiment, the housing comprises a recess 64 that runs along a length of the housing. When the support structure 54 is mounted in through-hole 58 shown in Fig. 1, the recess 64 provides a channel for electrical wiring 48.
  • Fig. 6 shows an exemplary shape of a through-hole 58a in a lock. In this example, the shape is a standard shape of an Euro profile lock.
  • Fig. 7A shows a profile of a housing 54a associated with the shape shown in Fig. 6 according to one embodiment. In this embodiment the profile of the support structure 54a comprises a cutaway part 64 in the bottom part of the support structure 54a.
  • FIG. 7B shows a profile of a housing 54b according to one embodiment. The housing 54b is associated with the through hole 58a shown in FIG. 6. In this embodiment, the housing comprises a through-hole 55, which provides the channel when the housing 54b is mounted in through-hole 58a shown in FIG. 6.
  • FIG. 7C shows an embodiment wherein the through-hole 58c is configured to provide a channel through the lock when the housing 54c is mounted in the through-hole. With respect to a through-hole of a conventional lock case, such as depicted in FIG. 6, through-hole 58c comprises an additional notch 65, that provides a through-hole through the lock case when a conventional cylinder housing 54c is mounted in it.
  • FIGs. 6 and 7A, 7B and 7C illustrate that the housing 54 may be mated to the through-hole 58 and/or mated to the shape of the through-hole, in the sense that a profile of the housing 54 has substantially the same shape as the through-hole and/or in the sense that, when the housing is mounted in the through-hole, a shape of at least part of the housing in the through-hole substantially corresponds to the shape of the through-hole 58 so that the housing tightly fits into the through-hole 58.
  • Figs. 8A-C depicts various flow diagrams of methods for controlling an electronic lock according to various embodiments of the invention.
  • Fig. 8A depicts a flow diagram wherein in a first step 180 the lock may transmit at a predetermined intervals a signal comprising lock identifier, which may be a unique identifier. A wireless connection between the lock and an electronic (trusted) device, the electronic key, may be formed when the trusted device receives the signal comprising the lock identifier (step 182). In step 184 an authentication procedure may be executed between the lock and the trusted device. The authentication procedure may comprise exchanging identifiers and/or authentication codes. In a further step 186 the lock may monitor the distance between lock and the trusted device. In an embodiment, the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection (step 188). In another embodiment, the connection may be terminated if the distance between the lock and the electronic key is or remains larger than a predetermined distance x (step 190).If the device is within a predetermined distance the electronic motor is controlled for driving the mechanical locking mechanism, wherein the driving retracting a deadbolt of the lock (step 192).
  • Fig. 8B depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving retracting a deadbolt of the lock (step 192). In step 194 the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection. In that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 196).
  • Alternatively, during the retracting of the deadbolt, the user interface of the lock may detect an interaction, e.g. somebody touching the user interface, while the distance between the lock and the device is larger than predetermined second distance Z. In that case, the state of the lock does not change, because the controller does not enable initiation of the second phase if the electronic key is not within the predetermined second distance (step 200).
  • Alternatively, during the retracting of the deadbolt, the a predetermined time U has passed in which the distance between the lock and the device has been larger than predetermined second distance Z (step 202). In that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 204).
  • Fig. 8C depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving fully retracting a deadbolt of the lock (step 192). The electronic lock may determine that the distance between the lock and the device may be smaller than predetermined second distance Z (step 206).
  • In that case, if the user interface of the lock detects an interaction, e.g. a user touching the user interface, (step 208), the electronic motor may be controlled for driving the mechanical locking mechanism, the driving retracting a latch bolt (step 210), in order to fully open the lock (step 212).
  • Alternatively, if the deadbolt of the lock is fully retraced and the distance between the lock and the device may be smaller than predetermined second distance Z and if a predetermined time V has passed without the user interface detecting an interaction (step 214), in that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 216).
  • Fig. 9 depicts a block diagram illustrating an exemplary data processing system that may be used in a computing system as described with reference to Fig. 2.
  • As shown in Fig. 9, the data processing system 100 may include at least one processor 102 coupled to memory elements 104 through a system bus 106. As such, the data processing system may store program code within memory elements 104. Further, the processor 102 may execute the program code accessed from the memory elements 104 via a system bus 106. In one aspect, the data processing system may be implemented as a computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the data processing system 100 may be implemented in the form of any system including a processor and a memory that is capable of performing the functions described within this specification.
  • The memory elements 104 may include one or more physical memory devices such as, for example, local memory 108 and one or more bulk storage devices 110. The local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code. A bulk storage device may be implemented as a hard drive or other persistent data storage device. The processing system 100 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from the bulk storage device 110 during execution.
  • Input/output (I/O) devices depicted as an input device 112 and an output device 114 optionally can be coupled to the data processing system. Examples of input devices may include, but are not limited to, a keyboard, a pointing device such as a mouse, or the like. Examples of output devices may include, but are not limited to, a monitor or a display, speakers, or the like. Input and/or output devices may be coupled to the data processing system either directly or through intervening I/O controllers.
  • In an embodiment, the input and the output devices may be implemented as a combined input/output device (illustrated in Fig. 9 with a dashed line surrounding the input device 112 and the output device 114). An example of such a combined device is a touch sensitive display, also sometimes referred to as a "touch screen display" or simply "touch screen". In such an embodiment, input to the device may be provided by a movement of a physical object, such as e.g. a stylus or a finger of a user, on or near the touch screen display.
  • A network adapter 116 may also be coupled to the data processing system to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks. The network adapter may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to the data processing system 100, and a data transmitter for transmitting data from the data processing system 100 to said systems, devices and/or networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapter that may be used with the data processing system 100.
  • As pictured in Fig. 9, the memory elements 104 may store an application 118. In various embodiments, the application 118 may be stored in the local memory 108, the one or more bulk storage devices 110, or apart from the local memory and the bulk storage devices. It should be appreciated that the data processing system 100 may further execute an operating system (not shown in Fig. 9) that can facilitate execution of the application 118. The application 118, being implemented in the form of executable program code, can be executed by the data processing system 100, e.g., by the processor 102. Responsive to executing the application, the data processing system 100 may be configured to perform one or more operations or method steps described herein.
  • In one aspect of the present invention, the data processing system 100 may represent a controller as described herein. In one aspect of the present invention, the data processing system 100 may represent an electronic key as described herein.
  • In another aspect, the data processing system 100 may represent a client data processing system. In that case, the application 118 may represent a client application that, when executed, configures the data processing system 100 to perform the various functions described herein with reference to a "client". Examples of a client can include, but are not limited to, a personal computer, a portable computer, a mobile phone, or the like.
  • In yet another aspect, the data processing system x00 may represent a server. For example, the data processing system may represent an (HTTP) server, in which case the application x18, when executed, may configure the data processing system to perform (HTTP) server operations.
  • Various embodiments of the invention may be implemented as a program product for use with a computer system, where the program(s) of the program product define functions of the embodiments (including the methods described herein). In one embodiment, the program(s) can be contained on a variety of non-transitory computer-readable storage media, where, as used herein, the expression "non-transitory computer readable storage media" comprises all computer-readable media, with the sole exception being a transitory, propagating signal. In another embodiment, the program(s) can be contained on a variety of transitory computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored. The computer program may be run on the processor 102 described herein.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of embodiments of the present invention has been presented for purposes of illustration, but is not intended to be exhaustive or limited to the implementations in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present invention. The embodiments were chosen and described in order to best explain the principles and some practical applications of the present invention, and to enable others of ordinary skill in the art to understand the present invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (15)

  1. A lock assembly comprising
    a lock case (12) comprising a through-hole (58), and
    a housing (54) accommodating a rotatable member (52), wherein the housing (54) is mated to and mounted in the through-hole (58), and wherein
    at least one of the housing (54) and the through-hole (58) provide a channel through the lock case (12).
  2. The lock assembly according to claim 1, wherein the rotatable member is a cylinder (52) of a cylinder lock.
  3. The lock assembly according to claim 1 or 2, wherein the housing (54) provides the channel through the lock case (12).
  4. The lock assembly according to claim 3, wherein the housing (54) comprises a recess (64) running along the length of the housing (54).
  5. The lock assembly according to claim 4, wherein the recess (64) is located in a bottom part of the housing (54).
  6. The lock assembly according to one or more of the preceding claims, wherein the channel provides a passage for electrical wiring (48).
  7. The lock assembly according to one or more of the preceding claims, wherein the through-hole (58) is shaped in accordance with a standardized lock profile.
  8. The lock assembly according to claim 7, wherein the through-hole (58) is shaped in accordance with the Euro Profile lock standard.
  9. The lock assembly according to claim 7, wherein the through-hole (58) is shaped in accordance with an Oval lock standard.
  10. The lock assembly according to claim 7, wherein the through-hole (58) is shaped in accordance with the Swiss profile lock standard.
  11. The lock assembly according to claim 7, wherein the through-hole (58) is shaped in accordance with the KIK lock standard.
  12. The lock assembly according to one or more of the preceding claims, wherein a front face of the housing (58) does not comprise an opening for receiving a mechanical key.
  13. A housing (54) for accommodating a rotatable member (52),
    the housing (54) being mated to a through-hole (58) in a lock case (12), wherein
    the housing (54) is configured to provide a channel through the lock case (12) when the housing (54) is mounted in the through-hole (58).
  14. The housing (54) according to claim 13, comprising a recess (64) running along the length of the housing (54).
  15. A lock case (12) for use in a lock assembly, the lock case (12) comprising a through-hole (58) mated to a housing (54), wherein
    the through-hole (58) is configured to provide a channel through the lock case (12) when the housing (54) is mounted in the through-hole.
EP18151732.7A 2017-01-13 2018-01-15 Lock assembly for providing a channel through a lock Withdrawn EP3348752A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL1042227 2017-01-13

Publications (1)

Publication Number Publication Date
EP3348752A1 true EP3348752A1 (en) 2018-07-18

Family

ID=60972147

Family Applications (2)

Application Number Title Priority Date Filing Date
EP18151719.4A Active EP3349192B1 (en) 2017-01-13 2018-01-15 Module, method and controller for controlling a lock
EP18151732.7A Withdrawn EP3348752A1 (en) 2017-01-13 2018-01-15 Lock assembly for providing a channel through a lock

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP18151719.4A Active EP3349192B1 (en) 2017-01-13 2018-01-15 Module, method and controller for controlling a lock

Country Status (1)

Country Link
EP (2) EP3349192B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3597843B1 (en) * 2018-07-17 2022-05-25 Loqed Holding B.V. Electronically operated door lock

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11686126B2 (en) 2019-07-18 2023-06-27 Endura Products, Llc Methods of operating a lock
SE544177C2 (en) 2019-10-08 2022-02-22 Assa Abloy Ab Inside or outside a barrier comprising an rf barrier

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1030640A (en) * 1964-12-08 1966-05-25 Fred Anthony Baldinelli Signalling device
DE8700375U1 (en) * 1987-01-09 1987-04-30 Bks Gmbh, 5620 Velbert, De
EP0316590A2 (en) * 1987-11-17 1989-05-24 BKS GmbH Door lock fitting with electronic control and lock cylinder
DE10122125C1 (en) * 2001-05-07 2002-09-05 Huwil Werke Gmbh Lock cylinder has lock core and adaptor with spring pin to fit into recess in housing bore
EP1574643A1 (en) * 2004-03-11 2005-09-14 Keso Ag Electromechanical lock cylinder
DE102004057114B3 (en) * 2004-11-26 2006-08-03 Beckmann, Dieter, Dipl.-Ing. Pusher set for fire-proof door, has latches made of welded steel pipes in which electronic warning device is arranged with section of latch having square hollow pin through which cable with connector passes
EP1724417A2 (en) * 2005-05-19 2006-11-22 Hewi Heinrich Wilke Gmbh Lock element
WO2009024961A2 (en) * 2007-08-21 2009-02-26 Essence Security International Ltd. Lock cylinder opening system and method
EP2060708A2 (en) * 2007-11-05 2009-05-20 SITECH-Sicherheitstechnik GmbH Label for a lock
NL1039122C2 (en) * 2011-06-23 2013-01-02 Ren Klaassen Electronic cylinder lock assembly.
EP2924205A1 (en) * 2014-03-25 2015-09-30 ASSA ABLOY Sicherheitstechnik GmbH Lock for door or window
GB2524718A (en) * 2014-02-13 2015-10-07 Loxal Security Ltd Door lock
WO2016040970A1 (en) * 2014-09-15 2016-03-24 Michael Makivic Door plate for a door fitting

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140292481A1 (en) * 2011-03-17 2014-10-02 Unikey Technologies, Inc. Wireless access control system and related methods
US10240365B2 (en) * 2012-12-12 2019-03-26 Spectrum Brands, Inc. Electronic lock system having proximity mobile device
US20160343183A1 (en) * 2015-05-18 2016-11-24 Unikey Technologies Inc. Wireless access control system for a door including proximity based authentication and related methods

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1030640A (en) * 1964-12-08 1966-05-25 Fred Anthony Baldinelli Signalling device
DE8700375U1 (en) * 1987-01-09 1987-04-30 Bks Gmbh, 5620 Velbert, De
EP0316590A2 (en) * 1987-11-17 1989-05-24 BKS GmbH Door lock fitting with electronic control and lock cylinder
DE10122125C1 (en) * 2001-05-07 2002-09-05 Huwil Werke Gmbh Lock cylinder has lock core and adaptor with spring pin to fit into recess in housing bore
EP1574643A1 (en) * 2004-03-11 2005-09-14 Keso Ag Electromechanical lock cylinder
DE102004057114B3 (en) * 2004-11-26 2006-08-03 Beckmann, Dieter, Dipl.-Ing. Pusher set for fire-proof door, has latches made of welded steel pipes in which electronic warning device is arranged with section of latch having square hollow pin through which cable with connector passes
EP1724417A2 (en) * 2005-05-19 2006-11-22 Hewi Heinrich Wilke Gmbh Lock element
WO2009024961A2 (en) * 2007-08-21 2009-02-26 Essence Security International Ltd. Lock cylinder opening system and method
EP2060708A2 (en) * 2007-11-05 2009-05-20 SITECH-Sicherheitstechnik GmbH Label for a lock
NL1039122C2 (en) * 2011-06-23 2013-01-02 Ren Klaassen Electronic cylinder lock assembly.
GB2524718A (en) * 2014-02-13 2015-10-07 Loxal Security Ltd Door lock
EP2924205A1 (en) * 2014-03-25 2015-09-30 ASSA ABLOY Sicherheitstechnik GmbH Lock for door or window
WO2016040970A1 (en) * 2014-09-15 2016-03-24 Michael Makivic Door plate for a door fitting

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3597843B1 (en) * 2018-07-17 2022-05-25 Loqed Holding B.V. Electronically operated door lock

Also Published As

Publication number Publication date
EP3349192C0 (en) 2023-07-26
EP3349192A1 (en) 2018-07-18
EP3349192B1 (en) 2023-07-26

Similar Documents

Publication Publication Date Title
US10731380B2 (en) Electronic lock with door orientation sensing
US11295568B2 (en) Wireless tag-based lock actuation systems and meihods
TWI737716B (en) Lockset and method of detecting an authentication device for use with an electronic lockset
US11989984B2 (en) Electronic lock pairing via passcode
EP3348752A1 (en) Lock assembly for providing a channel through a lock
EP3300033B1 (en) Access control system, portable user device, and method of controlling access
US11671499B2 (en) System and method of establishing server connections to internet of things devices, including electronic locks
JP5457050B2 (en) Electronic key system and suspicious person intrusion prevention method
JP5985032B1 (en) Key opening / closing device, operation control system
CA3112774A1 (en) Authentication of internet of things devices, including electronic locks
WO2023283484A2 (en) Ultra-wideband accessory devices for radio frequency intent detection in access control systems
JP6962794B2 (en) Building locking / unlocking system
JP2013076242A (en) Tag authentication system, tag and method for setting parameter related to signal reception of tag
JP6937486B2 (en) Electric lock control system, electric lock system, control method and program
EP3677743A1 (en) Electronic lock control system, electronic lock system, control method for electronic lock control systems, and program
KR101953538B1 (en) Smart door lock and method to control same
US20220325557A1 (en) Detection and correction of insufficient locking behavior of an electronic lockset
JP2014189943A (en) Electric lock system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20190119