EP3349192A1 - Module, method and controller for controlling a lock - Google Patents

Module, method and controller for controlling a lock Download PDF

Info

Publication number
EP3349192A1
EP3349192A1 EP18151719.4A EP18151719A EP3349192A1 EP 3349192 A1 EP3349192 A1 EP 3349192A1 EP 18151719 A EP18151719 A EP 18151719A EP 3349192 A1 EP3349192 A1 EP 3349192A1
Authority
EP
European Patent Office
Prior art keywords
lock
controller
phase
electronic key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP18151719.4A
Other languages
German (de)
French (fr)
Other versions
EP3349192C0 (en
EP3349192B1 (en
Inventor
Petrus Robinus Van den Oord
Jeroen Lennard Van Oorschot
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Loqed Holding BV
Original Assignee
Loqed Holding BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Loqed Holding BV filed Critical Loqed Holding BV
Publication of EP3349192A1 publication Critical patent/EP3349192A1/en
Application granted granted Critical
Publication of EP3349192C0 publication Critical patent/EP3349192C0/en
Publication of EP3349192B1 publication Critical patent/EP3349192B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0091Retrofittable electric locks, e.g. an electric module can be attached to an existing manual lock
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/02Movement of the bolt by electromagnetic means; Adaptation of locks, latches, or parts thereof, for movement of the bolt by electromagnetic means
    • E05B47/026Movement of the bolt by electromagnetic means; Adaptation of locks, latches, or parts thereof, for movement of the bolt by electromagnetic means the bolt moving rectilinearly
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B63/00Locks or fastenings with special structural characteristics
    • E05B63/0034Locks for use instead of cylinder locks, e.g. locks with cylinder lock profile and a low security operating mechanism
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • G07C2209/64Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor

Definitions

  • This disclosure relates to a module, method and controller for controlling an electronic lock, in particular for controlling an electronic lock to unlock in at least two phases.
  • Keyless entry systems conveniently allow a person to access an area, such as his home, without having to insert a key into a lock.
  • Remotely controlled locks are known in the art that may be unlocked by a user pressing a button on a transponder, the transponder transmitting a signal to the lock wherein the signal triggers an electronic motor for unlocking the mechanical lock mechanism.
  • Mechanical locking mechanisms in particular mechanical locking mechanism such as the European cylinder door lock mechanisms, exist wherein the cylinder has to turn multiple times, e.g. over 960 degrees, before the lock is unlocked.
  • fully unlocking the lock may take considerable time after the user has pressed the button of the transponder.
  • the user may experience an undesirable waiting time before he can actually open a door. This waiting time may even get worse as a result of some conflicting requirements of an electronic lock.
  • an electric motor of a lock is preferably small. Small motors namely tend to be more energy efficient, which is important because frequent change of batteries is undesired. In addition, small motors can be elegantly integrated with existing locks and can be conveniently mounted on doors. On the other hand, an electric motor must be able to deliver a certain threshold force or torque in order to drive the mechanical lock mechanism, which may include a cylinder of a cylinder lock. In principle, larger electric motors are able to deliver higher forces.
  • gearing enables to amplify an input force or torque delivered by the electric motor to the gearing system.
  • the amplified output torque may then be sufficient to drive the mechanical parts of the lock.
  • a small electric motor can indeed cause a force or torque of sufficient magnitude for driving mechanical parts of the lock.
  • amplifying a torque by means of gearing is associated with a reduction in velocity, for example a reduction in the angular velocity of a cylinder of a cylinder lock.
  • One object of the present invention is to at least reduce the above-identified disadvantages.
  • One object of the invention is to reduce the waiting time for a user that wants to open a lock.
  • the invention relates to a module for controlling an electronic lock, the module being configured to unlock the lock in at least two phases, a first phase and a second phase; wherein the module may comprise: an electric motor configured to drive a mechanical locking mechanism for unlocking the lock; a controller that is configured to control the electric motor and to receive one or more wireless signals from an electronic key; a user interface connected to the controller configured to detect a user interaction; wherein the controller is further configured to: determine on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiate the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detect interaction with the user interface of the lock; and, after completion of the first phase, initiate on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • the module may comprise: an electric motor configured to drive a mechanical locking mechanism for unlocking the lock; a controller that is configured to control the electric motor and to receive one or more wireless signals
  • the invention relates to a method for controlling an electronic lock to unlock in at least two phases, a first phase and a second phase, the method comprising: controlling an electronic motor driving a mechanical locking mechanism and receiving one or more wireless signals from an electronic key; determining on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiating the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detecting interaction with a user interface of the lock; after completion of the first phase, initiating on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • the invention relates to a controller for a module as describe above, the controller comprising: a computer readable storage medium having computer readable program code embodied therewith, and, a processor, preferably a microprocessor, coupled to the computer readable storage medium, wherein responsive to executing the computer readable program code, the processor is configured to perform executable operations comprising the method steps as described above.
  • the module, method and controller enable improved keyless entry systems that at least reduce the waiting time for a user that intends to unlock a lock, for example a lock on a door of the user's home.
  • the module is configured to unlock the lock in two phases.
  • the first phase is initiated by the controller in response to determining that an electronic key, and presumably a person holding the key, is within a predetermined distance of the lock.
  • an appropriately chosen distance allows the controller to already initiate the first phase while the user is approaching and has not yet reached the lock.
  • the lock will have already partially unlocked when the user arrives at the lock.
  • the controller will initiate the second phase and further unlock, e.g. completely unlock so that the user can access a house, locker, etc.
  • the second phase may only start once a user has interacted with the lock, for example touching the lock, therefore the risk of unintentionally completely unlocking the lock is avoided.
  • the electronic key may be associated with the lock and/or may comprise a smartphone or any other portable device that can transmit wireless signals.
  • the controller may be configured to control the transceiver module to transmit and receive messages from the key.
  • the electronic key may be configured to monitor the distance and determine that it is within the predetermined distance from the lock. Then, the electronic key may transmit a message to the module, the message comprising an instruction to initiate the first phase and associated authentication information, such as an identifier of the electronic key. Based on the received authentication information, the controller may authenticate the instruction, e.g. in order to verify that it was received from an electronic key that is allowed to open the lock. With the authentication of the instruction, the controller may be understood to determine that the electronic key is within the predetermined distance from the lock. Thus, in this embodiment, in response to authenticating the instruction, the controller initiates the first phase.
  • the authentication information is an identifier of the electronic key and authenticating the instruction may comprise determining that the received identifier matches an identifier prestored in a data storage of the module.
  • the authentication information is a code, which may be used by a plurality of electronic keys, and authenticating the instruction comprises determining that the received code matches a code prestored in a data storage of the module.
  • the predetermined distance may be a distance in the range of 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Measures may be taken to neglect an electronic key if it is within the predetermined distance from the lock, yet already in the area for which access is controlled, the "inside" area, e.g. already in the house.
  • Such measures may comprise at least one of the electronic key and the controller determining that the electronic key is in the "inside” area on the basis of Wifi and/or geofencing.
  • the lock in locked state may be configured to secure a member, such as a door, for restricting access to an area.
  • the controller comprises a first receiving unit, such as an antenna, positioned at a first side of the access restricting member and a second receiving unit, such as an antenna, positioned at a second side of the access restricting member.
  • the first antenna may be closer to the restricted area then the second antenna.
  • the controller is configured to receive the one or more wireless signals from the electronic key in both the first and second receiving unit.
  • the first and/or second receiving unit may transmit the signals they receive wirelessly to the controller of the module, which obviates the need to provide electrical wiring between a receiving unit and the controller through the access restricting member.
  • the controller is configured to determine on the basis of the signals as received by the first and second receiving unit that the electronic key is outside the area to which said member restricts access. This determination may comprise the controller comparing the signal strengths of the signals as received by the first and second receiving unit respectively. Then, based on a determination that the signal strength of the signal as received by the second receiving unit is higher than the signal strength of the signal as received by the first receiving, the controller may determine that the electronic key is outside of the restricted area.
  • this determination may comprise the controller determining for each of the first and second receiving unit a time of flight and/or roundtrip time of a signal transmitted between the electronic key and the first receiving unit and a time of flight and/or roundtrip time of a signal transmitted between the electronic key and the second receiving unit. Then, based on a determination that the time of flight and/or roundtrip time determined for the second receiving unit is shorter than the time of flight and/or roundtrip time determined for the first unit, the controller may determine that the electronic key is outside of the restricted area.
  • the controller may be configured to only enable initiation the first phase if it determines that the electronic key is outside of the restricted area as well as determines that the electronic key is within the predetermined distance from the lock.
  • the controller may be configured to disable initiation of the first phase if it determines that the electronic key is already inside the restricted area irrespectively of whether the electronic key is within the predetermined distance from the lock or not. This embodiment prevents that the controller initiates the first phase if the electronic key is within the predetermined distance, yet already in the restricted area, for example because the electronic key is already inside a house.
  • the electronic key may be configured to determined that it is outside the area to which said member restricts access, e.g. as a result of comparing signal strength of signals as received by the first and second receiving unit described above and/or as a result of comparing round-trip times and/or times of flight of signals between the electronic key and first receiving unit and of signals between the electronic key and second receiving unit. Then, in response to determining that it is outside the restricted area, the electronic key may transmit a signal, which may be understood to be one of the one or more wireless signals, to the controller indicating that it is outside the restricted area. Then, based on this signal, the controller determines that the electronic key is outside of the restricted area.
  • a signal which may be understood to be one of the one or more wireless signals
  • the user interaction may be indicative of an intention of the user to unlock the lock.
  • one or more wireless signals comprise an identifier of the electronic key and/or an authentication code.
  • the controller is configured for, and the method comprises, enabling on the basis of the received identifier and/or on the basis of the authentication code initiation of the first phase. This embodiment provides convenient security measures for opening the lock.
  • the module comprises a rotatable member, such as a rotatable cylinder, coupled to the electric motor, the rotatable member being configured to drive the mechanical locking mechanism of the lock by rotating.
  • the controller is configured for, and the method comprises, controlling the electric motor to rotate the member in the first phase over a first angular distance from a first angular position to an intermediate angular position and controlling the electric motor to rotate the member in the second phase over a second angular distance from the intermediate angular position to a second angular position.
  • the direction of said respective rotations in the first and second phase may be the same. Also, the second angular distance may be smaller than the first angular distance.
  • the mechanical locking mechanism comprises a dead bolt and a latch bolt.
  • the controller is configured for, and/or the method comprises, retracting the deadbolt in the first phase and retracting the latch bolt in the second phase.
  • the user interface comprises a touch sensitive surface and the interaction comprises the user touching the touch sensitive surface.
  • the touch surface may be, when the module is mounted on the lock for controlling the lock, at the outside of the door.
  • the controller is configured for, and/or the method comprises, establishing a secure connection with the electronic key.
  • the secure connection may be established using techniques known in the art.
  • the controller is configured for, and/or the method comprises, determining a power of the one or more wireless signals as received, determining that the power as received exceeds a threshold value and in response determining that the key is within the predetermined distance from the lock.
  • the controller may be configured to determine, or calibrate, the threshold value on the basis of an indication of a power of the signal as transmitted by the electronic key. If for example the key transmits signals of lower power, the threshold value may be lower, whereas the threshold value may be higher if the key transmits signals of higher power.
  • the controller may additionally or alternatively be configured to calculate a round-trip time of a signal.
  • the controller may be configured to determine that the electronic key is within the predetermined distance on the basis of the calculated round-trip time, for example on the basis of the calculated round-trip time being shorter than a predetermined time.
  • the controller is configured for, and/or the method comprises, establishing a wireless connection with the electronic key; and for monitoring a quality of the connection and determining on the basis of the quality of the connection that the electronic key is within the predetermined distance.
  • the controller may be configured to repeatedly measure the quality of the connection, for example by measuring a power of the signal as received, such as an RSSI (Received Signal Strength Indicator).
  • the key may be configured to determine the quality of the connection, for example by measuring a power of a further signal as received by the key, wherein the further signal is transmitted by the transceiver module to the key. The key may then transmit the quality as measured by the key to the module.
  • controller is configured for, and/or the method comprises, receiving a second wireless signal from the key and determining, prior to initiation of the second phase, on the basis of the received second signal that the key is within a predetermined second distance from the lock and in response enabling initiating the second phase, preferably the second distance being smaller than the predetermined distance.
  • This embodiment is advantageous because it prevents that a door can be opened by a malicious person when the first phase has completed, although the owner holding the key does not (yet) intend to unlock the door, for example because he is still sitting in his car near the lock.
  • the controller may thus be configured to only open the lock if at least two conditions i) and ii) are satisfied, namely i) the detector has detected an action of the user and ii) the key is within the predetermined second distance of the lock.
  • the second distance may be in the range of 0-5 meters, preferably 0-2 meters, more preferably 0-1 meter.
  • the module is mountable on a lock.
  • the lock in locked state is configured to secure a member, such as a door, for restricting access to an area and in these embodiments the module further comprises a sensor that is configured to generate a position signal that is indicative of a position of the member. In embodiments, the controller is configured for, and/or the method comprises, controlling the lock to lock itself on the basis of the position signal.
  • This embodiment enables that the lock automatically locks a door once the door is closed again after it has been opened.
  • the controller may be configured to determine on the basis of the position signal that the member has moved from a position in which the member provides access to the area to be accessed to a position in which the member restricts access and in response control the lock to lock itself.
  • the sensor may comprise a magnetic sensor that is configured to measure a magnetic field strength for example a magnetic field strength caused by a (permanent) magnet mounted on a door and/or a magnetic field strength of the earth's magnetic field.
  • a magnetic field strength for example a magnetic field strength caused by a (permanent) magnet mounted on a door and/or a magnetic field strength of the earth's magnetic field.
  • the sensor may be understood to comprise a compass.
  • a compass mounted on for example a door enables the controller to determine the orientation of the door which allows to determine whether the door is open or shut.
  • the senor may comprise an accelerometer for measuring an acceleration of the access restricting member, e.g. of a door. Then, the controller 4 may be configured to determine on the basis of the measured acceleration and, optionally based on a measured magnetic field, a position of the access restricting member.
  • an accelerometer positioned on a door may measure a significant negative acceleration peak at the moment the door is shut and hits the door post. Then, based on this measured peak, the controller may be configured to determine that the has been shut. In response to this determination, the controller 4 may control the mechanical locking mechanism of the lock to fully lock the door.
  • the controller is configured for, and/or the method comprises, controlling the lock to fully lock after the first phase has completed in response to at least one of:
  • the first time period may for 20-60 seconds, preferably for 25-35 seconds.
  • the second time period may last for 5-30 seconds, preferably 10-20 seconds.
  • a module is provided according to claim 13.
  • This embodiment is advantageous, because, upon mounting of the module on a lock, and in particular upon mounting the housing in the trough-hole in the lock, a channel is conveniently provided.
  • the channel between the two sides of the lock may be for electric wiring that may transmit power and/or data, which may be beneficial if an electronic device, such as a touch sensitive surface is mounted on one side of a door and the power supply and logic on the other side of the door.
  • the shape of the through-hole may be defined by a standard.
  • the through-hole may be shaped for an Europrofile lock, Oval lock, Swiss profile lock or KIK lock or to any other standardized lock profile.
  • the housing is configured to provide the channel.
  • the housing may comprise a recess running along a length of the housing.
  • One distinct aspect of this disclosure relates to the housing as described in this disclosure and/or to a housing for a rotatable member, such as a cylinder of a cylinder lock, the housing being mated to the shape of a through-hole in a lock, wherein at least one of the housing and the through-hole are configured to provide a channel through the lock, e.g. for electrical wiring, when the housing is mounted in the through-hole.
  • the housing is configured to provide the channel.
  • the housing may comprise a recess running along a length of the housing.
  • aspects of the present invention may be embodied as a system, a method or a computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit,” “module” or “system.” Functions described in this disclosure may be implemented as an algorithm executed by a processor/microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied, e.g., stored, thereon.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
  • a computer readable storage medium may include, but are not limited to, the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain, or store, a program for use by or in connection with an instruction execution system, apparatus, or device.
  • a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof.
  • a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing.
  • Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java(TM), Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider an Internet Service Provider
  • These computer program instructions may be provided to a processor, in particular a microprocessor or a central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • a processor in particular a microprocessor or a central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • embodiments of the present invention may relate to a computer-implemented method for controlling a lock.
  • a computer program for carrying out the methods described herein, as well as a non-transitory computer readable storage-medium storing the computer program are provided.
  • a computer program may, for example, be downloaded (updated) to the existing controller (e.g. to the existing or be stored upon manufacturing of these systems.
  • Fig. 1 schematically shows a system for controlling an electronic lock according to an embodiment of the invention.
  • Fig. 1 depicts a system for controlling an electronic lock comprising a module 2 for controlling an electronic lock and an electronic key 16 that is configured to wirelessly communicate with the electronic lock.
  • the module 2 may be mounted on a door 1, which may be a door of a house, locker, cabinet, etc. connected to lock 12 of the door 1.
  • the lock 12 comprises at least one mechanical part 14, i.e. a mechanical locking mechanism, which may comprise dead bolt and/or latch bolt which may, when the door is in a closed position, be extended from the door into a mortise in a doorjamb (not shown) in order to secure the door and restrict access to the area behind the door 1.
  • the module may also control locks of other access restricting members, such as a hatch, lid, etc.
  • Module 2 may comprise an electric motor 6, a detector 10 and a transceiver module 8 which may be controlled by a controller 4. Further electric motor 4 is coupled to the at least one mechanical part 14 and may thus set the mechanical part 14 in motion.
  • An electronic key 16 is configured to communicate with the controller of the electronic lock. In particular, it may transmit one or more wireless signals to the module 2, which may be detected by transceiver module 8 and relayed to the controller 4 for further processing.
  • the electronic key 16 may be implemented as a mobile device, e.g. a transponder that is configured to wirelessly communicate with the lock or as a software application on a mobile communication device such as a smart phone or the like.
  • Fig. 1 shows that the electronic key is located at a predetermined distance 20 away from the lock. Communication between the electronic key and the electronic lock may be possible within an area which may be defined by an maximum communication distance 18 away from the lock 12. If distance between the electronic key and the electronic lock is smaller than the maximum communication distance wireless communication between the electronic key and the electronic lock is possible.
  • the maximum communication distance 18 may depend on the radio interface and the protocol that is used for establishing a radio connection between the electronic key and the electronic lock.
  • the maximum communication distance may be in the range 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Fig. 2A is a flow diagram illustrating a method for controlling the electronic lock according to an embodiment of the invention. The method may be executed by the system described with reference to Fig. 1 .
  • the module 2 repeatedly transmits, e.g. broadcasts, notification messages comprising an identifier ID of the module 2.
  • notification messages comprising an identifier ID of the module 2.
  • the electronic key 16 will receive one or more of these notification messages, one notification message indicated by arrow 24.
  • the electronic key 16 is "in reach" of the module 2, and in particular of transceiver module 8.
  • the electronic key 16 and the controller 4 may establish a wireless connection (step 26).
  • the wireless connection may be a secure connection based on encryption techniques known in the art, such as the Elliptic curve Diffie-Hellman algorithm part of the Bluetooth 4.0 core spec.
  • One precondition for establishing the connection 26 may be that the electronic key 16 is a so-called trusted device of the module 2.
  • the wireless connection and the signaling between the module 2 and the electronic key 16 may be may be based on any suitable wireless protocol.
  • a wireless protocol may be used that is configured to execute proximity monitoring between the electronic key and the electronic lock, such as a Bluetooth protocol, in particular the Bluetooth Proximity Profile.
  • a Bluetooth protocol in particular the Bluetooth Proximity Profile.
  • This Proximity Profile protocol is 1.0.1 adopted on 14 July 2015, the specification of which is incorporated herein by reference in its entirety.
  • the proximity monitoring process may provide a measure for the distance between the electronic key and the electronic lock.
  • an authentication procedure may be executed in which the controller authenticates the electronic key 16.
  • the controller may determine whether the electronic key is registered with the controller. To that end, the controller 4 may use an identifier of the electronic key 16, that is transmitted to the controller. The controller 4 may then verify whether electronic key 16 is allowed to unlock the lock 12, for example by finding the identifier of the electronic key 16 in a database comprising identifiers of electronic keys that are allowed to open the lock 12. Said database may be stored in a memory of the controller. Additionally or alternatively, said database may be stored on a remote server.
  • the controller 4 receives, for example via the connection 26, an authentication code from the electronic key 16 and the controller 4 may be configured to determine on the basis of this authentication code that the electronic key 16 is allowed to open the lock 12.
  • the controller 4 is configured to monitor the distance between the electronic key 16 and the module 4.
  • the controller 4 is configured to monitor the distance by monitoring the connection 26, optionally in conformance with a protocol such as the Bluetooth Proximity Profile protocol.
  • the controller 4 may be configured to repeatedly determine the power as received of the signals, such as the RSSI, from the electronic key 16.
  • Step 32 depicts controller 4 determining that the electronic key is within a predetermined distance 18 (the maximum communication distance as described with reference to Fig. 1 ) of the lock 12 and/or module 2.
  • the controller 4 may be configured to compare the monitored distance to the predetermined distance, which may be stored in a memory of the controller 4 and/or to compare a determined power of a signal as received from the electronic key 16 with a threshold power.
  • partially unlocking may comprise partially retracting a bolt, for example retracting back into a door 1.
  • partially unlocking may comprise fully retracting a bolt, such as a dead bolt, of the lock, yet without fully unlocking the lock because another bolt, such as a latch bolt, is still extended, in an example extended from a door 1 into a mortise of a door jamb, the latch bolt securing the door 1.
  • step 38 the controller determines that the electronic key 16 is within a second distance, indicated in Fig. 1 by reference numeral 22, of the lock and/or module 2. It should be appreciated that any of the above described techniques may be used for determining the distance between the electronic key 16 and the lock 12.
  • the controller 4 may be configured to enable initiation of the second phase illustrated in step 40. It should be appreciated that by default initiation of the second phase is disabled and that the controller is configured, e.g. programmed, to only initiate the second phase if at least the controller 4 has determined that the electronic key 16 is within a second distance 22 from the lock.
  • the controller 4 is configured to initiate the second phase on the basis of a detected action of a user.
  • the first phase must have been completed before the second phase can be initiated.
  • Step 42 illustrates that the module 2, in particular the detector 10, detects the action of the user.
  • the controller 4 initiates the second phase in step 44, in an example by controlling the electric motor 6 to further unlock the lock 12, which is depicted by step 46.
  • the first phase has completed prior to detection of the user action, so that upon detection of the user action the second phase can be initiated without delay caused by the first phase not having completed yet.
  • FIG. 2B is a flow diagram illustrating a method for controlling the electronic lock according to an embodiment of the invention. Identical reference numerals in FIG. 2A and 2B denote similar processes or messages or elements.
  • step 24 the module 2 repeatedly e.g. broadcasts, notification messages comprising an identifier ID of the module 2. Once the electronic key 16 is close enough to the transceiver module 8, the electronic key 16 will receive one or more of these notification messages, one notification message indicated by arrow 24. The electronic key 16 is "in reach" of the module 2, and in particular of transceiver module 8.
  • the electronic key 16 is configured to monitor the distance between the electronic key 16 and the module 2 and in step 30 the electronic key 16 monitors the distance based on the notification messages received in step 24.
  • the electronic key 16 may be configured to determine the distance between the module 2 and the key 16 using any technology described herein for determining a distance between a receiver and transmitter, for example using a protocol such as the Bluetooth Proximity Profile protocol. In one example, the electronic key 16 monitors a quality of an established connection (not shown) between the module 2 and the electronic key 16. In another example, the electronic key 16 may be configured to repeatedly determine a power as received, e.g. an RSSI, of the signals received from the module 2. The electronic key 16 may additionally or alternatively be configured to calculate a round-trip time of a signal in order to determine a distance between the module 2 and the key 16.
  • a protocol such as the Bluetooth Proximity Profile protocol.
  • the electronic key 16 monitors a quality of an established connection (not shown) between the module 2 and the electronic key 16.
  • the electronic key 16 may be configured to repeatedly determine a power as received, e.g. an RSSI, of the signals received from the module 2.
  • the electronic key 16 may additionally or alternatively be configured to calculate
  • the electronic key 16 determines, e.g. based on a measured distance, that the electronic key 16 is within the predetermined distance from the lock 2.
  • the electronic key 16 may be configured to compare a measured distance to the predetermined distance, which may be pre-stored in a memory of the electronic key 16.
  • the electronic key 16 may be configured to determine that the power as received of signals from the module 2 exceeds a threshold value, which may be pre-stored in a memory of the electronic key, and in response determine that the key is within the predetermined distance.
  • the electronic key 16 may be configured to determine that it is within the predetermined distance from the lock 2 on the basis of a calculated round-trip time described above, for example on the basis of the calculated round-trip time being shorter than a predetermined time, which may be pre-stored in a memory of the electronic kay 16.
  • the electronic key 16 in step 33 transmits at least one message comprising an instruction to the module 2 to initiate the first phase.
  • the at least one message comprising the instruction also comprises an identifier of the electronic key 16, based on which the controller 4 in module 2 can authenticate the instruction.
  • the controller 2 authenticating the instruction comprises determining that the identifier of the electronic key 16 matches an identifier that is stored in a data storage of the module 2 that stores identifiers of electronic keys that are allowed to open the lock 2.
  • Step 32 comprises the module 2, in particular the controller 4, determining that the electronic key 16 within the predetermined distance from the lock on the basis of the message received in step 33.
  • the controller 4 for example makes this determination based on an identifier of the electronic key received from the electronic key, for example the identifier that the module 2 receives together with the instruction to initiate the first phase as described above.
  • the module in particular the controller 4 of module 2, may be understood to determine that the electronic key 16 is within the predetermined distance by authenticating the instruction received in step 33, for example based on an identifier of the electronic key received in association with the instruction.
  • the controller in step 34 In response to authenticating the instruction, and thus, in one example, in response to determining that the electronic key 16 is within the predetermined distance from the lock 2, the controller in step 34 initiates the first phase, causing the electric motor in step 36 to drive a mechanical locking mechanism of the lock to partially unlock the lock.
  • the electronic key 16 may also in respective steps 37 and 39 determine that the electronic key 16 is within the second predetermined distance from the lock and transmit at least one second message comprising a second instruction to the module 2 to enable initiation of the second phase.
  • the module 2, in particular the controller 4 may be understood to determine that the electronic key 16 is within the predetermined second distance by authenticating the instruction received in step 39, e.g. based on an identifier of the electronic key 16 received in association with the second instruction.
  • the electronic key monitors the distance and transmits an indication of the measured distance to the module 2, which can then determine that the electronic key is within the predetermined distance by comparing the distance as monitored by and received from the electronic key 16 with the predetermined distance, which the module has pre-stored in a data storage.
  • the electronic key 16 determines that it is within the predetermined distance 18 from the lock 2, and transmits an instruction to the lock 2 to initiate the first phase as described above. However, in this embodiment, the electronic key 16 does not determine that it is within the predetermined second distance from the lock. In this embodiment, the module 2, in particular controller 4, determines that the electronic key 16 is within the predetermined second distance of the lock.
  • Fig. 3 depicts a schematic of a mechanical locking mechanism 12 and elements 52,54,58, 59, 60,10 for forming a module for electronically controlling the mechanical locking mechanism 12.
  • the elements are illustrate in a disassembled state.
  • Fig. 4 depicts the mechanical locking mechanism and the module installed in a door 1. As shown in Fig. 4 , the mechanical locking mechanism 12 and the module may form an electronic lock for a door which can be controlled using an electronic key as described with reference to Fig. 1-2 .
  • the assembly of elements depicted in Fig. 3 may be installed on a door 1.
  • Door 1 may be a door of a house.
  • the arrows IS and OS respectively indicate the inside area and the outside area associated with the lock 12 and/or door 1.
  • the inside area may be an area to which access is to be controlled by means of the lock 12, such as the inside of a home, the outside area may be a freely accessible area, such as a public area.
  • a handle 50 when mounted, has a fixed position with respect to the lock.
  • the lock 12 may not be controllable by a handle on the outside of the lock, which is typical for front doors of houses.
  • Detector 10 may comprise a display 11 and one or more buttons 13.
  • the display 11 and/or the buttons 13 may comprise touch sensitive areas thus forming a user interface for the electronic lock.
  • the display 11, which may thus be a touch-sensitive display, and the one or more buttons 13 enable a user to interact with the module 2.
  • the detector 10 comprises electrical wiring 48 which can be connected to the controller 4 (not shown) and/or a power supply of the module 2.
  • the electrical wiring 48 enables data communication between the controller and the detector 10. Power may also be provided to the detector 10 through the electrical wiring 48.
  • lock 12 comprises at least two mechanical parts that can be driven by an electric motor (not shown), a latch bolt 14a and a dead bolt 14b.
  • a rotatable cylinder 52 that is rotatable with respect to a housing 54.
  • Mounting plate 56 provides additional stability for a housing 59 when mounted on door 1.
  • Housing 59 may comprise at least one of the electric motor, the transceiver module 10 and controller 4.
  • a rotatable handle 60 such as a rotatable door knob, may be mounted on the housing 59. The handle may be thus on the inside and may enable a user to manually open the door.
  • the lock may thus be both controllable by the module 2 and by a handle on the inside according to mechanisms known in the art.
  • Fig. 5 shows a housing 54 and cylinder 52 of a cylinder lock for use in an electronic lock according to an embodiment of the invention.
  • the housing and the cylinder may be configured to cooperate with a standardized mechanical locking mechanism, such as the European cylinder door lock mechanism.
  • the cylinder 52 may comprises at least one cam 62 that is configured to drive at least one mechanical part of the lock 12, such as a sprocket-wheel.
  • Cylinder 52 may comprise a recess 53 along at least part of a length of the cylinder 52, the recess 53 enabling other parts to grasp the cylinder. Further, the front face of the housing is closed and does not comprise an opening for receiving a mechanical key.
  • the housing comprises a recess 64 that runs along a length of the housing.
  • the recess 64 provides a channel for electrical wiring 48.
  • Fig. 6 shows an exemplary shape of a through-hole 58 in a lock.
  • the shape is a standard shape of an Euro profile lock.
  • Fig. 7 shows a profile of a housing 54 associated with the shape shown in Fig. 6 according to one embodiment.
  • the profile of the support structure 54 comprises a cutaway part 64 in the bottom part of the support structure 54.
  • Figs. 8A-C depicts various flow diagrams of methods for controlling an electronic lock according to various embodiments of the invention.
  • Fig. 8A depicts a flow diagram wherein in a first step 180 the lock may transmit at a predetermined intervals a signal comprising lock identifier, which may be a unique identifier.
  • a wireless connection between the lock and an electronic (trusted) device, the electronic key may be formed when the trusted device receives the signal comprising the lock identifier (step 182).
  • an authentication procedure may be executed between the lock and the trusted device. The authentication procedure may comprise exchanging identifiers and/or authentication codes.
  • the lock may monitor the distance between lock and the trusted device.
  • the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection (step 188).
  • connection may be terminated if the distance between the lock and the electronic key is or remains larger than a predetermined distance x (step 190). If the device is within a predetermined distance the electronic motor is controlled for driving the mechanical locking mechanism, wherein the driving retracting a deadbolt of the lock (step 192).
  • Fig. 8B depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving retracting a deadbolt of the lock (step 192).
  • step 194 the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection. In that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 196).
  • the user interface of the lock may detect an interaction, e.g. somebody touching the user interface, while the distance between the lock and the device is larger than predetermined second distance Z. In that case, the state of the lock does not change, because the controller does not enable initiation of the second phase if the electronic key is not within the predetermined second distance (step 200).
  • the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 204).
  • Fig. 8C depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving fully retracting a deadbolt of the lock (step 192).
  • the electronic lock may determine that the distance between the lock and the device may be smaller than predetermined second distance Z (step 206).
  • the electronic motor may be controlled for driving the mechanical locking mechanism, the driving retracting a latch bolt (step 210), in order to fully open the lock (step 212).
  • the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 216).
  • Fig. 9 depicts a block diagram illustrating an exemplary data processing system that may be used in a computing system as described with reference to Fig. 2 .
  • the data processing system 100 may include at least one processor 102 coupled to memory elements 104 through a system bus 106. As such, the data processing system may store program code within memory elements 104. Further, the processor 102 may execute the program code accessed from the memory elements 104 via a system bus 106. In one aspect, the data processing system may be implemented as a computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the data processing system 100 may be implemented in the form of any system including a processor and a memory that is capable of performing the functions described within this specification.
  • the memory elements 104 may include one or more physical memory devices such as, for example, local memory 108 and one or more bulk storage devices 110.
  • the local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code.
  • a bulk storage device may be implemented as a hard drive or other persistent data storage device.
  • the processing system 100 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from the bulk storage device 110 during execution.
  • I/O devices depicted as an input device 112 and an output device 114 optionally can be coupled to the data processing system.
  • input devices may include, but are not limited to, a keyboard, a pointing device such as a mouse, or the like.
  • output devices may include, but are not limited to, a monitor or a display, speakers, or the like.
  • Input and/or output devices may be coupled to the data processing system either directly or through intervening I/O controllers.
  • the input and the output devices may be implemented as a combined input/output device (illustrated in Fig. 9 with a dashed line surrounding the input device 112 and the output device 114).
  • a combined device is a touch sensitive display, also sometimes referred to as a "touch screen display” or simply "touch screen”.
  • input to the device may be provided by a movement of a physical object, such as e.g. a stylus or a finger of a user, on or near the touch screen display.
  • a network adapter 116 may also be coupled to the data processing system to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks.
  • the network adapter may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to the data processing system 100, and a data transmitter for transmitting data from the data processing system 100 to said systems, devices and/or networks.
  • Modems, cable modems, and Ethernet cards are examples of different types of network adapter that may be used with the data processing system 100.
  • the memory elements 104 may store an application 118.
  • the application 118 may be stored in the local memory 108, the one or more bulk storage devices 110, or apart from the local memory and the bulk storage devices.
  • the data processing system 100 may further execute an operating system (not shown in Fig. 9 ) that can facilitate execution of the application 118.
  • the application 118 being implemented in the form of executable program code, can be executed by the data processing system 100, e.g., by the processor 102. Responsive to executing the application, the data processing system 100 may be configured to perform one or more operations or method steps described herein.
  • the data processing system 100 may represent a controller as described herein. In one aspect of the present invention, the data processing system 100 may represent an electronic key as described herein.
  • the data processing system 100 may represent a client data processing system.
  • the application 118 may represent a client application that, when executed, configures the data processing system 100 to perform the various functions described herein with reference to a "client".
  • client can include, but are not limited to, a personal computer, a portable computer, a mobile phone, or the like.
  • the data processing system x00 may represent a server.
  • the data processing system may represent an (HTTP) server, in which case the application x18, when executed, may configure the data processing system to perform (HTTP) server operations.
  • HTTP HyperText Transfer Protocol
  • Various embodiments of the invention may be implemented as a program product for use with a computer system, where the program(s) of the program product define functions of the embodiments (including the methods described herein).
  • the program(s) can be contained on a variety of non-transitory computer-readable storage media, where, as used herein, the expression "non-transitory computer readable storage media" comprises all computer-readable media, with the sole exception being a transitory, propagating signal.
  • the program(s) can be contained on a variety of transitory computer-readable storage media.
  • Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored.
  • the computer program may be run on the processor 102 described herein.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

This disclosure relates to a module, method and controller for controlling a lock, in particular for controlling a lock to unlock in at least two phases.

Description

    FIELD OF THE INVENTION
  • This disclosure relates to a module, method and controller for controlling an electronic lock, in particular for controlling an electronic lock to unlock in at least two phases.
  • BACKGROUND OF THE INVENTION
  • Keyless entry systems conveniently allow a person to access an area, such as his home, without having to insert a key into a lock. Remotely controlled locks are known in the art that may be unlocked by a user pressing a button on a transponder, the transponder transmitting a signal to the lock wherein the signal triggers an electronic motor for unlocking the mechanical lock mechanism.
  • Mechanical locking mechanisms, in particular mechanical locking mechanism such as the European cylinder door lock mechanisms, exist wherein the cylinder has to turn multiple times, e.g. over 960 degrees, before the lock is unlocked. When trying to implement a keyless entry system on the basis of such mechanical locking mechanism fully unlocking the lock may take considerable time after the user has pressed the button of the transponder. As a result, the user may experience an undesirable waiting time before he can actually open a door. This waiting time may even get worse as a result of some conflicting requirements of an electronic lock.
  • On one hand, an electric motor of a lock is preferably small. Small motors namely tend to be more energy efficient, which is important because frequent change of batteries is undesired. In addition, small motors can be elegantly integrated with existing locks and can be conveniently mounted on doors. On the other hand, an electric motor must be able to deliver a certain threshold force or torque in order to drive the mechanical lock mechanism, which may include a cylinder of a cylinder lock. In principle, larger electric motors are able to deliver higher forces.
  • One way to address these conflicting requirements is to implement gearing. Gearing enables to amplify an input force or torque delivered by the electric motor to the gearing system. The amplified output torque may then be sufficient to drive the mechanical parts of the lock. Hence, a small electric motor can indeed cause a force or torque of sufficient magnitude for driving mechanical parts of the lock. However, as known, amplifying a torque by means of gearing is associated with a reduction in velocity, for example a reduction in the angular velocity of a cylinder of a cylinder lock.
  • As a result, once a user has indicated that he wants to open an electronic lock, he typically has to wait for considerable time before the lock has completely unlocked. For example, if a small electric motor were to drive mechanical locking mechanisms such as the European cylinder door lock mechanisms, aided by appropriate gearing, the user may have to wait ten seconds before he can open the door.
  • Hence, from the above, it follows that there is a need in the art for improved control of an electronic lock.
  • SUMMARY
  • It is an object of the present invention to at least reduce the above-identified disadvantages. One object of the invention is to reduce the waiting time for a user that wants to open a lock.
  • In an aspect, the invention relates to a module for controlling an electronic lock, the module being configured to unlock the lock in at least two phases, a first phase and a second phase; wherein the module may comprise: an electric motor configured to drive a mechanical locking mechanism for unlocking the lock; a controller that is configured to control the electric motor and to receive one or more wireless signals from an electronic key; a user interface connected to the controller configured to detect a user interaction; wherein the controller is further configured to: determine on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiate the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detect interaction with the user interface of the lock; and, after completion of the first phase, initiate on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • In a further aspect, the invention relates to a method for controlling an electronic lock to unlock in at least two phases, a first phase and a second phase, the method comprising: controlling an electronic motor driving a mechanical locking mechanism and receiving one or more wireless signals from an electronic key; determining on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiating the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock; detecting interaction with a user interface of the lock; after completion of the first phase, initiating on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  • In a further aspect, the invention relates to a controller for a module as describe above, the controller comprising: a computer readable storage medium having computer readable program code embodied therewith, and, a processor, preferably a microprocessor, coupled to the computer readable storage medium, wherein responsive to executing the computer readable program code, the processor is configured to perform executable operations comprising the method steps as described above.
  • The module, method and controller enable improved keyless entry systems that at least reduce the waiting time for a user that intends to unlock a lock, for example a lock on a door of the user's home. Hereto, the module is configured to unlock the lock in two phases. The first phase is initiated by the controller in response to determining that an electronic key, and presumably a person holding the key, is within a predetermined distance of the lock. As will be understood, an appropriately chosen distance allows the controller to already initiate the first phase while the user is approaching and has not yet reached the lock. Hence, the lock will have already partially unlocked when the user arrives at the lock. If the user then indicates that he indeed intends to unlock, the controller will initiate the second phase and further unlock, e.g. completely unlock so that the user can access a house, locker, etc. The second phase may only start once a user has interacted with the lock, for example touching the lock, therefore the risk of unintentionally completely unlocking the lock is avoided.
  • The electronic key may be associated with the lock and/or may comprise a smartphone or any other portable device that can transmit wireless signals. The controller may be configured to control the transceiver module to transmit and receive messages from the key.
  • The mere reception of the signal from the key may be sufficient for the controller to determine that the key is within the predetermined distance from the lock. To illustrate, in one embodiment, the electronic key may be configured to monitor the distance and determine that it is within the predetermined distance from the lock. Then, the electronic key may transmit a message to the module, the message comprising an instruction to initiate the first phase and associated authentication information, such as an identifier of the electronic key. Based on the received authentication information, the controller may authenticate the instruction, e.g. in order to verify that it was received from an electronic key that is allowed to open the lock. With the authentication of the instruction, the controller may be understood to determine that the electronic key is within the predetermined distance from the lock. Thus, in this embodiment, in response to authenticating the instruction, the controller initiates the first phase.
  • In an example, the authentication information is an identifier of the electronic key and authenticating the instruction may comprise determining that the received identifier matches an identifier prestored in a data storage of the module. In an example, the authentication information is a code, which may be used by a plurality of electronic keys, and authenticating the instruction comprises determining that the received code matches a code prestored in a data storage of the module. The predetermined distance may be a distance in the range of 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Measures may be taken to neglect an electronic key if it is within the predetermined distance from the lock, yet already in the area for which access is controlled, the "inside" area, e.g. already in the house. Such measures may comprise at least one of the electronic key and the controller determining that the electronic key is in the "inside" area on the basis of Wifi and/or geofencing.
  • The lock in locked state may be configured to secure a member, such as a door, for restricting access to an area. In one embodiment, the controller comprises a first receiving unit, such as an antenna, positioned at a first side of the access restricting member and a second receiving unit, such as an antenna, positioned at a second side of the access restricting member. Hence, when the access restricting member is secured by the lock, the first antenna may be closer to the restricted area then the second antenna. In this embodiment, the controller is configured to receive the one or more wireless signals from the electronic key in both the first and second receiving unit. The first and/or second receiving unit may transmit the signals they receive wirelessly to the controller of the module, which obviates the need to provide electrical wiring between a receiving unit and the controller through the access restricting member. Furthermore, in this embodiment, the controller is configured to determine on the basis of the signals as received by the first and second receiving unit that the electronic key is outside the area to which said member restricts access. This determination may comprise the controller comparing the signal strengths of the signals as received by the first and second receiving unit respectively. Then, based on a determination that the signal strength of the signal as received by the second receiving unit is higher than the signal strength of the signal as received by the first receiving, the controller may determine that the electronic key is outside of the restricted area. Additionally or alternatively this determination may comprise the controller determining for each of the first and second receiving unit a time of flight and/or roundtrip time of a signal transmitted between the electronic key and the first receiving unit and a time of flight and/or roundtrip time of a signal transmitted between the electronic key and the second receiving unit. Then, based on a determination that the time of flight and/or roundtrip time determined for the second receiving unit is shorter than the time of flight and/or roundtrip time determined for the first unit, the controller may determine that the electronic key is outside of the restricted area. The controller may be configured to only enable initiation the first phase if it determines that the electronic key is outside of the restricted area as well as determines that the electronic key is within the predetermined distance from the lock. Additionally or alternatively, the controller may be configured to disable initiation of the first phase if it determines that the electronic key is already inside the restricted area irrespectively of whether the electronic key is within the predetermined distance from the lock or not. This embodiment prevents that the controller initiates the first phase if the electronic key is within the predetermined distance, yet already in the restricted area, for example because the electronic key is already inside a house.
  • It should be appreciated that in these embodiments, the electronic key may be configured to determined that it is outside the area to which said member restricts access, e.g. as a result of comparing signal strength of signals as received by the first and second receiving unit described above and/or as a result of comparing round-trip times and/or times of flight of signals between the electronic key and first receiving unit and of signals between the electronic key and second receiving unit. Then, in response to determining that it is outside the restricted area, the electronic key may transmit a signal, which may be understood to be one of the one or more wireless signals, to the controller indicating that it is outside the restricted area. Then, based on this signal, the controller determines that the electronic key is outside of the restricted area.
  • The user interaction may be indicative of an intention of the user to unlock the lock.
  • In embodiments of the module, method and controller one or more wireless signals comprise an identifier of the electronic key and/or an authentication code. In these embodiments, the controller is configured for, and the method comprises, enabling on the basis of the received identifier and/or on the basis of the authentication code initiation of the first phase. This embodiment provides convenient security measures for opening the lock.
  • In one embodiment the module comprises a rotatable member, such as a rotatable cylinder, coupled to the electric motor, the rotatable member being configured to drive the mechanical locking mechanism of the lock by rotating. In embodiments of the module and/or of the method, the controller is configured for, and the method comprises, controlling the electric motor to rotate the member in the first phase over a first angular distance from a first angular position to an intermediate angular position and controlling the electric motor to rotate the member in the second phase over a second angular distance from the intermediate angular position to a second angular position. These embodiments are advantageous because they enable that existing cylinder locks can be conveniently controlled.
  • The direction of said respective rotations in the first and second phase may be the same. Also, the second angular distance may be smaller than the first angular distance.
  • In one embodiment the mechanical locking mechanism comprises a dead bolt and a latch bolt. In embodiments, the controller is configured for, and/or the method comprises, retracting the deadbolt in the first phase and retracting the latch bolt in the second phase.
  • These embodiments allow easy calibration of the module, because the end of the first phase is clearly recognizable. At the end of the first phase, the dead bolt may namely be fully retracted, whereas the latch bolt may have not retracted at all.
  • In one embodiment the user interface comprises a touch sensitive surface and the interaction comprises the user touching the touch sensitive surface.
  • The touch surface may be, when the module is mounted on the lock for controlling the lock, at the outside of the door.
  • In embodiments, the controller is configured for, and/or the method comprises, establishing a secure connection with the electronic key. The secure connection may be established using techniques known in the art.
  • In embodiments, the controller is configured for, and/or the method comprises, determining a power of the one or more wireless signals as received, determining that the power as received exceeds a threshold value and in response determining that the key is within the predetermined distance from the lock.
  • The controller may be configured to determine, or calibrate, the threshold value on the basis of an indication of a power of the signal as transmitted by the electronic key. If for example the key transmits signals of lower power, the threshold value may be lower, whereas the threshold value may be higher if the key transmits signals of higher power. The controller may additionally or alternatively be configured to calculate a round-trip time of a signal. The controller may be configured to determine that the electronic key is within the predetermined distance on the basis of the calculated round-trip time, for example on the basis of the calculated round-trip time being shorter than a predetermined time.
  • In embodiments, the controller is configured for, and/or the method comprises, establishing a wireless connection with the electronic key; and for monitoring a quality of the connection and determining on the basis of the quality of the connection that the electronic key is within the predetermined distance.
  • The controller may be configured to repeatedly measure the quality of the connection, for example by measuring a power of the signal as received, such as an RSSI (Received Signal Strength Indicator). Also, the key may be configured to determine the quality of the connection, for example by measuring a power of a further signal as received by the key, wherein the further signal is transmitted by the transceiver module to the key. The key may then transmit the quality as measured by the key to the module.
  • In one embodiments, controller is configured for, and/or the method comprises, receiving a second wireless signal from the key and determining, prior to initiation of the second phase, on the basis of the received second signal that the key is within a predetermined second distance from the lock and in response enabling initiating the second phase, preferably the second distance being smaller than the predetermined distance.
  • This embodiment is advantageous because it prevents that a door can be opened by a malicious person when the first phase has completed, although the owner holding the key does not (yet) intend to unlock the door, for example because he is still sitting in his car near the lock.
  • It should be understood that in this embodiment the controller may thus be configured to only open the lock if at least two conditions i) and ii) are satisfied, namely i) the detector has detected an action of the user and ii) the key is within the predetermined second distance of the lock.
  • The second distance may be in the range of 0-5 meters, preferably 0-2 meters, more preferably 0-1 meter.
  • In one embodiment the module is mountable on a lock.
  • In one embodiment, the lock in locked state is configured to secure a member, such as a door, for restricting access to an area and in these embodiments the module further comprises a sensor that is configured to generate a position signal that is indicative of a position of the member. In embodiments, the controller is configured for, and/or the method comprises, controlling the lock to lock itself on the basis of the position signal.
  • This embodiment enables that the lock automatically locks a door once the door is closed again after it has been opened.
  • The controller may be configured to determine on the basis of the position signal that the member has moved from a position in which the member provides access to the area to be accessed to a position in which the member restricts access and in response control the lock to lock itself.
  • The sensor may comprise a magnetic sensor that is configured to measure a magnetic field strength for example a magnetic field strength caused by a (permanent) magnet mounted on a door and/or a magnetic field strength of the earth's magnetic field. In the latter case the sensor may be understood to comprise a compass. A compass mounted on for example a door enables the controller to determine the orientation of the door which allows to determine whether the door is open or shut.
  • Additionally or alternatively, the sensor may comprise an accelerometer for measuring an acceleration of the access restricting member, e.g. of a door. Then, the controller 4 may be configured to determine on the basis of the measured acceleration and, optionally based on a measured magnetic field, a position of the access restricting member. In a particular example, an accelerometer positioned on a door may measure a significant negative acceleration peak at the moment the door is shut and hits the door post. Then, based on this measured peak, the controller may be configured to determine that the has been shut. In response to this determination, the controller 4 may control the mechanical locking mechanism of the lock to fully lock the door.
  • In embodiments, the controller is configured for, and/or the method comprises, controlling the lock to fully lock after the first phase has completed in response to at least one of:
    • the controller determining that an established connection between the electronic key and the transceiver module has terminated;
    • the controller determining that a first time period since completion of the first phase has passed without determining that the key is in the second area;
    • the controller determining that a second time period has passed since determining that the key is in the second area.
  • These embodiments provide additional security measures in the sense that the lock will not be partially unlocked for a long time.
  • The first time period may for 20-60 seconds, preferably for 25-35 seconds. The second time period may last for 5-30 seconds, preferably 10-20 seconds.
  • In one embodiment a module is provided according to claim 13.
  • This embodiment is advantageous, because, upon mounting of the module on a lock, and in particular upon mounting the housing in the trough-hole in the lock, a channel is conveniently provided. The channel between the two sides of the lock may be for electric wiring that may transmit power and/or data, which may be beneficial if an electronic device, such as a touch sensitive surface is mounted on one side of a door and the power supply and logic on the other side of the door.
  • The shape of the through-hole may be defined by a standard. The through-hole may be shaped for an Europrofile lock, Oval lock, Swiss profile lock or KIK lock or to any other standardized lock profile.
  • In one embodiment, the housing is configured to provide the channel. The housing may comprise a recess running along a length of the housing.
  • One distinct aspect of this disclosure relates to the housing as described in this disclosure and/or to a housing for a rotatable member, such as a cylinder of a cylinder lock, the housing being mated to the shape of a through-hole in a lock, wherein at least one of the housing and the through-hole are configured to provide a channel through the lock, e.g. for electrical wiring, when the housing is mounted in the through-hole. In one embodiment, the housing is configured to provide the channel. The housing may comprise a recess running along a length of the housing.
  • As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, a method or a computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module" or "system." Functions described in this disclosure may be implemented as an algorithm executed by a processor/microprocessor of a computer. Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied, e.g., stored, thereon.
  • Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a computer readable storage medium may include, but are not limited to, the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of the present invention, a computer readable storage medium may be any tangible medium that can contain, or store, a program for use by or in connection with an instruction execution system, apparatus, or device.
  • A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electromagnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber, cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java(TM), Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor, in particular a microprocessor or a central processing unit (CPU), of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer, other programmable data processing apparatus, or other devices create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
  • In one aspect, embodiments of the present invention may relate to a computer-implemented method for controlling a lock.
  • Moreover, a computer program for carrying out the methods described herein, as well as a non-transitory computer readable storage-medium storing the computer program are provided. A computer program may, for example, be downloaded (updated) to the existing controller (e.g. to the existing or be stored upon manufacturing of these systems.
  • Embodiments of the present invention will be further illustrated with reference to the attached drawings, which schematically will show embodiments according to the invention. It will be understood that the present invention is not in any way restricted to these specific embodiments.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Aspects of this disclosure will be explained in greater detail by reference to exemplary embodiments shown in the drawings in which:
    • Fig. 1 schematically shows a system for controlling an electronic lock according to an embodiment of the invention;
    • Fig. 2A depicts a flow diagram of a method for controlling the electronic lock according to an embodiment of the invention;
    • Fig. 2B depicts a flow diagram of a method for controlling the electronic lock according to an embodiment of the invention;
    • Fig. 3 is an exploded view of one embodiment;
    • Fig. 4 shows an assembly of a lock, module and door according to one embodiment;
    • Fig. 5-7 show in detail a cylinder and housing according to an embodiment;
    • Figs. 8A-C depicts various flow diagrams of methods for controlling the electronic lock according to various embodiments of the invention;
    • Fig. 9 depicts a block diagram illustrating an exemplary data processing system that may be used in a controller or electronic key.
    DETAILED DESCRIPTION OF THE DRAWINGS
  • Fig. 1 schematically shows a system for controlling an electronic lock according to an embodiment of the invention. In particular, Fig. 1 depicts a system for controlling an electronic lock comprising a module 2 for controlling an electronic lock and an electronic key 16 that is configured to wirelessly communicate with the electronic lock.
  • The module 2 may be mounted on a door 1, which may be a door of a house, locker, cabinet, etc. connected to lock 12 of the door 1. The lock 12 comprises at least one mechanical part 14, i.e. a mechanical locking mechanism, which may comprise dead bolt and/or latch bolt which may, when the door is in a closed position, be extended from the door into a mortise in a doorjamb (not shown) in order to secure the door and restrict access to the area behind the door 1. The module may also control locks of other access restricting members, such as a hatch, lid, etc.
  • Module 2 may comprise an electric motor 6, a detector 10 and a transceiver module 8 which may be controlled by a controller 4. Further electric motor 4 is coupled to the at least one mechanical part 14 and may thus set the mechanical part 14 in motion.
  • An electronic key 16 is configured to communicate with the controller of the electronic lock. In particular, it may transmit one or more wireless signals to the module 2, which may be detected by transceiver module 8 and relayed to the controller 4 for further processing. The electronic key 16 may be implemented as a mobile device, e.g. a transponder that is configured to wirelessly communicate with the lock or as a software application on a mobile communication device such as a smart phone or the like.
  • Fig. 1 shows that the electronic key is located at a predetermined distance 20 away from the lock. Communication between the electronic key and the electronic lock may be possible within an area which may be defined by an maximum communication distance 18 away from the lock 12. If distance between the electronic key and the electronic lock is smaller than the maximum communication distance wireless communication between the electronic key and the electronic lock is possible. The maximum communication distance 18 may depend on the radio interface and the protocol that is used for establishing a radio connection between the electronic key and the electronic lock. The maximum communication distance may be in the range 2-50 meters, preferably 3-30 meters, more preferably 5-15 meters.
  • Fig. 2A is a flow diagram illustrating a method for controlling the electronic lock according to an embodiment of the invention. The method may be executed by the system described with reference to Fig. 1.
  • In a first step 24, the module 2 repeatedly transmits, e.g. broadcasts, notification messages comprising an identifier ID of the module 2. Once the electronic key 16 is close enough to the transceiver module 8, the electronic key 16 will receive one or more of these notification messages, one notification message indicated by arrow 24. The electronic key 16 is "in reach" of the module 2, and in particular of transceiver module 8. Once the electronic key 16 receives notification message 24, the electronic key 16 and the controller 4 may establish a wireless connection (step 26).
  • In an embodiment, the wireless connection may be a secure connection based on encryption techniques known in the art, such as the Elliptic curve Diffie-Hellman algorithm part of the Bluetooth 4.0 core spec. One precondition for establishing the connection 26 may be that the electronic key 16 is a so-called trusted device of the module 2.
  • It should be appreciated that the wireless connection and the signaling between the module 2 and the electronic key 16 may be may be based on any suitable wireless protocol. In an embodiment, a wireless protocol may be used that is configured to execute proximity monitoring between the electronic key and the electronic lock, such as a Bluetooth protocol, in particular the Bluetooth Proximity Profile. One version of this Proximity Profile protocol is 1.0.1 adopted on 14 July 2015, the specification of which is incorporated herein by reference in its entirety. The proximity monitoring process may provide a measure for the distance between the electronic key and the electronic lock.
  • After the connection between electronic key 16 and controller 4 has been established, an authentication procedure may be executed in which the controller authenticates the electronic key 16. During the authentication, the controller may determine whether the electronic key is registered with the controller. To that end, the controller 4 may use an identifier of the electronic key 16, that is transmitted to the controller. The controller 4 may then verify whether electronic key 16 is allowed to unlock the lock 12, for example by finding the identifier of the electronic key 16 in a database comprising identifiers of electronic keys that are allowed to open the lock 12. Said database may be stored in a memory of the controller. Additionally or alternatively, said database may be stored on a remote server.
  • In one embodiment the controller 4 receives, for example via the connection 26, an authentication code from the electronic key 16 and the controller 4 may be configured to determine on the basis of this authentication code that the electronic key 16 is allowed to open the lock 12.
  • In one embodiment, the controller 4 is configured to monitor the distance between the electronic key 16 and the module 4. In an example, the controller 4 is configured to monitor the distance by monitoring the connection 26, optionally in conformance with a protocol such as the Bluetooth Proximity Profile protocol. In particular, the controller 4 may be configured to repeatedly determine the power as received of the signals, such as the RSSI, from the electronic key 16.
  • Step 32 depicts controller 4 determining that the electronic key is within a predetermined distance 18 (the maximum communication distance as described with reference to Fig. 1) of the lock 12 and/or module 2. Hereto, the controller 4 may be configured to compare the monitored distance to the predetermined distance, which may be stored in a memory of the controller 4 and/or to compare a determined power of a signal as received from the electronic key 16 with a threshold power.
  • Once the controller has determined that the electronic key 16 is within the predetermined distance 18, the controller 4 controls in step 34 the electric motor 6 to drive at least one mechanical part 14 of the lock to partially unlock. It should be appreciated that partially unlocking may comprise partially retracting a bolt, for example retracting back into a door 1. In another example partially unlocking may comprise fully retracting a bolt, such as a dead bolt, of the lock, yet without fully unlocking the lock because another bolt, such as a latch bolt, is still extended, in an example extended from a door 1 into a mortise of a door jamb, the latch bolt securing the door 1.
  • In step 38 the controller determines that the electronic key 16 is within a second distance, indicated in Fig. 1 by reference numeral 22, of the lock and/or module 2. It should be appreciated that any of the above described techniques may be used for determining the distance between the electronic key 16 and the lock 12. In response, the controller 4 may be configured to enable initiation of the second phase illustrated in step 40. It should be appreciated that by default initiation of the second phase is disabled and that the controller is configured, e.g. programmed, to only initiate the second phase if at least the controller 4 has determined that the electronic key 16 is within a second distance 22 from the lock.
  • The controller 4 is configured to initiate the second phase on the basis of a detected action of a user. In one embodiment the first phase must have been completed before the second phase can be initiated. Step 42 illustrates that the module 2, in particular the detector 10, detects the action of the user. In response, the controller 4 initiates the second phase in step 44, in an example by controlling the electric motor 6 to further unlock the lock 12, which is depicted by step 46. Preferably, the first phase has completed prior to detection of the user action, so that upon detection of the user action the second phase can be initiated without delay caused by the first phase not having completed yet.
  • FIG. 2B is a flow diagram illustrating a method for controlling the electronic lock according to an embodiment of the invention. Identical reference numerals in FIG. 2A and 2B denote similar processes or messages or elements.
  • In step 24, the module 2 repeatedly e.g. broadcasts, notification messages comprising an identifier ID of the module 2. Once the electronic key 16 is close enough to the transceiver module 8, the electronic key 16 will receive one or more of these notification messages, one notification message indicated by arrow 24. The electronic key 16 is "in reach" of the module 2, and in particular of transceiver module 8.
  • In this embodiment, the electronic key 16 is configured to monitor the distance between the electronic key 16 and the module 2 and in step 30 the electronic key 16 monitors the distance based on the notification messages received in step 24.
  • The electronic key 16 may be configured to determine the distance between the module 2 and the key 16 using any technology described herein for determining a distance between a receiver and transmitter, for example using a protocol such as the Bluetooth Proximity Profile protocol. In one example, the electronic key 16 monitors a quality of an established connection (not shown) between the module 2 and the electronic key 16. In another example, the electronic key 16 may be configured to repeatedly determine a power as received, e.g. an RSSI, of the signals received from the module 2. The electronic key 16 may additionally or alternatively be configured to calculate a round-trip time of a signal in order to determine a distance between the module 2 and the key 16.
  • In step 31, the electronic key 16 determines, e.g. based on a measured distance, that the electronic key 16 is within the predetermined distance from the lock 2. Hereto, the electronic key 16 may be configured to compare a measured distance to the predetermined distance, which may be pre-stored in a memory of the electronic key 16. In an example, the electronic key 16 may be configured to determine that the power as received of signals from the module 2 exceeds a threshold value, which may be pre-stored in a memory of the electronic key, and in response determine that the key is within the predetermined distance. Alternatively, or additionally, the electronic key 16 may be configured to determine that it is within the predetermined distance from the lock 2 on the basis of a calculated round-trip time described above, for example on the basis of the calculated round-trip time being shorter than a predetermined time, which may be pre-stored in a memory of the electronic kay 16.
  • In the embodiment shown, in response to determining that the electronic key 16 is within the predetermined distance, the electronic key 16 in step 33 transmits at least one message comprising an instruction to the module 2 to initiate the first phase. Preferably, the at least one message comprising the instruction also comprises an identifier of the electronic key 16, based on which the controller 4 in module 2 can authenticate the instruction. In an example, the controller 2 authenticating the instruction comprises determining that the identifier of the electronic key 16 matches an identifier that is stored in a data storage of the module 2 that stores identifiers of electronic keys that are allowed to open the lock 2.
  • Step 32 comprises the module 2, in particular the controller 4, determining that the electronic key 16 within the predetermined distance from the lock on the basis of the message received in step 33. The controller 4 for example makes this determination based on an identifier of the electronic key received from the electronic key, for example the identifier that the module 2 receives together with the instruction to initiate the first phase as described above.
  • In this embodiment, the module, in particular the controller 4 of module 2, may be understood to determine that the electronic key 16 is within the predetermined distance by authenticating the instruction received in step 33, for example based on an identifier of the electronic key received in association with the instruction.
  • In response to authenticating the instruction, and thus, in one example, in response to determining that the electronic key 16 is within the predetermined distance from the lock 2, the controller in step 34 initiates the first phase, causing the electric motor in step 36 to drive a mechanical locking mechanism of the lock to partially unlock the lock.
  • Similarly as described with reference to step 31 and 33, the electronic key 16 may also in respective steps 37 and 39 determine that the electronic key 16 is within the second predetermined distance from the lock and transmit at least one second message comprising a second instruction to the module 2 to enable initiation of the second phase. In this embodiment, the module 2, in particular the controller 4, may be understood to determine that the electronic key 16 is within the predetermined second distance by authenticating the instruction received in step 39, e.g. based on an identifier of the electronic key 16 received in association with the second instruction.
  • In one embodiment of the method (not shown), the electronic key monitors the distance and transmits an indication of the measured distance to the module 2, which can then determine that the electronic key is within the predetermined distance by comparing the distance as monitored by and received from the electronic key 16 with the predetermined distance, which the module has pre-stored in a data storage.
  • In one embodiment (not shown), the electronic key 16 determines that it is within the predetermined distance 18 from the lock 2, and transmits an instruction to the lock 2 to initiate the first phase as described above. However, in this embodiment, the electronic key 16 does not determine that it is within the predetermined second distance from the lock. In this embodiment, the module 2, in particular controller 4, determines that the electronic key 16 is within the predetermined second distance of the lock.
  • Fig. 3 depicts a schematic of a mechanical locking mechanism 12 and elements 52,54,58, 59, 60,10 for forming a module for electronically controlling the mechanical locking mechanism 12. The elements are illustrate in a disassembled state. Fig. 4 depicts the mechanical locking mechanism and the module installed in a door 1. As shown in Fig. 4, the mechanical locking mechanism 12 and the module may form an electronic lock for a door which can be controlled using an electronic key as described with reference to Fig. 1-2.
  • The assembly of elements depicted in Fig. 3 may be installed on a door 1. Door 1 may be a door of a house. The arrows IS and OS respectively indicate the inside area and the outside area associated with the lock 12 and/or door 1. The inside area may be an area to which access is to be controlled by means of the lock 12, such as the inside of a home, the outside area may be a freely accessible area, such as a public area. In the embodiment shown, a handle 50, when mounted, has a fixed position with respect to the lock. The lock 12 may not be controllable by a handle on the outside of the lock, which is typical for front doors of houses.
  • Detector 10 may comprise a display 11 and one or more buttons 13. The display 11 and/or the buttons 13 may comprise touch sensitive areas thus forming a user interface for the electronic lock. The display 11, which may thus be a touch-sensitive display, and the one or more buttons 13 enable a user to interact with the module 2. The detector 10 comprises electrical wiring 48 which can be connected to the controller 4 (not shown) and/or a power supply of the module 2. The electrical wiring 48 enables data communication between the controller and the detector 10. Power may also be provided to the detector 10 through the electrical wiring 48.
  • In this embodiment, lock 12 comprises at least two mechanical parts that can be driven by an electric motor (not shown), a latch bolt 14a and a dead bolt 14b.
  • Further shown is a rotatable cylinder 52 that is rotatable with respect to a housing 54. Mounting plate 56 provides additional stability for a housing 59 when mounted on door 1. Housing 59 may comprise at least one of the electric motor, the transceiver module 10 and controller 4. A rotatable handle 60, such as a rotatable door knob, may be mounted on the housing 59. The handle may be thus on the inside and may enable a user to manually open the door. The lock may thus be both controllable by the module 2 and by a handle on the inside according to mechanisms known in the art.
  • Fig. 5 shows a housing 54 and cylinder 52 of a cylinder lock for use in an electronic lock according to an embodiment of the invention. In an embodiment, the housing and the cylinder may be configured to cooperate with a standardized mechanical locking mechanism, such as the European cylinder door lock mechanism.
  • The cylinder 52 may comprises at least one cam 62 that is configured to drive at least one mechanical part of the lock 12, such as a sprocket-wheel. Cylinder 52 may comprise a recess 53 along at least part of a length of the cylinder 52, the recess 53 enabling other parts to grasp the cylinder. Further, the front face of the housing is closed and does not comprise an opening for receiving a mechanical key.
  • In this embodiment, the housing comprises a recess 64 that runs along a length of the housing. When the support structure is mounted in through-hole 58 shown in Fig. 1, the recess 64 provides a channel for electrical wiring 48.
  • Fig. 6 shows an exemplary shape of a through-hole 58 in a lock. In this example, the shape is a standard shape of an Euro profile lock. Fig. 7 shows a profile of a housing 54 associated with the shape shown in Fig. 6 according to one embodiment. In this embodiment the profile of the support structure 54 comprises a cutaway part 64 in the bottom part of the support structure 54.
  • Figs. 8A-C depicts various flow diagrams of methods for controlling an electronic lock according to various embodiments of the invention.
  • Fig. 8A depicts a flow diagram wherein in a first step 180 the lock may transmit at a predetermined intervals a signal comprising lock identifier, which may be a unique identifier. A wireless connection between the lock and an electronic (trusted) device, the electronic key, may be formed when the trusted device receives the signal comprising the lock identifier (step 182). In step 184 an authentication procedure may be executed between the lock and the trusted device. The authentication procedure may comprise exchanging identifiers and/or authentication codes. In a further step 186 the lock may monitor the distance between lock and the trusted device. In an embodiment, the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection (step 188). In another embodiment, the connection may be terminated if the distance between the lock and the electronic key is or remains larger than a predetermined distance x (step 190).If the device is within a predetermined distance the electronic motor is controlled for driving the mechanical locking mechanism, wherein the driving retracting a deadbolt of the lock (step 192).
  • Fig. 8B depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving retracting a deadbolt of the lock (step 192). In step 194 the connection may be terminated if the electronic key is out of range or the electronic key is terminating the connection. In that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 196).
  • Alternatively, during the retracting of the deadbolt, the user interface of the lock may detect an interaction, e.g. somebody touching the user interface, while the distance between the lock and the device is larger than predetermined second distance Z. In that case, the state of the lock does not change, because the controller does not enable initiation of the second phase if the electronic key is not within the predetermined second distance (step 200).
  • Alternatively, during the retracting of the deadbolt, the a predetermined time U has passed in which the distance between the lock and the device has been larger than predetermined second distance Z (step 202). In that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 204).
  • Fig. 8C depicts a flow diagram wherein in a first step, the electronic motor is controlled for driving the mechanical locking mechanism, the driving fully retracting a deadbolt of the lock (step 192). The electronic lock may determine that the distance between the lock and the device may be smaller than predetermined second distance Z (step 206).
  • In that case, if the user interface of the lock detects an interaction, e.g. a user touching the user interface, (step 208), the electronic motor may be controlled for driving the mechanical locking mechanism, the driving retracting a latch bolt (step 210), in order to fully open the lock (step 212).
  • Alternatively, if the deadbolt of the lock is fully retraced and the distance between the lock and the device may be smaller than predetermined second distance Z and if a predetermined time V has passed without the user interface detecting an interaction (step 214), in that case, the electronic motor may be controlled for driving the mechanical locking mechanism, the driving returning the lock to a fully locked state by extending the deadbolt (step 216).
  • Fig. 9 depicts a block diagram illustrating an exemplary data processing system that may be used in a computing system as described with reference to Fig. 2.
  • As shown in Fig. 9, the data processing system 100 may include at least one processor 102 coupled to memory elements 104 through a system bus 106. As such, the data processing system may store program code within memory elements 104. Further, the processor 102 may execute the program code accessed from the memory elements 104 via a system bus 106. In one aspect, the data processing system may be implemented as a computer that is suitable for storing and/or executing program code. It should be appreciated, however, that the data processing system 100 may be implemented in the form of any system including a processor and a memory that is capable of performing the functions described within this specification.
  • The memory elements 104 may include one or more physical memory devices such as, for example, local memory 108 and one or more bulk storage devices 110. The local memory may refer to random access memory or other non-persistent memory device(s) generally used during actual execution of the program code. A bulk storage device may be implemented as a hard drive or other persistent data storage device. The processing system 100 may also include one or more cache memories (not shown) that provide temporary storage of at least some program code in order to reduce the number of times program code must be retrieved from the bulk storage device 110 during execution.
  • Input/output (I/O) devices depicted as an input device 112 and an output device 114 optionally can be coupled to the data processing system. Examples of input devices may include, but are not limited to, a keyboard, a pointing device such as a mouse, or the like. Examples of output devices may include, but are not limited to, a monitor or a display, speakers, or the like. Input and/or output devices may be coupled to the data processing system either directly or through intervening I/O controllers.
  • In an embodiment, the input and the output devices may be implemented as a combined input/output device (illustrated in Fig. 9 with a dashed line surrounding the input device 112 and the output device 114). An example of such a combined device is a touch sensitive display, also sometimes referred to as a "touch screen display" or simply "touch screen". In such an embodiment, input to the device may be provided by a movement of a physical object, such as e.g. a stylus or a finger of a user, on or near the touch screen display.
  • A network adapter 116 may also be coupled to the data processing system to enable it to become coupled to other systems, computer systems, remote network devices, and/or remote storage devices through intervening private or public networks. The network adapter may comprise a data receiver for receiving data that is transmitted by said systems, devices and/or networks to the data processing system 100, and a data transmitter for transmitting data from the data processing system 100 to said systems, devices and/or networks. Modems, cable modems, and Ethernet cards are examples of different types of network adapter that may be used with the data processing system 100.
  • As pictured in Fig. 9, the memory elements 104 may store an application 118. In various embodiments, the application 118 may be stored in the local memory 108, the one or more bulk storage devices 110, or apart from the local memory and the bulk storage devices. It should be appreciated that the data processing system 100 may further execute an operating system (not shown in Fig. 9) that can facilitate execution of the application 118. The application 118, being implemented in the form of executable program code, can be executed by the data processing system 100, e.g., by the processor 102. Responsive to executing the application, the data processing system 100 may be configured to perform one or more operations or method steps described herein.
  • In one aspect of the present invention, the data processing system 100 may represent a controller as described herein. In one aspect of the present invention, the data processing system 100 may represent an electronic key as described herein.
  • In another aspect, the data processing system 100 may represent a client data processing system. In that case, the application 118 may represent a client application that, when executed, configures the data processing system 100 to perform the various functions described herein with reference to a "client". Examples of a client can include, but are not limited to, a personal computer, a portable computer, a mobile phone, or the like.
  • In yet another aspect, the data processing system x00 may represent a server. For example, the data processing system may represent an (HTTP) server, in which case the application x18, when executed, may configure the data processing system to perform (HTTP) server operations.
  • Various embodiments of the invention may be implemented as a program product for use with a computer system, where the program(s) of the program product define functions of the embodiments (including the methods described herein). In one embodiment, the program(s) can be contained on a variety of non-transitory computer-readable storage media, where, as used herein, the expression "non-transitory computer readable storage media" comprises all computer-readable media, with the sole exception being a transitory, propagating signal. In another embodiment, the program(s) can be contained on a variety of transitory computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., flash memory, floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored. The computer program may be run on the processor 102 described herein.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of embodiments of the present invention has been presented for purposes of illustration, but is not intended to be exhaustive or limited to the implementations in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present invention. The embodiments were chosen and described in order to best explain the principles and some practical applications of the present invention, and to enable others of ordinary skill in the art to understand the present invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (15)

  1. A module for controlling an electronic lock, the module being configured to unlock the lock in at least two phases, a first phase and a second phase; the module comprising:
    an electric motor configured to drive a mechanical locking mechanism for unlocking the lock;
    a controller that is configured to control the electric motor and to receive one or more wireless signals from an electronic key;
    a user interface connected to the controller configured to detect a user interaction; wherein the controller is further configured to:
    determine on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiate the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock;
    detect interaction with the user interface of the lock; and,
    after completion of the first phase, initiate on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  2. The module according to claim 1, wherein the
    one or more wireless signals comprise an identifier of the electronic key and/or an authentication code; and wherein the controller is configured to
    enable on the basis of the received identifier and/or on the basis of the authentication code initiation of the first phase.
  3. The module according to claim 1 or 2, further comprising a rotatable member, such as a rotatable cylinder, coupled to the electric motor, the rotatable member being configured to drive the mechanical locking mechanism of the lock by rotating, wherein
    the controller is configured to control the electric motor to rotate the member in the first phase over a first angular distance from a first angular position to an intermediate angular position and to control the electric motor to rotate the member in the second phase over a second angular distance from the intermediate angular position to a second angular position.
  4. The module according to one or more of the preceding claims, wherein the mechanical locking mechanism comprises a dead bolt and a latch bolt, and wherein the controller is configured to retract the deadbolt in the first phase and to retract the latch bolt in the second phase.
  5. The module according to one or more of the preceding claims, wherein the user interface comprises a touch sensitive surface and wherein the interaction comprises the user touching the touch sensitive surface.
  6. The module according to one or more of the preceding claims, wherein the controller is configured to establish a secure connection with the electronic key.
  7. The module according to one or more of the preceding claims, wherein the controller is configured to
    determine a power of the one or more wireless signals as received;
    determine that the power as received exceeds a threshold value and in response determine that the key is within the predetermined distance from the lock.
  8. The module according to one or more of the preceding claims, wherein the controller is configured to establish a wireless connection with the electronic key; and to
    monitor a quality of the connection and determine on the basis of the quality of the connection that the electronic key is within the predetermined distance.
  9. The module according to one or more of the preceding claims, wherein
    the controller is configured to receive a second wireless signal from the key; and
    the controller is configured to determine, prior to initiation of the second phase, on the basis of the received second signal that the key is within a predetermined second distance from the lock and in response enable initiating the second phase, preferably the second distance being smaller than the predetermined distance.
  10. The module according to one or more of the preceding claims, wherein the module is mountable on a lock.
  11. The module according to one or more of the preceding claims, wherein the lock in locked state is configured to secure a member, such as a door, for restricting access to an area, the module further comprising
    a sensor that is configured to generate a position signal that is indicative of a position of the member; and wherein the controller is configured to control the lock to lock itself on the basis of the position signal.
  12. The module according to one or more of the preceding claims, wherein
    the controller is configured to control the lock to fully lock after the first phase has completed in response to at least one of:
    - the controller determining that an established connection between the electronic key and the transceiver module has terminated;
    - the controller determining that a first time period since completion of the first phase has passed without determining that the key is in the second area;
    - the controller determining that a second time period has passed since determining that the key is in the second area.
  13. The module according to one or more of the preceding claims, further comprising
    a housing for a rotatable member, such as a cylinder of a cylinder lock,
    the housing being mated to the shape of a through-hole in the lock, wherein
    at least one of the housing and the through-hole are configured to provide a channel through the lock, e.g. for electrical wiring, when the housing is mounted in the through-hole.
  14. A method for controlling an electronic lock to unlock in at least two phases, a first phase and a second phase, the method comprising:
    controlling an electronic motor driving a mechanical locking mechanism and receiving one or more wireless signals from an electronic key;
    determining on the basis of the one or more wireless signals that the electronic key is within a predetermined distance from the lock and in response initiating the first phase comprising controlling the electric motor to drive the mechanical locking mechanism to partially unlock the lock;
    detecting interaction with a user interface of the lock;
    after completion of the first phase, initiating on the basis of the detected user interaction the second phase, comprising controlling the electric motor to drive the mechanical locking mechanism to fully unlock the lock.
  15. A controller for a module according to claim 1, the controller comprising:
    a computer readable storage medium having computer readable program code embodied therewith, and
    a processor, preferably a microprocessor, coupled to the computer readable storage medium, wherein responsive to executing the computer readable program code, the processor is configured to perform executable operations comprising the method steps according to claim 14.
EP18151719.4A 2017-01-13 2018-01-15 Module, method and controller for controlling a lock Active EP3349192B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL1042227 2017-01-13

Publications (3)

Publication Number Publication Date
EP3349192A1 true EP3349192A1 (en) 2018-07-18
EP3349192C0 EP3349192C0 (en) 2023-07-26
EP3349192B1 EP3349192B1 (en) 2023-07-26

Family

ID=60972147

Family Applications (2)

Application Number Title Priority Date Filing Date
EP18151719.4A Active EP3349192B1 (en) 2017-01-13 2018-01-15 Module, method and controller for controlling a lock
EP18151732.7A Withdrawn EP3348752A1 (en) 2017-01-13 2018-01-15 Lock assembly for providing a channel through a lock

Family Applications After (1)

Application Number Title Priority Date Filing Date
EP18151732.7A Withdrawn EP3348752A1 (en) 2017-01-13 2018-01-15 Lock assembly for providing a channel through a lock

Country Status (1)

Country Link
EP (2) EP3349192B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11686126B2 (en) 2019-07-18 2023-06-27 Endura Products, Llc Methods of operating a lock
US11989986B2 (en) 2019-10-08 2024-05-21 Assa Abloy Ab Inside or outside a metal door

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2923205T3 (en) * 2018-07-17 2022-09-26 Loqed Holding B V Electronically operated door lock

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140157842A1 (en) * 2012-12-12 2014-06-12 Kwikset Corporation Electronic lock system having proximity mobile device
US20140292481A1 (en) * 2011-03-17 2014-10-02 Unikey Technologies, Inc. Wireless access control system and related methods
US20160343183A1 (en) * 2015-05-18 2016-11-24 Unikey Technologies Inc. Wireless access control system for a door including proximity based authentication and related methods

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1030640A (en) * 1964-12-08 1966-05-25 Fred Anthony Baldinelli Signalling device
DE8700375U1 (en) * 1987-01-09 1987-04-30 Bks Gmbh, 5620 Velbert, De
DE3738906A1 (en) * 1987-11-17 1989-05-24 Bks Gmbh DOOR FITTING WITH INTERIOR AND EXTERIOR LABEL
DE10122125C1 (en) * 2001-05-07 2002-09-05 Huwil Werke Gmbh Lock cylinder has lock core and adaptor with spring pin to fit into recess in housing bore
PL1574643T3 (en) * 2004-03-11 2012-06-29 Keso Ag Electromechanical lock cylinder
DE102004057114B3 (en) * 2004-11-26 2006-08-03 Beckmann, Dieter, Dipl.-Ing. Pusher set for fire-proof door, has latches made of welded steel pipes in which electronic warning device is arranged with section of latch having square hollow pin through which cable with connector passes
DE102005023130A1 (en) * 2005-05-19 2006-11-23 Hewi Heinrich Wilke Gmbh lock element
US7721576B2 (en) * 2007-08-21 2010-05-25 Essence Security International Ltd Lock cylinder opening system and method
AT10705U1 (en) * 2007-11-05 2009-08-15 Sitech Sicherheitstechnik Gmbh SHIELD FOR A CASTLE
NL1039122C2 (en) * 2011-06-23 2013-01-02 Ren Klaassen Electronic cylinder lock assembly.
GB2524718B (en) * 2014-02-13 2021-01-13 Loxal Security Ltd Door lock
DE102014104140A1 (en) * 2014-03-25 2015-10-01 Assa Abloy Sicherheitstechnik Gmbh Lock for door or window
AT516346A1 (en) * 2014-09-15 2016-04-15 Makivic Michael Door plate for a door fitting

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140292481A1 (en) * 2011-03-17 2014-10-02 Unikey Technologies, Inc. Wireless access control system and related methods
US20140157842A1 (en) * 2012-12-12 2014-06-12 Kwikset Corporation Electronic lock system having proximity mobile device
US20160343183A1 (en) * 2015-05-18 2016-11-24 Unikey Technologies Inc. Wireless access control system for a door including proximity based authentication and related methods

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11686126B2 (en) 2019-07-18 2023-06-27 Endura Products, Llc Methods of operating a lock
US11989986B2 (en) 2019-10-08 2024-05-21 Assa Abloy Ab Inside or outside a metal door

Also Published As

Publication number Publication date
EP3348752A1 (en) 2018-07-18
EP3349192C0 (en) 2023-07-26
EP3349192B1 (en) 2023-07-26

Similar Documents

Publication Publication Date Title
US10731380B2 (en) Electronic lock with door orientation sensing
TWI737716B (en) Lockset and method of detecting an authentication device for use with an electronic lockset
US11295568B2 (en) Wireless tag-based lock actuation systems and meihods
EP3349192B1 (en) Module, method and controller for controlling a lock
US11989984B2 (en) Electronic lock pairing via passcode
EP3300033B1 (en) Access control system, portable user device, and method of controlling access
MX2015002067A (en) Wireless reader system.
JP5457050B2 (en) Electronic key system and suspicious person intrusion prevention method
US11671499B2 (en) System and method of establishing server connections to internet of things devices, including electronic locks
US11961344B2 (en) Ultra-wideband accessory devices for radio frequency intent detection in access control systems
JP5985032B1 (en) Key opening / closing device, operation control system
JP2016079645A (en) Electronic lock system, unlocking method, and lock opening/closing system
KR20220102797A (en) Locking apparatus and controlling method thereof
TWI641748B (en) Electronic lock control method
TWI532017B (en) Wireless control method, wireless host and switch control device
JP2013076242A (en) Tag authentication system, tag and method for setting parameter related to signal reception of tag
JP6937486B2 (en) Electric lock control system, electric lock system, control method and program
JP6817581B2 (en) Electric lock control system, electric lock system, control method of electric lock control system, and program
JP2014189943A (en) Electric lock system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20190118

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

RIC1 Information provided on ipc code assigned before grant

Ipc: G07C 9/00 20200101AFI20210715BHEP

Ipc: E05B 47/02 20060101ALN20210715BHEP

Ipc: E05B 63/00 20060101ALN20210715BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20211006

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: E05B 63/00 20060101ALN20230120BHEP

Ipc: E05B 47/02 20060101ALN20230120BHEP

Ipc: G07C 9/00 20060101AFI20230120BHEP

INTG Intention to grant announced

Effective date: 20230221

RIC1 Information provided on ipc code assigned before grant

Ipc: E05B 63/00 20060101ALN20230213BHEP

Ipc: E05B 47/02 20060101ALN20230213BHEP

Ipc: G07C 9/00 20060101AFI20230213BHEP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602018053907

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

U01 Request for unitary effect filed

Effective date: 20230808

U07 Unitary effect registered

Designated state(s): AT BE BG DE DK EE FI FR IT LT LU LV MT NL PT SE SI

Effective date: 20230811

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20231027

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20231126

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20231026

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20231126

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20231027

U20 Renewal fee paid [unitary effect]

Year of fee payment: 7

Effective date: 20240125

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230726