WO2022098291A1 - Device and method for activating a programmable key - Google Patents

Device and method for activating a programmable key Download PDF

Info

Publication number
WO2022098291A1
WO2022098291A1 PCT/SE2021/051111 SE2021051111W WO2022098291A1 WO 2022098291 A1 WO2022098291 A1 WO 2022098291A1 SE 2021051111 W SE2021051111 W SE 2021051111W WO 2022098291 A1 WO2022098291 A1 WO 2022098291A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
programmable
activation device
programmable key
access right
Prior art date
Application number
PCT/SE2021/051111
Other languages
French (fr)
Inventor
Johan Hörberg
Martin Lindvall
Original Assignee
Swedlock Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Swedlock Ab filed Critical Swedlock Ab
Priority to EP21889721.3A priority Critical patent/EP4241255A1/en
Publication of WO2022098291A1 publication Critical patent/WO2022098291A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00761Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors

Definitions

  • the present disclosure belongs to devices and methods for activating a programmable key.
  • an activation device for activating a stored access right of the programmable key may be an option.
  • An activation device serves to allow unlocking an access right of the programmable key in that the programmable key can unlock an electromechanical lock of a room, a building, a cabinet, a medicine cabinet, a padlock, or the like.
  • Known solutions of activation devices often include power draining circuitry for wireless communicability, and the like. Such features may turn the activation device inconvenient to carry in a pocket to enable a short-term access to a specific room or cabinet. Hence, there is a need for a simple and compact activation device without compromising on the additional security that such a device offers.
  • an activation device for activating a programmable key comprising:
  • - circuitry configured to receive a first signal from the programmable key and, subsequently, return a second signal to the programmable key for unlocking a stored access right of the programmable key, wherein the activation device is exclusively connectable to the programmable key.
  • the wording “activating a programmable key” is to be understood as unlocking and/or allowing unlocking of a stored access right of the programmable key.
  • the first signal is received by the activation device.
  • the second signal comprises the first signal and a decipher input, e.g. a number code, provided by a user, to be returned to the programmable key.
  • the first signal may be a randomly generated string.
  • the second signal may be the same randomly generated string comprising the decipher input.
  • the programmable key Upon deciphering a cipher associated with a stored access right of the programmable key, the programmable key unlocks the associated stored access right of the programmable key to be set in an unlocked state.
  • the activation device may remain unpowered while disconnected from the programmable key. That is, any built-in power source, such as a battery or the like, may be absent in the activation device. Thus, the activation device may be exclusively and temporarily powered by a programmable key while such a programmable key is connected to the activation device. Further, any communication means for communicating with an external device is absent in the activation device. Thus, the activation device is incapable to communicate wiredly or wirelessly with an external device other than the programmable key, thereby excluding a need for built-in circuitry for such purposes. This applies also in the case when the programmable key is connected to the activation device.
  • Another advantage is facilitating security as of the non-connectability to, e.g., Wi-Fi, Bluetooth, RFID transponders, cloud-based services, or the like, turning the activation device impossible to remotely hack by a third participant having a possibly malicious intent.
  • the programmable-key receiving portion may comprise a cavity for receiving a key blade of the programmable key.
  • the key blade of the programmable key has a suitable geometry for being inserted into the receiving portion of the activation device. This may add additional security against a third participant having a possibly malicious intent.
  • the cavity may comprise a programmable-key retaining element.
  • the programmable-key retaining element may be a flexible programmable-key retaining element.
  • Such a flexible programmable-key retaining element may comprise a flexible arm, wherein the flexible arm may comprise a protruding portion to be at least partly received by an indentation of the key blade of the programmable key when the programmable key is in the inserted position in the activation device.
  • an opposite arrangement is possible, i.e.
  • the programmable key may comprise a flexible arm similar to as described above, and the cavity of the activation device may comprise an indentation such that a protruding portion of the flexible arm may be at least partly received by the indentation of the cavity when the programmable key is in the inserted position of the activation device.
  • the indentation of the cavity serves as the programmable-key retaining element.
  • the programmable-key retaining element may allow the activation device to firmly retain the programmable key to retain in the programmable-key receiving portion while the programmable key is in an inserted position in the programmable-key receiving portion.
  • the activation device may be configured to be powered by the programmable key while the programmable key and the activation device are in a connected state.
  • the connected state preferably refers to when the programmable key is in an inserted position in the programmable-key receiving portion of the activation device.
  • a stored access right of the programmable key may thus be unlocked exclusively while a programmable key is in the inserted position in the programmable-key receiving portion of the activation device.
  • the cipher-key input arrangement may be a keypad.
  • An associated cipher may be a digit code.
  • a keypad serving as a cipher-key input arrangement reduces complexity of the circuitry of the activation device, thereby minimizing errors when deciphering the associated cipher, yet retaining an adequate security. Further, a keypad serving as a cipher-key input arrangement requires a minimal amount of electrical power compared to other authentication means, thereby saving electrical power provided by the programmable key.
  • the activation device may be configured to be geometrically enclosed by a volume having the dimensions 10x6x2 cm.
  • the activation device may be suitable for carrying in a clothing pocket of a user.
  • a programmable-key system comprising:
  • the activation device comprises:
  • programmable key comprises:
  • a key blade configured to be inserted into the programmable-key receiving portion and into a lock core
  • circuitry configured for storing an access right, wherein the access right allows unlocking of a lock associated with the lock core, and wherein the activation device is exclusively connectable to the programmable key.
  • the lock core to be unlocked by the programmable key may be a lock core of a lock for locking a room, a building, a cabinet, a medicine cabinet, a padlock, a boom, or the like.
  • the stored access right of the programmable key may be set in an unlocked state during a first period of time.
  • the stored access right of the programmable key may be set in a locked state, thereby inactivating the programmable key.
  • the stored access right may again be set in an unlocked state by the activation device by the procedure described above.
  • the circuitry of a single activation device may be configured for allowing unlocking a stored access right of a plurality of programmable keys.
  • a specific activation device as disclosed herein is essentially identical to any other activation device (as disclosed herein) configured to activate a corresponding programmable key. This may facilitate flexibility, as two users, each having a programmable key, may use the same activation device for unlocking a stored access right of their respective programmable key. Conversely, a single user may unlock a stored access right of the programmable key using any one of a plurality of activation devices. It is to be noted that such a feature does not jeopardize security in view of a third participant having possibly malicious intent, as a decipher key, e.g., a number code, is always required for unlocking a stored access right of the programmable key.
  • an isolated activation device may lack any meaningful function without a corresponding programmable key, and, conversely, an isolated programmable key may lack any meaningful function without a corresponding activation device.
  • the activation device may be configured to be powered by the programmable key while the programmable key is in an inserted position in the programmable-key receiving portion.
  • the programmable key comprises a power source, preferably a rechargeable battery, for supplying an electrical current to the activation device while being in the inserted position in the programmable-key receiving portion of the activation device.
  • a power source preferably a rechargeable battery
  • the programmable key may thereby enhance security, reliability, and flexibility of the programmable-key system.
  • the cipher-key input arrangement may be configured to allow, while the programmable key is in the inserted position in the activation device, setting an interconnected stored access right of the programmable key in an unlocked state.
  • the programmable key comprises a preinstalled stored access right that can be unlocked by a corresponding activation device. While the key blade of the programmable key is inserted in the programmable-key receiving portion of the activation device a first signal is sent to the activation device. After deciphering, e.g., after a user has entered a code on the keypad of the activation device, the programmable key receives a second signal comprising the decipher key. After verification of the second signal by the programmable key the interconnected stored access right of the programmable key is set in an unlocked state. Any type of signal of the first and the second signal is possible.
  • the first/second signal may be a randomly generated string.
  • the first/second signal may be encrypted.
  • a possible encryption of the first/second signal may exploit, e.g., an exclusive-or operator to the first signal.
  • an exclusive-or operator to the first signal.
  • any stored access-right information on the activation device enhances security and allows the activation device being relatively small and portable.
  • the cipherkey input arrangement being comprised in the activation device instead of in the programmable key may further facilitate user convenience, as the spatial dimensions of the programmable key may then be held relatively small.
  • the activation device may be non-powered except for while the programmable key is in an inserted position in the programmable-key receiving portion of the activation device.
  • a method for activating a programmable key comprising:
  • the setting of the stored access right in the unlocked state may comprise maintaining the unlocked state of the stored access right during a first period of time.
  • the method may comprise preventing the activation device to be powered except for while a key blade of the programmable key is in an inserted position in the programmable-key receiving portion of the activation device.
  • the dimensions of the activation device may be held relatively small, allowing the activation device to be carried in a pocket.
  • the cipher-key input arrangement may comprise a cipher to be deciphered allowing setting an associated stored access right of the programmable key in an unlocked state.
  • the activation device, the programmable-key system and/or the method for activating a programmable key may comprise a plurality of decipher keys for unlocking a specific stored access right of the programmable key.
  • each one of two or more users may be requested to provide a respective secret decipher key while the programmable key is in the inserted position of the activation device.
  • each one of the two or more users may not be allowed to unlock the specific stored access right.
  • Such a feature may be advantageous for accessing high-security domains, thus facilitating security of the programmable-key system.
  • a stored access right of the programmable may comprise a userspecific hierarchical structure.
  • a person, Alice may unlock an access right of the programmable key for accessing a building and Alice’s office inside the building.
  • An electrician may have a similar programmable key. The electrician may unlock an access right of the programmable key for accessing the same building, as well as an electrical cabinet inside the building.
  • Alice does not have access to the electrical cabinet, and the electrician does not have access to Alice’s office.
  • both Alice and the electrician may have access to enter the building, whereas they have differing exclusive access rights to spaces inside the building.
  • An access right of the programmable key may thus comprise a hierarchical structure.
  • Fig. 1 A shows an activation device for activating a programmable key.
  • Fig. 1 B schematically shows a programmable-key retaining element.
  • Fig. 2A shows a programmable-key system, where an activation device and a programmable key are in a disconnected state.
  • Fig. 2B shows a programmable-key system, where an activation device and a programmable key are in a connected state.
  • Fig. 2C shows executable functions of a circuitry of a programmable key.
  • Fig. 3 shows a flowchart of a method for activating a programmable key.
  • Fig. 1 A discloses an activation device 100 for activating a programmable key 200.
  • the activation device 100 comprises a programmable-key receiving portion 110.
  • the programmable-key receiving portion 110 may comprise a cavity 120 for receiving a key blade 210 of the programmable key 200.
  • the cavity 120 may comprise a programmable-key retaining element 128.
  • the programmable-key retaining element 128 may be a flexible retaining element 128.
  • the flexible retaining element 128 may comprise an elongated flexible arm 122 to be elastically deformed upon insertion 170 of the programmable key 200 into the cavity 120.
  • the elongated flexible arm 122 may comprise a protruding portion 126 having a rounded edge 124 for sliding against an outer surface 220 of a key blade 210 of the programmable key 200 upon insertion 170; see (ii), Fig. 1 B.
  • the flexible arm 122 Upon insertion 170, the flexible arm 122 is exerted to an elastic tension substantially perpendicular to the direction of insertion 170.
  • an indentation 230 of the key blade 210 receives the protruding portion 126 of the flexible retaining element 128, thereby releasing at least a portion of the elastic tension in the flexible retaining element 128; see figure (iii) in Fig. 1 B.
  • the rounded edge 124 and a surface 232 of the indentation 230 of the key blade 210 have substantially similar geometries.
  • an opposite arrangement is possible, i.e.
  • the programmable key 200 may comprise a flexible arm similar to as described above, and the cavity 120 of the activation device 100 may comprise an indentation such that a protruding portion of the flexible arm may be at least partly received by the indentation of the cavity when the programmable key 200 is in the inserted position 600 of the activation device 100.
  • the indentation of the cavity 120 serves as the programmable-key retaining element.
  • the flexible retaining element 128 may be manufactured by any elastic material, such as plastic, steel, or the like.
  • Other types of programmable-key retaining elements 128, such as a spring-loaded ball, magnetic means, or the like, are equally plausible within the presented scope.
  • the key blade 210 of the programmable key 200 may have an outer surface 220 complementary to an internal surface 130 of the cavity 120 of the activation device 100.
  • the programmable key 200 being in an inserted position 600 (see Fig. 2B) in the activation device 100 may correspond to the key blade 210 of the programmable key 200 being, at least partly, received by the cavity 120 of the activation device 100; see Fig. 2B.
  • the activation device 100 comprises a cipher-key input arrangement 140.
  • the cipher-key input arrangement 140 may be a keypad 140, as shown in Fig. 1A.
  • the keypad 140 may comprise a plurality of buttons 150.
  • the buttons 150 may be numbered with numbers in the range 0-9.
  • the keypad 140 may be a number pad 140.
  • the keypad may comprise additional symbols, such as the symbol 152, “#” 154, or the like.
  • the keypad 140 may comprise keys of alphabetical character, such as “A”, “B”, “C”, etc. Any kind of alphabetical or numeral characters is possible to use as buttons for the keypad 140.
  • the cipher-key input arrangement may be a touch-sensitive display on which, e.g. a plurality of buttons is displayed during use.
  • the activation device 100 comprises circuitry configured to receive a first signal from the programmable key 200 and, subsequently, return a second signal to the programmable key 200, to allow unlocking of a stored access right of the programmable key 200.
  • the circuitry is configured for registration of a received decipher key entered by a user on the cipher-key input arrangement 140 of the activation device 100.
  • the decipher key may be a code comprising a plurality of digits. The number of digits of the plurality of digits may be in the range of 4-12 digits. However, any number of digits of the plurality of digits is possible without departing from the scope of the disclosure.
  • the activation device 100 may comprise signal means 160 for providing information to the user whether or whether not the decipher key, entered by the user on the cipher-key arrangement 140 on the activation device 100, is correct.
  • the signal means 160 may be a light signal.
  • the light signal may be provided by a light-emitting diode 160. Should the received decipher key be such that it does not correspond to a stored access right of the programmable key, the light-emitting diode 160 may emit a red light. Should the received decipher key be such that it does correspond to a stored access right of the programmable key, the diode may emit a green light.
  • a single light-emitting diode 160 of the activation device 100 may be capable of emitting a plurality of colors, such as red, green and blue.
  • a plurality of light-emitting diodes 160 of the activation device 100 may be present, wherein respective light-emitting diode of the plurality of diodes may emit a single color.
  • one of the light-emitting diodes 160 of the activation device 100 may be capable of emitting red light
  • another lightemitting diode 160 of the activation device 100 may be capable of emitting green light
  • yet another light-emitting diode 160 of the activation device 100 may be capable of emitting blue light.
  • the light-emitting diode 160 may emit blue light to announce that the activation device 100 and the programmable key are connected and that a stored access right of the programmable key 200 is ready to be activated.
  • the activation device 100 is exclusively connectable to a programmable key 200 configured to be activated by the activation device 100.
  • any communication means for communicating with an external device is absent in the circuitry of the activation device 100.
  • the activation device 100 is thus incapable to communicate wiredly, wirelessly, or magnetically with an external device other than the programmable key.
  • the incapability of communicate wiredly includes absence of communicability with any external device by a wire, such as electrical-carrying wires, data- transmission cables such as Ethernet cables, or the like.
  • the incapability of communicating wirelessly with any external device includes absence of communicability with any external device by wireless means, such as Wi-Fi, Bluetooth, RFID, cloud-based services, magnetic means, or the like. Any such an external device (not shown) does herein thereby exclude the programmable key 200.
  • the activation device 100 may be configured to be powered by the programmable key 200 while the programmable key 200 is in an inserted position 600 in the programmable-key receiving 120 portion; see Fig. 2B. Hence, the activation device 100 remains unpowered while disconnected 500 from the programmable key 200; see Fig. 2A.
  • Any built-in power source such as a battery or the like, is thus absent in the activation device 100.
  • any built-in electrical generator such as generators for generating electrical power from movements (by, e.g. kinetic energy harvesting) of the activation device 100, is absent in the activation device 100.
  • the circuitry of the activation device 100 may be powered exclusively while a programmable key 200, configured to be activated by the activation device 100, is in the inserted position 600 of the activation device 100.
  • the signal means 160 described previously, may also be powered in such a situation.
  • the circuitry of the activation device 100 may be configured for allowing setting a stored access right of the programmable key 200 in an unlocked state 610 during a first period of time.
  • the stored access right of the programmable key may be set in an unlocked state during a first period of time.
  • an associated access right of the programmable key 200 is set in an unlocked state 610, wherein the duration of the unlocked state 610 may be restricted to a first period of time.
  • the first period of time may be any suitable period of time, depending of the field of use of the stored access right.
  • the first period of time may be in the range of 1-5 minutes.
  • the first period of time may be in the range of 6- 10 hours.
  • a stored access right may be unlocked by a plurality of decipher keys, each decipher key being associated with a specific period of time.
  • the decipher key is a four-digit number sequence, the code “1-2-3-4-5” may unlock a specific access right for 5 minutes, whereas the code “1-2-3-4-1-0” may unlock the same specific access right for 10 minutes.
  • any delay between a received decipher key and an unlocking of a stored access right is possible.
  • a specific access right may be unlocked five minutes after the activation device 100 has received a correct decipher key.
  • a single decipher key may unlock a plurality of stored access rights of the programmable key 200.
  • Each stored access right of such a plurality of stored access rights may be associated with an individual unlock time limit.
  • the activation device 100 may have a size such that it is geometrically enclosed by a volume having the dimensions 10x6x2 cm. More preferable dimensions of such a volume are 8x6x1.5 cm. In any event, the activation device 100 may have a size and weight being suitable for carrying in a normal-sized clothing pocket.
  • the programmable key-system 400 comprises an activation device 100 for activating a programmable key 200 and a programmable key 200 configured to be activated by the activation device 100.
  • the wording “activating” does herein refer to setting a stored access right of the programmable key 200 in an unlocked state 610.
  • the activation device 100 comprises a programmable-key receiving portion 110.
  • the activation device 100 comprises a cipher-key input arrangement 140.
  • the activation device 100 comprises circuitry configured to receive a first signal from the programmable key 200 and, subsequently, return a second signal to the programmable key 200, for unlocking 610 a stored access right of the programmable key 200.
  • the activation device 100 is exclusively connectable to a programmable key 200 configured to be activated by the activation device 100.
  • the programmable key 200 comprises a key blade 210 configured to be inserted into the programmable-key receiving portion 110, and into a lock core (not shown).
  • the programmable key 200 comprises circuitry 250; see Fig. 2C, further described below.
  • the circuitry 250 of the programmable key 200 may comprise a plurality of stored access rights.
  • the programmable key 200 is connectable to a synchronization station (not shown) for receiving the stored access right.
  • the stored access right may be transmitted from the synchronization station to the programmable key 200 using any adequate technique, such as any wireless technique and/or by connection with electrical or magnetic means.
  • the synchronization station may comprise a programmable-key receiving portion similar to the programmable-key receiving portion 110 of the activation device 100 described above.
  • the electrical power source of the programmable key 200 e.g., the battery (not shown), may be recharged while the programmable key 200 is in an inserted position of the programmable-key receiving portion of the synchronization station.
  • the programmable key 200 may comprise a replaceable non-rechargeable battery that may be replaced by the user when drained on electrical power.
  • a cipher key to be deciphered by a user on the cipher-key input arrangement 140 of the activation device 100 is further transmitted together with a transmitted access right during transmission between the synchronization station and the programmable key 200.
  • deciphering of the cipher key enables unlocking of its interconnected stored access right of the programmable key 200 to be set in the unlocked state 610.
  • the circuitry of a single activation device 100 may be configured for allowing unlocking a respective stored access right of a plurality of programmable keys 200.
  • an activation device 100 as disclosed herein is essentially identical to any other activation device 100 configured to activate a corresponding programmable key 200.
  • a stored access right of the programmable key 200 may be unlocked by using any one of a plurality of activation devices 100.
  • the structural features and the circuitry of an activation device 100 are essentially identical to any other similar activation device 100, as all relevant digital information, such as cipher keys and stored access rights are comprised in the circuitry 250 of the programmable key 200.
  • any type of electrical-power transfer between the programmable key 200 and the activation device 100 is possible.
  • the electrical power provided by the programmable key 200 to the activation device 100 may be transferred by ordinary electrical conduction over an electrically conducting interface surface, intersecting a portion of the outer surface 220 of the key blade 210 and a portion of the internal surface 130 of the cavity 120 of the programmable-key receiving portion 110 of the activation device 100.
  • the programmable key 200 may provide electrical power to the activation device 100 by electromagnetic induction means by, e.g. a solenoid.
  • Fig. 2A shows the programmable-key system 400 while the activation device 100 and the programmable key 200 are in a disconnected state 500. In such a disconnected state 500 the activation device 100 and the programmable key 200 cannot communicate by any communication means. In Fig. 2A it is further assumed that any stored access right of the programmable key 200 is yet in a locked state 510 to be, subsequently, set in an unlocked state 610.
  • Fig. 2B shows the programmable-key system 400 while the activation device 100 and the programmable key 200 are in a connected state 600.
  • a “connected state 600” refers occasionally to the programmable key 200 being in an inserted position 600 in the programmable-key receiving portion 110 of the activation device 100.
  • a locked stored access right of the programmable key 200 is set in an unlocked state 610 by a user typing the code “1 -4-5-8” followed by a confirmation of the code by pressing the button on the activation device 100.
  • the light-emitting diode 160 may then emit a green light to confirm that a correct code has been provided by the user.
  • the unlocking of a stored access right of the programmable key 200 may proceed as follows.
  • a first signal is sent by the programmable key 200 and received by the activation device 100.
  • the first signal may be a randomly generated string. Such a randomly generated string may be uniquely generated every time the programmable key 200 is inserted into the activation device 100.
  • a second signal, returned to the programmable key 200 comprises the first signal and a decipher input, e.g. a number code, provided by a user.
  • the second signal may be the same randomly generated string comprising the decipher input. Any adequate authentication protocol may be used for unlocking a stored access right of the programmable key 200 by the activation device.
  • the CHAP may comprise the following steps (i)-(iii).
  • the programmable key 200 After a completion of a connection between the activation device 100 and the programmable key 200, the programmable key 200 sends a “challenge” message to the activation device 100.
  • the activation device responds with a value calculated using a one-way hash function on the challenge and the decipher input (the code typed on the keypad by the user) combined,
  • the programmable key 200 checks the response against its own calculation of the expected hash value. If the values match, the programmable key 200 acknowledges the authentication; otherwise it should terminate the connection.
  • the first signal may alternatively be encrypted by any adequate encryption algorithm.
  • a circuitry 250 of the programmable key 200 is configured to carry out overall control of functions and operations of the programmable key 200.
  • the circuitry may include a processor, such as a central processing unit (CPU), microcontroller, or microprocessor.
  • the processor is configured to execute program code stored in the circuitry 250 to carry out functions and operations of the programmable key 200.
  • the memory may be one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, a random access memory (RAM), or other suitable devices.
  • the memory may include a non-volatile memory for long term data storage and a volatile memory that functions as system memory for the circuitry 250.
  • the memory may exchange data with the circuitry 250 over a data bus. Accompanying control lines and an address bus between the memory and the circuitry 250 may be present.
  • Functions and operations of the circuitry 250 may be embodied in the form of executable logic routines, e.g., computer-code portions, software programs, etc., that are stored on a non-transitory computer readable medium, e.g., the memory, of the programmable key 200 and are executed by the circuitry 250 by, e.g., using the processor.
  • the functions and operations of the programmable key 200 may be a stand-alone software application or form a part of a software application that carries out additional tasks related to the programmable key 200.
  • the described functions and operations may be considering a method 300 that the corresponding device is configured to carry out. Also, while the described functions and operations may be implemented in a software, such functionality may as well be carried out via dedicated hardware or firmware, or some combination of hardware, firmware and/or software.
  • the circuitry 250 of the programmable key 200 is configured for storing an access right, wherein the access right allows unlocking of a lock associated with a lock core once the stored access right has been set in the unlocked state (610).
  • the circuitry of the programmable key 200 is configured to execute a first transmitting function 251 configured to transmit a first signal from the programmable key to the activation device 100.
  • the circuitry of the programmable key 200 is configured to execute a second transmitting function 252 configured to transmit a second signal from the activation device 100 to the programmable key 200.
  • the circuitry 250 of the programmable key 200 is configured to execute an interconnection-determining function 253 configured to determine an interconnection between the second signal and a candidate list of stored access rights of the programmable key 200.
  • the circuitry 250 of the programmable key 200 is configured to execute an unlocking function 254 configured to set a stored access right of the programmable key 200 in the unlocked state 610.
  • FIG. 3 there is disclosed a flowchart of a method 300 for activating a programmable key 200.
  • the method 300 comprises transmitting 310 a first signal from the programmable key 200 to an activation device 100 while the programmable key 200 is inserted in a programmable-key receiving portion 120 of the activation device 100.
  • inserted refers to the “inserted position 600”.
  • the method 300 further comprises receiving 320 a decipher key from a cipher-key input arrangement 140 of the activation device 100 being exclusively connectable to the programmable key 200 configured to be activated by the activation device 100.
  • a receiving 320 refers to, e.g., detecting a code based on a code entry done by the user on the activation device 100.
  • the method 300 further comprises transmitting 330 a second signal from the activation device 100 to the programmable key 200.
  • the method 300 further comprises determining 340 an interconnection between the second signal and a candidate list of stored access rights of the programmable key 200.
  • the method 300 further comprises, provided the second signal be interconnected with a stored access right of the candidate list of stored access rights of the programmable key 200, setting 350 the stored access right in an unlocked state 610.
  • the method 300 may comprise maintaining the unlocked state 610 of the stored access right during a first period of time.
  • the method 300 may comprise preventing the activation device 100 to be powered except for while a key blade 210 of the programmable key 200 is in an inserted position 600 in the programmable-key receiving portion 120 of the activation device 100.

Abstract

An activation device for activating a programmable key is provided. The activation device comprises a programmable-key receiving portion, a cipher- key input arrangement, and circuitry configured to receive a first signal from the programmable key and, subsequently, return a second signal to the programmable key for unlocking a stored access right of the programmable key. The activation device is exclusively connectable to a programmable key configured to be activated by the activation device.

Description

DEVICE AND METHOD FOR ACTIVATING A PROGRAMMABLE KEY
FIELD OF TECHNOLOGY
The present disclosure belongs to devices and methods for activating a programmable key.
BACKGROUND
To provide additional security for a programmable key configured to unlock an electromechanical lock, an activation device for activating a stored access right of the programmable key may be an option. An activation device serves to allow unlocking an access right of the programmable key in that the programmable key can unlock an electromechanical lock of a room, a building, a cabinet, a medicine cabinet, a padlock, or the like. Known solutions of activation devices often include power draining circuitry for wireless communicability, and the like. Such features may turn the activation device inconvenient to carry in a pocket to enable a short-term access to a specific room or cabinet. Hence, there is a need for a simple and compact activation device without compromising on the additional security that such a device offers.
SUMMARY
Thus, it is an object of the invention to provide a simple and portable activation device without compromising on security for activating a programmable key.
According to a first aspect of the invention, there is provided an activation device for activating a programmable key, said activation device comprising:
- a programmable-key receiving portion,
- a cipher-key input arrangement, and - circuitry configured to receive a first signal from the programmable key and, subsequently, return a second signal to the programmable key for unlocking a stored access right of the programmable key, wherein the activation device is exclusively connectable to the programmable key.
The wording “activating a programmable key” is to be understood as unlocking and/or allowing unlocking of a stored access right of the programmable key. At a request of the programmable key, the first signal is received by the activation device. The second signal comprises the first signal and a decipher input, e.g. a number code, provided by a user, to be returned to the programmable key. The first signal may be a randomly generated string. The second signal may be the same randomly generated string comprising the decipher input. Upon deciphering a cipher associated with a stored access right of the programmable key, the programmable key unlocks the associated stored access right of the programmable key to be set in an unlocked state.
The activation device may remain unpowered while disconnected from the programmable key. That is, any built-in power source, such as a battery or the like, may be absent in the activation device. Thus, the activation device may be exclusively and temporarily powered by a programmable key while such a programmable key is connected to the activation device. Further, any communication means for communicating with an external device is absent in the activation device. Thus, the activation device is incapable to communicate wiredly or wirelessly with an external device other than the programmable key, thereby excluding a need for built-in circuitry for such purposes. This applies also in the case when the programmable key is connected to the activation device. This allows the activation device being small, lightweight and handy to be carried in a pocket while not in a use position, i.e. , while not connected to the programmable key for activation of the programmable key. Another advantage is facilitating security as of the non-connectability to, e.g., Wi-Fi, Bluetooth, RFID transponders, cloud-based services, or the like, turning the activation device impossible to remotely hack by a third participant having a possibly malicious intent.
The programmable-key receiving portion may comprise a cavity for receiving a key blade of the programmable key.
Thus, the key blade of the programmable key has a suitable geometry for being inserted into the receiving portion of the activation device. This may add additional security against a third participant having a possibly malicious intent.
The cavity may comprise a programmable-key retaining element. Hence, the user may not need to manually hold the programmable key in the inserted position during unlocking of a stored access right, facilitating reliability and user convenience. The programmable-key retaining element may be a flexible programmable-key retaining element. Such a flexible programmable-key retaining element may comprise a flexible arm, wherein the flexible arm may comprise a protruding portion to be at least partly received by an indentation of the key blade of the programmable key when the programmable key is in the inserted position in the activation device. Conversely, an opposite arrangement is possible, i.e. , the programmable key may comprise a flexible arm similar to as described above, and the cavity of the activation device may comprise an indentation such that a protruding portion of the flexible arm may be at least partly received by the indentation of the cavity when the programmable key is in the inserted position of the activation device. In such a situation, the indentation of the cavity serves as the programmable-key retaining element. The programmable-key retaining element may allow the activation device to firmly retain the programmable key to retain in the programmable-key receiving portion while the programmable key is in an inserted position in the programmable-key receiving portion. Another advantage is that such a programmable-key retaining element is a cheap, simple and durable way of obtaining the technical effect described above. The activation device may be configured to be powered by the programmable key while the programmable key and the activation device are in a connected state.
The connected state preferably refers to when the programmable key is in an inserted position in the programmable-key receiving portion of the activation device. A stored access right of the programmable key may thus be unlocked exclusively while a programmable key is in the inserted position in the programmable-key receiving portion of the activation device. This adds extra security as per the above, as well as allowing the physical dimensions of the activation device being held relatively small, thereby enabling carrying the activation device in a pocket while not being in use.
The cipher-key input arrangement may be a keypad. An associated cipher may be a digit code.
A keypad serving as a cipher-key input arrangement reduces complexity of the circuitry of the activation device, thereby minimizing errors when deciphering the associated cipher, yet retaining an adequate security. Further, a keypad serving as a cipher-key input arrangement requires a minimal amount of electrical power compared to other authentication means, thereby saving electrical power provided by the programmable key.
The activation device may be configured to be geometrically enclosed by a volume having the dimensions 10x6x2 cm.
Such compact dimensions are achievable as of the features described above and below. Hence, the activation device may be suitable for carrying in a clothing pocket of a user.
According to a second aspect, there is provided a programmable-key system, comprising:
- an activation device for activating a programmable key, and
- a programmable key configured to be activated by the activation device, wherein the activation device comprises:
- a programmable-key receiving portion,
- a cipher-key input arrangement, and - circuitry configured to receive a first signal from the programmable key and, subsequently, return a second signal to the programmable key for unlocking a stored access right of the programmable key, and wherein the programmable key comprises:
- a key blade configured to be inserted into the programmable-key receiving portion and into a lock core, and
- circuitry configured for storing an access right, wherein the access right allows unlocking of a lock associated with the lock core, and wherein the activation device is exclusively connectable to the programmable key.
The lock core to be unlocked by the programmable key may be a lock core of a lock for locking a room, a building, a cabinet, a medicine cabinet, a padlock, a boom, or the like.
The above-mentioned features and advantages of the activation device, when applicable, apply to this second aspect as well. In order to avoid undue repetition, reference is made to the above.
The stored access right of the programmable key may be set in an unlocked state during a first period of time.
This may further enhance security should the programmable key be lost by the user. After such a first period of time has elapsed the stored access right of the programmable key may be set in a locked state, thereby inactivating the programmable key. The stored access right may again be set in an unlocked state by the activation device by the procedure described above.
The circuitry of a single activation device may be configured for allowing unlocking a stored access right of a plurality of programmable keys.
Thus, a specific activation device as disclosed herein is essentially identical to any other activation device (as disclosed herein) configured to activate a corresponding programmable key. This may facilitate flexibility, as two users, each having a programmable key, may use the same activation device for unlocking a stored access right of their respective programmable key. Conversely, a single user may unlock a stored access right of the programmable key using any one of a plurality of activation devices. It is to be noted that such a feature does not jeopardize security in view of a third participant having possibly malicious intent, as a decipher key, e.g., a number code, is always required for unlocking a stored access right of the programmable key. Hence, an isolated activation device may lack any meaningful function without a corresponding programmable key, and, conversely, an isolated programmable key may lack any meaningful function without a corresponding activation device.
The activation device may be configured to be powered by the programmable key while the programmable key is in an inserted position in the programmable-key receiving portion.
The programmable key comprises a power source, preferably a rechargeable battery, for supplying an electrical current to the activation device while being in the inserted position in the programmable-key receiving portion of the activation device. Hence, as long as the battery of the programmable key is adequately charged, there is essentially no risk of incapability of the activation device for allowing unlocking of a stored access right of the programmable key due to drainage of electrical power. By allowing provision of electrical power to the programmable-key system using a single device, i.e. , the programmable key, may thereby enhance security, reliability, and flexibility of the programmable-key system.
The cipher-key input arrangement may be configured to allow, while the programmable key is in the inserted position in the activation device, setting an interconnected stored access right of the programmable key in an unlocked state.
As partly described above, the programmable key comprises a preinstalled stored access right that can be unlocked by a corresponding activation device. While the key blade of the programmable key is inserted in the programmable-key receiving portion of the activation device a first signal is sent to the activation device. After deciphering, e.g., after a user has entered a code on the keypad of the activation device, the programmable key receives a second signal comprising the decipher key. After verification of the second signal by the programmable key the interconnected stored access right of the programmable key is set in an unlocked state. Any type of signal of the first and the second signal is possible. The first/second signal may be a randomly generated string. The first/second signal may be encrypted. A possible encryption of the first/second signal may exploit, e.g., an exclusive-or operator to the first signal. Again, by excluding any stored access-right information on the activation device enhances security and allows the activation device being relatively small and portable. By allowing the cipherkey input arrangement being comprised in the activation device instead of in the programmable key may further facilitate user convenience, as the spatial dimensions of the programmable key may then be held relatively small.
The activation device may be non-powered except for while the programmable key is in an inserted position in the programmable-key receiving portion of the activation device.
The advantages of this feature are as described above.
According to a third aspect, there is provided a method for activating a programmable key, said method comprising:
- transmitting a first signal from the programmable key to an activation device while the programmable key is inserted in a programmable-key receiving portion of the activation device,
- receiving a decipher key from a cipher-key input arrangement of the activation device being exclusively connectable to a programmable key configured to be activated by the activation device,
- transmitting a second signal from the activation device to the programmable key,
- determining an interconnection between the second signal and a candidate list of stored access rights of the programmable key, and
- provided the second signal being interconnected with a stored access right of the candidate list of stored access rights of the programmable key, setting the stored access right in an unlocked state. The above-mentioned features and advantages of the activation device and the programmable-key system, when applicable, apply to this third aspect as well. In order to avoid undue repetition, reference is made to the above.
The setting of the stored access right in the unlocked state may comprise maintaining the unlocked state of the stored access right during a first period of time.
The method may comprise preventing the activation device to be powered except for while a key blade of the programmable key is in an inserted position in the programmable-key receiving portion of the activation device.
As of the above-mentioned features, the dimensions of the activation device may be held relatively small, allowing the activation device to be carried in a pocket.
The cipher-key input arrangement may comprise a cipher to be deciphered allowing setting an associated stored access right of the programmable key in an unlocked state.
The activation device, the programmable-key system and/or the method for activating a programmable key may comprise a plurality of decipher keys for unlocking a specific stored access right of the programmable key.
Thus, each one of two or more users may be requested to provide a respective secret decipher key while the programmable key is in the inserted position of the activation device. In such a situation, each one of the two or more users may not be allowed to unlock the specific stored access right. Such a feature may be advantageous for accessing high-security domains, thus facilitating security of the programmable-key system.
A stored access right of the programmable may comprise a userspecific hierarchical structure.
By means of a simplified example, a person, Alice, may unlock an access right of the programmable key for accessing a building and Alice’s office inside the building. An electrician may have a similar programmable key. The electrician may unlock an access right of the programmable key for accessing the same building, as well as an electrical cabinet inside the building. Here, Alice does not have access to the electrical cabinet, and the electrician does not have access to Alice’s office. Hence, both Alice and the electrician may have access to enter the building, whereas they have differing exclusive access rights to spaces inside the building. An access right of the programmable key may thus comprise a hierarchical structure.
A further scope of applicability of the present invention will become apparent from the detailed description given below. However, it should be understood that the detailed description and specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only, since various changes and modifications within the scope of the invention will become apparent to those skilled in the art from this detailed description.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [element, device, component, means, step, etc.]" are to be interpreted openly as referring to at least one instance of said element, device, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
BRIEF DESCRIPTION OF THE DRAWINGS
The above, as well as additional objects, features and advantages of the present invention, will be better understood through the following illustrative and non-limiting detailed description of preferred embodiments, with reference to the appended drawings, where the same reference numerals will be used for similar elements, wherein:
Fig. 1 A shows an activation device for activating a programmable key.
Fig. 1 B schematically shows a programmable-key retaining element.
Fig. 2A shows a programmable-key system, where an activation device and a programmable key are in a disconnected state.
Fig. 2B shows a programmable-key system, where an activation device and a programmable key are in a connected state.
Fig. 2C shows executable functions of a circuitry of a programmable key.
Fig. 3 shows a flowchart of a method for activating a programmable key.
DETAILED DESCRIPTION
The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which currently preferred embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided for thoroughness and completeness, and to fully convey the scope of the invention to the skilled person.
Fig. 1 A discloses an activation device 100 for activating a programmable key 200. The activation device 100 comprises a programmable-key receiving portion 110. The programmable-key receiving portion 110 may comprise a cavity 120 for receiving a key blade 210 of the programmable key 200.
Referring temporarily to Fig. 1 B, the cavity 120 may comprise a programmable-key retaining element 128. The programmable-key retaining element 128 may be a flexible retaining element 128. The flexible retaining element 128 may comprise an elongated flexible arm 122 to be elastically deformed upon insertion 170 of the programmable key 200 into the cavity 120. The elongated flexible arm 122 may comprise a protruding portion 126 having a rounded edge 124 for sliding against an outer surface 220 of a key blade 210 of the programmable key 200 upon insertion 170; see (ii), Fig. 1 B. Upon insertion 170, the flexible arm 122 is exerted to an elastic tension substantially perpendicular to the direction of insertion 170. Once the key blade 210 of the programmable key 200 has been sufficiently inserted into the cavity 120, an indentation 230 of the key blade 210 receives the protruding portion 126 of the flexible retaining element 128, thereby releasing at least a portion of the elastic tension in the flexible retaining element 128; see figure (iii) in Fig. 1 B. Hence the rounded edge 124 and a surface 232 of the indentation 230 of the key blade 210 have substantially similar geometries. Conversely, an opposite arrangement is possible, i.e. , the programmable key 200 may comprise a flexible arm similar to as described above, and the cavity 120 of the activation device 100 may comprise an indentation such that a protruding portion of the flexible arm may be at least partly received by the indentation of the cavity when the programmable key 200 is in the inserted position 600 of the activation device 100. In such a situation, the indentation of the cavity 120 serves as the programmable-key retaining element. The flexible retaining element 128 may be manufactured by any elastic material, such as plastic, steel, or the like. Other types of programmable-key retaining elements 128, such as a spring-loaded ball, magnetic means, or the like, are equally plausible within the presented scope.
Returning to Fig. 1A, the key blade 210 of the programmable key 200 may have an outer surface 220 complementary to an internal surface 130 of the cavity 120 of the activation device 100. The programmable key 200 being in an inserted position 600 (see Fig. 2B) in the activation device 100 may correspond to the key blade 210 of the programmable key 200 being, at least partly, received by the cavity 120 of the activation device 100; see Fig. 2B. The activation device 100 comprises a cipher-key input arrangement 140. The cipher-key input arrangement 140 may be a keypad 140, as shown in Fig. 1A. The keypad 140 may comprise a plurality of buttons 150. The buttons 150 may be numbered with numbers in the range 0-9. Thus, the keypad 140 may be a number pad 140. The keypad may comprise additional symbols, such as the symbol 152, “#” 154, or the like. The keypad 140 may comprise keys of alphabetical character, such as “A”, “B”, “C”, etc. Any kind of alphabetical or numeral characters is possible to use as buttons for the keypad 140. Alternatively, the cipher-key input arrangement may be a touch-sensitive display on which, e.g. a plurality of buttons is displayed during use.
The activation device 100 comprises circuitry configured to receive a first signal from the programmable key 200 and, subsequently, return a second signal to the programmable key 200, to allow unlocking of a stored access right of the programmable key 200. The circuitry is configured for registration of a received decipher key entered by a user on the cipher-key input arrangement 140 of the activation device 100. The decipher key may be a code comprising a plurality of digits. The number of digits of the plurality of digits may be in the range of 4-12 digits. However, any number of digits of the plurality of digits is possible without departing from the scope of the disclosure.
The activation device 100 may comprise signal means 160 for providing information to the user whether or whether not the decipher key, entered by the user on the cipher-key arrangement 140 on the activation device 100, is correct. The signal means 160 may be a light signal. The light signal may be provided by a light-emitting diode 160. Should the received decipher key be such that it does not correspond to a stored access right of the programmable key, the light-emitting diode 160 may emit a red light. Should the received decipher key be such that it does correspond to a stored access right of the programmable key, the diode may emit a green light. A single light-emitting diode 160 of the activation device 100 may be capable of emitting a plurality of colors, such as red, green and blue. Alternatively, a plurality of light-emitting diodes 160 of the activation device 100 may be present, wherein respective light-emitting diode of the plurality of diodes may emit a single color. For instance, one of the light-emitting diodes 160 of the activation device 100 may be capable of emitting red light, another lightemitting diode 160 of the activation device 100 may be capable of emitting green light, and yet another light-emitting diode 160 of the activation device 100 may be capable of emitting blue light. Once the programmable key 200 has been inserted in the inserted position 600, the light-emitting diode 160 may emit blue light to announce that the activation device 100 and the programmable key are connected and that a stored access right of the programmable key 200 is ready to be activated.
The activation device 100 is exclusively connectable to a programmable key 200 configured to be activated by the activation device 100. Thus, any communication means for communicating with an external device (not shown) is absent in the circuitry of the activation device 100. The activation device 100 is thus incapable to communicate wiredly, wirelessly, or magnetically with an external device other than the programmable key. The incapability of communicate wiredly includes absence of communicability with any external device by a wire, such as electrical-carrying wires, data- transmission cables such as Ethernet cables, or the like. The incapability of communicating wirelessly with any external device includes absence of communicability with any external device by wireless means, such as Wi-Fi, Bluetooth, RFID, cloud-based services, magnetic means, or the like. Any such an external device (not shown) does herein thereby exclude the programmable key 200.
The activation device 100 may be configured to be powered by the programmable key 200 while the programmable key 200 is in an inserted position 600 in the programmable-key receiving 120 portion; see Fig. 2B. Hence, the activation device 100 remains unpowered while disconnected 500 from the programmable key 200; see Fig. 2A. Any built-in power source, such as a battery or the like, is thus absent in the activation device 100. Further, any built-in electrical generator, such as generators for generating electrical power from movements (by, e.g. kinetic energy harvesting) of the activation device 100, is absent in the activation device 100. The circuitry of the activation device 100 may be powered exclusively while a programmable key 200, configured to be activated by the activation device 100, is in the inserted position 600 of the activation device 100. The signal means 160, described previously, may also be powered in such a situation.
The circuitry of the activation device 100 may be configured for allowing setting a stored access right of the programmable key 200 in an unlocked state 610 during a first period of time. Hence, the stored access right of the programmable key may be set in an unlocked state during a first period of time. Once a correct decipher key has been received by the activation device 100, an associated access right of the programmable key 200 is set in an unlocked state 610, wherein the duration of the unlocked state 610 may be restricted to a first period of time. The first period of time may be any suitable period of time, depending of the field of use of the stored access right. For instance, if a one-time access to open a single door of a building is requested, the first period of time may be in the range of 1-5 minutes. Conversely, if access to open a plurality of doors inside a building is requested during a work shift, the first period of time may be in the range of 6- 10 hours. A stored access right may be unlocked by a plurality of decipher keys, each decipher key being associated with a specific period of time. By way of example, provided the decipher key is a four-digit number sequence, the code “1-2-3-4-5” may unlock a specific access right for 5 minutes, whereas the code “1-2-3-4-1-0” may unlock the same specific access right for 10 minutes. Any delay between a received decipher key and an unlocking of a stored access right is possible. For instance, a specific access right may be unlocked five minutes after the activation device 100 has received a correct decipher key. A single decipher key may unlock a plurality of stored access rights of the programmable key 200. Each stored access right of such a plurality of stored access rights may be associated with an individual unlock time limit. The activation device 100 may have a size such that it is geometrically enclosed by a volume having the dimensions 10x6x2 cm. More preferable dimensions of such a volume are 8x6x1.5 cm. In any event, the activation device 100 may have a size and weight being suitable for carrying in a normal-sized clothing pocket.
In connection with Figs 2A and 2B there is shown a programmable-key system 400. The programmable key-system 400 comprises an activation device 100 for activating a programmable key 200 and a programmable key 200 configured to be activated by the activation device 100. The wording “activating” does herein refer to setting a stored access right of the programmable key 200 in an unlocked state 610. The activation device 100 comprises a programmable-key receiving portion 110. The activation device 100 comprises a cipher-key input arrangement 140. The activation device 100 comprises circuitry configured to receive a first signal from the programmable key 200 and, subsequently, return a second signal to the programmable key 200, for unlocking 610 a stored access right of the programmable key 200. The activation device 100 is exclusively connectable to a programmable key 200 configured to be activated by the activation device 100. The programmable key 200 comprises a key blade 210 configured to be inserted into the programmable-key receiving portion 110, and into a lock core (not shown). The programmable key 200 comprises circuitry 250; see Fig. 2C, further described below.
The circuitry 250 of the programmable key 200 may comprise a plurality of stored access rights. The programmable key 200 is connectable to a synchronization station (not shown) for receiving the stored access right. The stored access right may be transmitted from the synchronization station to the programmable key 200 using any adequate technique, such as any wireless technique and/or by connection with electrical or magnetic means. The synchronization station may comprise a programmable-key receiving portion similar to the programmable-key receiving portion 110 of the activation device 100 described above. The electrical power source of the programmable key 200, e.g., the battery (not shown), may be recharged while the programmable key 200 is in an inserted position of the programmable-key receiving portion of the synchronization station. Alternatively, the programmable key 200 may comprise a replaceable non-rechargeable battery that may be replaced by the user when drained on electrical power.
A cipher key to be deciphered by a user on the cipher-key input arrangement 140 of the activation device 100 is further transmitted together with a transmitted access right during transmission between the synchronization station and the programmable key 200. Again, while the programmable key 200 is in the inserted position 600 in the activation device 100, deciphering of the cipher key enables unlocking of its interconnected stored access right of the programmable key 200 to be set in the unlocked state 610.
The circuitry of a single activation device 100 may be configured for allowing unlocking a respective stored access right of a plurality of programmable keys 200. Thus, an activation device 100 as disclosed herein is essentially identical to any other activation device 100 configured to activate a corresponding programmable key 200. Conversely, a stored access right of the programmable key 200 may be unlocked by using any one of a plurality of activation devices 100. Hence, the structural features and the circuitry of an activation device 100 are essentially identical to any other similar activation device 100, as all relevant digital information, such as cipher keys and stored access rights are comprised in the circuitry 250 of the programmable key 200.
Any type of electrical-power transfer between the programmable key 200 and the activation device 100 is possible. By way of example, the electrical power provided by the programmable key 200 to the activation device 100 may be transferred by ordinary electrical conduction over an electrically conducting interface surface, intersecting a portion of the outer surface 220 of the key blade 210 and a portion of the internal surface 130 of the cavity 120 of the programmable-key receiving portion 110 of the activation device 100. Alternatively, the programmable key 200 may provide electrical power to the activation device 100 by electromagnetic induction means by, e.g. a solenoid.
Fig. 2A shows the programmable-key system 400 while the activation device 100 and the programmable key 200 are in a disconnected state 500. In such a disconnected state 500 the activation device 100 and the programmable key 200 cannot communicate by any communication means. In Fig. 2A it is further assumed that any stored access right of the programmable key 200 is yet in a locked state 510 to be, subsequently, set in an unlocked state 610.
Fig. 2B shows the programmable-key system 400 while the activation device 100 and the programmable key 200 are in a connected state 600. Such a “connected state 600” refers occasionally to the programmable key 200 being in an inserted position 600 in the programmable-key receiving portion 110 of the activation device 100. Here, a locked stored access right of the programmable key 200 is set in an unlocked state 610 by a user typing the code “1 -4-5-8” followed by a confirmation of the code by pressing the button on the activation device 100. The light-emitting diode 160 may then emit a green light to confirm that a correct code has been provided by the user.
The unlocking of a stored access right of the programmable key 200 may proceed as follows. At a request of the programmable key 200, a first signal is sent by the programmable key 200 and received by the activation device 100. The first signal may be a randomly generated string. Such a randomly generated string may be uniquely generated every time the programmable key 200 is inserted into the activation device 100. A second signal, returned to the programmable key 200, comprises the first signal and a decipher input, e.g. a number code, provided by a user. The second signal may be the same randomly generated string comprising the decipher input. Any adequate authentication protocol may be used for unlocking a stored access right of the programmable key 200 by the activation device. By way of example a Challenge-Handshake Authentication Protocol (CHAP) may be used. Applied to the present specification, the CHAP may comprise the following steps (i)-(iii). (i) After a completion of a connection between the activation device 100 and the programmable key 200, the programmable key 200 sends a “challenge” message to the activation device 100. (ii) The activation device responds with a value calculated using a one-way hash function on the challenge and the decipher input (the code typed on the keypad by the user) combined, (iii) The programmable key 200 checks the response against its own calculation of the expected hash value. If the values match, the programmable key 200 acknowledges the authentication; otherwise it should terminate the connection. The first signal may alternatively be encrypted by any adequate encryption algorithm.
Turning to Fig. 2C, there is shown, highly schematically, a circuitry 250 of the programmable key 200. The circuitry 250 of the programmable key 200 is configured to carry out overall control of functions and operations of the programmable key 200. The circuitry may include a processor, such as a central processing unit (CPU), microcontroller, or microprocessor. The processor is configured to execute program code stored in the circuitry 250 to carry out functions and operations of the programmable key 200.
Executable functions, further described below, may be stored on a memory. The memory may be one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, a random access memory (RAM), or other suitable devices. In a typical arrangement, the memory may include a non-volatile memory for long term data storage and a volatile memory that functions as system memory for the circuitry 250. The memory may exchange data with the circuitry 250 over a data bus. Accompanying control lines and an address bus between the memory and the circuitry 250 may be present.
Functions and operations of the circuitry 250 may be embodied in the form of executable logic routines, e.g., computer-code portions, software programs, etc., that are stored on a non-transitory computer readable medium, e.g., the memory, of the programmable key 200 and are executed by the circuitry 250 by, e.g., using the processor. The functions and operations of the programmable key 200 may be a stand-alone software application or form a part of a software application that carries out additional tasks related to the programmable key 200. The described functions and operations may be considering a method 300 that the corresponding device is configured to carry out. Also, while the described functions and operations may be implemented in a software, such functionality may as well be carried out via dedicated hardware or firmware, or some combination of hardware, firmware and/or software.
The circuitry 250 of the programmable key 200 is configured for storing an access right, wherein the access right allows unlocking of a lock associated with a lock core once the stored access right has been set in the unlocked state (610).
The circuitry of the programmable key 200 is configured to execute a first transmitting function 251 configured to transmit a first signal from the programmable key to the activation device 100.
The circuitry of the programmable key 200 is configured to execute a second transmitting function 252 configured to transmit a second signal from the activation device 100 to the programmable key 200.
The circuitry 250 of the programmable key 200 is configured to execute an interconnection-determining function 253 configured to determine an interconnection between the second signal and a candidate list of stored access rights of the programmable key 200.
The circuitry 250 of the programmable key 200 is configured to execute an unlocking function 254 configured to set a stored access right of the programmable key 200 in the unlocked state 610.
Remaining features of the activation device 100 as described in connection with Fig. 1 , when applicable, apply to the programmable-key system 400 as well. In order to avoid undue repetition, reference is made to the above.
In connection with Fig. 3, there is disclosed a flowchart of a method 300 for activating a programmable key 200.
The method 300 comprises transmitting 310 a first signal from the programmable key 200 to an activation device 100 while the programmable key 200 is inserted in a programmable-key receiving portion 120 of the activation device 100. As per the above, “inserted” refers to the “inserted position 600”.
The method 300 further comprises receiving 320 a decipher key from a cipher-key input arrangement 140 of the activation device 100 being exclusively connectable to the programmable key 200 configured to be activated by the activation device 100. Such a receiving 320 refers to, e.g., detecting a code based on a code entry done by the user on the activation device 100.
The method 300 further comprises transmitting 330 a second signal from the activation device 100 to the programmable key 200.
The method 300 further comprises determining 340 an interconnection between the second signal and a candidate list of stored access rights of the programmable key 200.
The method 300 further comprises, provided the second signal be interconnected with a stored access right of the candidate list of stored access rights of the programmable key 200, setting 350 the stored access right in an unlocked state 610.
The method 300 may comprise maintaining the unlocked state 610 of the stored access right during a first period of time.
The method 300 may comprise preventing the activation device 100 to be powered except for while a key blade 210 of the programmable key 200 is in an inserted position 600 in the programmable-key receiving portion 120 of the activation device 100.
The features of the activation device 100 and the programmable-key system 400, when applicable, apply to the method 300 as well. In order to avoid undue repetition, reference is made to the above.
The person skilled in the art realizes that the present invention by no means is limited to the preferred embodiments described above. On the contrary, many modifications and variations are possible within the scope of the appended claims. Additionally, variations to the disclosed embodiments can be understood and effected by the skilled person in practicing the claimed invention, from a study of the drawings, the disclosure, and the appended claims.

Claims

22 CLAIMS
1 . An activation device (100) for activating a programmable key (200), said activation device (100) comprising:
- a programmable-key receiving portion (110),
- a cipher-key input arrangement (140), and
- circuitry configured to receive a first signal from the programmable key (200) and, subsequently, return a second signal to the programmable key (200) for unlocking a stored access right of the programmable key (200), wherein the activation device (100) is exclusively connectable to the programmable key (200).
2. The activation device (100) according to claim 1 , wherein the programmable-key receiving portion (110) comprises a cavity (120) for receiving a key blade (210) of the programmable key (200).
3. The activation device (100) according to claim 2, wherein the cavity (120) comprises a programmable-key retaining element (128).
4. The activation device (100) according to any one of claims 1-3, wherein the activation device (100) is configured to be powered by the programmable key (200) while the programmable key (200) and the activation device (100) are in a connected state (600).
5. The activation device (100) according to any one of claims 1-4, wherein the cipher-key input arrangement (140) is a keypad (140), and wherein an associated cipher is a digit code.
6. The activation device according to any one of claims 1-5, configured to be geometrically enclosed by a volume having the dimensions 10x6x2 cm.
7. A programmable-key system (400), comprising: - an activation device (100) for activating a programmable key (200), and
- a programmable key (200) configured to be activated by the activation device (100), wherein the activation device (100) comprises:
- a programmable-key receiving portion (110),
- a cipher-key input arrangement (140), and
- circuitry configured to receive a first signal from the programmable key (200) and, subsequently, return a second signal to the programmable key (200) for unlocking a stored access right of the programmable key (200), and wherein the programmable key (200) comprises:
- a key blade (210) configured to be inserted into the programmable-key receiving portion (110) and into a lock core, and
- circuitry (350) configured for storing an access right, wherein the access right allows unlocking of a lock associated with the lock core, and wherein the activation device (100) is exclusively connectable the programmable key (200).
8. The programmable-key system (400) according to claim 7, wherein the stored access right of the programmable key (200) is set in an unlocked state (610) during a first period of time.
9. The programmable-key system (400) according to claim 7 or 8, wherein the circuitry of a single activation device (100) is configured for allowing unlocking a stored access right of a plurality of programmable keys (200).
10. The programmable-key system (400) according to any one of claims 7-9, wherein the activation device (100) is configured to be powered by the programmable key (200) while the programmable key (200) is in an inserted position (600) in the programmable-key receiving portion (110).
11 . The programmable-key system (400) according to any one of claims 7-10, wherein the cipher-key input arrangement (140) is configured to allow, while the programmable key (200) is in the inserted position (600) in the activation device (100), setting an interconnected stored access right of the programmable key (200) in an unlocked state (610).
12. The programmable-key system (400) according to any one of claims 7-11 , wherein the activation device (100) is non-powered except for while the programmable key (200) is in an inserted position (600) in the programmable- key receiving portion (110) of the activation device (100).
13. A method (300) for activating a programmable key (200), said method (300) comprising:
- transmitting (310) a first signal from the programmable key (200) to an activation device (100) while the programmable key (200) is inserted (600) in a programmable-key receiving portion (110) of the activation device (100),
- receiving (320) a decipher key from a cipher-key input arrangement (140) of the activation device (100) being exclusively connectable to the programmable key (200) configured to be activated by the activation device (100),
- transmitting (330) a second signal from the activation device (100) to the programmable key (200),
- determining (340) an interconnection between the second signal and a candidate list of stored access rights of the programmable key (200), and
- provided the second signal be interconnected with a stored access right of the candidate list of stored access rights of the programmable key (200), setting (350) the stored access right in an unlocked state (610). 25
14. The method (300) according to claim 13, wherein the setting (350) of the stored access right in the unlocked state (610) comprises:
- maintaining the unlocked state (610) of the stored access right during a first period of time.
15. The method according to claim 13 or 14, further comprising
- preventing the activation device (100) to be powered except for while a key blade (210) of the programmable key (200) is in an inserted position (610) in the programmable-key receiving portion (120) of the activation device (100).
PCT/SE2021/051111 2020-11-09 2021-11-08 Device and method for activating a programmable key WO2022098291A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP21889721.3A EP4241255A1 (en) 2020-11-09 2021-11-08 Device and method for activating a programmable key

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE2051306A SE2051306A1 (en) 2020-11-09 2020-11-09 Device and method for activating a programmable key
SE2051306-5 2020-11-09

Publications (1)

Publication Number Publication Date
WO2022098291A1 true WO2022098291A1 (en) 2022-05-12

Family

ID=81458136

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2021/051111 WO2022098291A1 (en) 2020-11-09 2021-11-08 Device and method for activating a programmable key

Country Status (3)

Country Link
EP (1) EP4241255A1 (en)
SE (1) SE2051306A1 (en)
WO (1) WO2022098291A1 (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020014950A1 (en) * 1998-08-12 2002-02-07 Ayala Raymond F. Method for programming a key for selectively allowing access to an enclosure
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US20050051621A1 (en) * 2003-07-17 2005-03-10 Albert Wong Electronic key access control system and method
US20150281228A1 (en) * 2014-01-30 2015-10-01 Schlage Lock Company Llc Hybrid data managed lock system
US20150332533A1 (en) * 2014-05-19 2015-11-19 Acsys IP Holidng Inc. Mobile key devices systems and methods for programming and communicating with an electronic programmable key
US20160232729A1 (en) * 2013-10-16 2016-08-11 Lock Your World Gmbh & Co. Kg Method for operating a locking system, locking system, and tube safe
US20180350172A1 (en) * 2013-07-05 2018-12-06 Assa Abloy Ab Portable access control communication device, method, computer program and computer program product
EP3582192A1 (en) * 2018-06-14 2019-12-18 dormakaba Schweiz AG Method for controlling an access regime to an object, closing unit and closing system
US20200058180A1 (en) * 2017-02-24 2020-02-20 Assa Abloy Ab Delegation and auxiliary condition for physical access

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020014950A1 (en) * 1998-08-12 2002-02-07 Ayala Raymond F. Method for programming a key for selectively allowing access to an enclosure
US20020180582A1 (en) * 1999-11-30 2002-12-05 Nielsen Ernst Lykke Electronic key device a system and a method of managing electronic key information
US20050051621A1 (en) * 2003-07-17 2005-03-10 Albert Wong Electronic key access control system and method
US20180350172A1 (en) * 2013-07-05 2018-12-06 Assa Abloy Ab Portable access control communication device, method, computer program and computer program product
US20160232729A1 (en) * 2013-10-16 2016-08-11 Lock Your World Gmbh & Co. Kg Method for operating a locking system, locking system, and tube safe
US20150281228A1 (en) * 2014-01-30 2015-10-01 Schlage Lock Company Llc Hybrid data managed lock system
US20150332533A1 (en) * 2014-05-19 2015-11-19 Acsys IP Holidng Inc. Mobile key devices systems and methods for programming and communicating with an electronic programmable key
US20200058180A1 (en) * 2017-02-24 2020-02-20 Assa Abloy Ab Delegation and auxiliary condition for physical access
EP3582192A1 (en) * 2018-06-14 2019-12-18 dormakaba Schweiz AG Method for controlling an access regime to an object, closing unit and closing system

Also Published As

Publication number Publication date
SE2051306A1 (en) 2022-05-10
EP4241255A1 (en) 2023-09-13

Similar Documents

Publication Publication Date Title
US8102999B2 (en) Secure telemetric link
US9953477B2 (en) Mobile key devices systems and methods for programming and communicating with an electronic programmable key
US9960916B2 (en) Secure telemetric link
US7930543B2 (en) Secure telemetric link
US20210070252A1 (en) Method and device for authenticating a user to a transportation vehicle
CA2571848C (en) Security access device and method
CN100590639C (en) System and method for managing multiple smart card sessions
EP3293995B1 (en) Locking system and secure token and ownership transfer
CN111080845B (en) Temporary unlocking method, system, door lock, administrator terminal and readable storage medium
WO2008021920A2 (en) Secure telemetric link
PL178218B1 (en) Method of and apparatus for safety identyfying a mobile user roaming within a communication network
CN109391468A (en) A kind of authentication method and system
US10148433B1 (en) Private key/public key resource protection scheme
WO2022098291A1 (en) Device and method for activating a programmable key
CN110570561A (en) Unlocking method and system based on NFC electronic lock
JP2013209821A (en) Electric lock system
CN210181685U (en) Electronic lock system based on NFC technology
ES2274956T3 (en) DEVICE AND PROCEDURE FOR ASSURED AUTOMATIC MAKING OF THE DEVICES OF A RADIO FREQUENCY NETWORK.
CN219626064U (en) Electronic lock and unlocking system
JP4002198B2 (en) Authentication system, authentication object, and authentication device
JP2017133286A (en) Electronic lock system
TW201721490A (en) Biometrics locking and unlocking system and method therefore

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21889721

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2021889721

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021889721

Country of ref document: EP

Effective date: 20230609