EP2348490A1 - Zugangskontrollsystem - Google Patents
Zugangskontrollsystem Download PDFInfo
- Publication number
- EP2348490A1 EP2348490A1 EP09180266A EP09180266A EP2348490A1 EP 2348490 A1 EP2348490 A1 EP 2348490A1 EP 09180266 A EP09180266 A EP 09180266A EP 09180266 A EP09180266 A EP 09180266A EP 2348490 A1 EP2348490 A1 EP 2348490A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- electromechanical
- key
- lock
- access
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 44
- 230000001413 cellular effect Effects 0.000 claims description 28
- 238000000034 method Methods 0.000 claims description 22
- 238000012546 transfer Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 10
- 230000033001 locomotion Effects 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 6
- 230000006855 networking Effects 0.000 claims description 2
- 238000012986 modification Methods 0.000 claims 2
- 230000004048 modification Effects 0.000 claims 2
- 238000001514 detection method Methods 0.000 claims 1
- 230000008569 process Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 230000000737 periodic effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005674 electromagnetic induction Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Definitions
- the invention relates to the field of access control systems.
- the field of access control systems encompasses conventional mechanical locks with keys mechanically adapted to operate such locks and electronic lock systems where keys interact with electronic locks by utilizing electric signals transferred between a lock and a key. If the key contains correct electronic information, it will control the lock to open and grant access. On the other hand, incorrect electronic information keeps the lock closed.
- the prior art even teaches using an electronic key adapted to communicate with a cellular phone carried by a user over a Bluetooth connection.
- the user When the user wishes to open a lock on a door, for example, the user inserts the key into the lock and controls his/her cellular phone to launch an appropriate application.
- the application controls the cellular phone to access a server controlling access rights. If the user may access the door, the server provides authorization to open the lock, and the authorization is delivered to the lock through the cellular phone and the electronic key.
- a problem with this approach is that while the user may obtain authorization to access on-the-fly, the access itself is complicated because the user has to operate both the key and the cellular phone.
- an electromechanical key as specified in claim 1.
- an access control system as specified in claim 11.
- an electromechanical key is utilized for operating an electromechanical lock.
- the key may be a personal key carried by a person.
- Figure 1 shows an embodiment of an electromechanical locking system.
- a user 105 is about to open a door 115.
- the user carries an electromechanical key 106.
- the electromechanical key 106 is illustrated as a box but in a preferred embodiment the physical dimensions are similar to those of a conventional mechanical key having a protrusion which is inserted into a receptable in a lock so as to implement a mechanical connection between the lock and the key.
- the electromechanical key 106 comprises an electromechanical interface matching a counterpart interface 112 provided in an electromechanical lock 116 the electromechanical key 106 is adapted to open when the electromechanical interface of the electromechanical key 106 is brought into contact with the counterpart interface 112 of the electromechanical lock.
- the contact may be a physical contact, i.e. the interfaces touch each other.
- the contact is short range electromagnetic contact based on electromagnetic induction, short range radio communication, etc.
- the interfaces are electromagnetic interfaces.
- Other embodiments utilize other electronic interfaces and, in general, the electromechanical key may be considered in such embodiments where no mechanical contact between the lock and key is necessary as an electronic key.
- An electronic connection 110 is established between the electromechanical key 106 and the electromechanical lock 116 when the interfaces are brought into contact with one another, i.e. when the key is inserted into the lock.
- the electromechanical key further comprises a communication circuitry configured to establish a radio connection, and a memory for storing access codes used for opening access-controlled locks and other information enabling the operation of the electromechanical key.
- the electromechanical key 106 further comprises a control circuitry configured to control the communication circuitry to establish an end-to-end communication connection with a server 101 managing access rights, to communicate with the server 101 so as to receive an access code granting access to at least one electromechanical lock, and to communicate an appropriate access code received from the server to the electromechanical lock through the electronic connection between the electromechanical key and the electromechanical lock so as to open the electromechanical lock.
- a control circuitry configured to control the communication circuitry to establish an end-to-end communication connection with a server 101 managing access rights, to communicate with the server 101 so as to receive an access code granting access to at least one electromechanical lock, and to communicate an appropriate access code received from the server to the electromechanical lock through the electronic connection between the electromechanical key and the electromechanical lock so as to open the electromechanical lock.
- the communication connection between the electromechanical key 106 and the server 101 may comprise at least one wireless communication link, wherein a wireless communication link is established at least between the electromechanical key and another radio device communicating directly with the electromechanical key.
- the electromechanical key 106 may have a wireless network channel 104 connection to a wireless network 102 or to a cellular phone carried by the user 105 (not shown).
- the wireless channel 104 and the wireless network 102 may be implemented according to the Bluetooth, Zigbee, or any other suitable standard/non-standard short-range wireless communication means. It may also be foreseen that the electromechanical key has medium or even long range communication capabilities, thereby comprising terminal device equipment for cellular network communications according to GSM, CDMA, or UMTS (or another cellular network) specifications.
- the wireless network 102 may establish a pico network, realized by a network of private base stations distributed to cover the area where the location tracking is being carried out.
- the private base station network may establish a wireless mesh network based on the Bluetooth technology, for example, and configured to route signals through a plurality of base stations between a plurality of user equipment and the server.
- One or more of the base stations may be connected to a wired network, e.g. Ethernet, so as to connect to the server. If the server is located in a remote location, the connection between the base station network and the server may be routed through the Internet.
- Other embodiments may utilize other communication technologies to implement the mesh network, such as IEEE 802.11 x (WiFi). Modern cellular telecommunication systems, e.g.
- the UMTS allow for employing private networks and utilizing the UMTS specifications in the private networks.
- the private networks operate in parallel with public UMTS networks and may even utilize the same frequency bands.
- the wireless network 102 may thus employ the UMTS radio access specifications.
- the server may be a computer installed in the same local network as the wireless network or it may be a remote computer accessible through the Internet.
- the physical structure of the server 101 may be similar to other corresponding servers, i.e. it may comprise one or more processors, network interface for providing communication functionality and network access, and a memory (for example hard drive(s)) for storing the access rights database and other data.
- the electromechanical lock 116 comprises the counterpart interface 112 where the key is inserted to make the electromechanical connection, a lock mechanism 108 and a lock bolt 114.
- the user inserts the electromechanical interface of the key 106 into contact with the counterpart interface 112 of the door.
- the user operates the lock mechanism 108 provided in the lock.
- the operating may comprise turning a doorknob or turning the key in the lock.
- the operation activates the lock and provides operating power for the lock to perform the authentication.
- the key transfers the access data into the lock, and the lock reads the access data. If the access data is correct, the lock is set to an openable state and allows the user to operate the lock bolt.
- Any suitable authentication technique may be used in connection with the embodiments of the present invention.
- the selection of the authentication technique depends on the desired security level of the access control system and possibly also on the permitted consumption of electricity for the authentication (especially in user-powered electromechanical locks).
- the authentication is performed with a SHA-1 (Secure Hash Algorithm) function, designed by the National Security Agency (NSA).
- SHA-1 Secure Hash Algorithm
- a condensed digital representation (known as a message digest) is computed from a given input data sequence (known as the message).
- the message digest is to a high degree of probability unique for the message.
- SHA-1 is called "secure" because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will, with a very high probability, result in a different message digest.
- the electromechanical key receives from the server message digests of one or more locks as the access codes, and transfers the message digest to the lock when the electric connection between the lock and the key has been established.
- the lock compares the received message digest with a reference message digest computed from a message stored in a memory of the lock. If the received message digest corresponds with the computed reference message digest, the lock is opened.
- FIG. 2 shows a more detailed example of the electromechanical lock 116 and the electromechanical key 106.
- An electromechanical interface 140 of the electromechanical key 106 and the corresponding interface 112 in the electromechanical lock 116 are counterparts, as described above, and establish the electronic connection between the lock and the key when brought into contact with each other.
- the electronic connection may be realized by a wired bus through bus connectors in both interfaces 140, 112.
- the wired bus may be a one-wire bus.
- the lock 116 further comprises an electronic circuitry configured to receive the access code from the key 106 upon establishment of the electronic connection through the interfaces 140, 112 and to control the opening of the lock in response to the reception of a correct access code.
- the electronic circuitry 142 may be implemented as one or more integrated circuits, such as application-specific integrated circuits ASIC. Other embodiments are also feasible, such as a circuit built of separate logic components, or memory units and one or more processors with software. A hybrid of these different embodiments is also feasible. When selecting the method of implementation, a person skilled in the art will consider the requirements set on the power consumption of the device, production costs, and production volumes, for example.
- the electronic circuitry 142 may be configured to execute computer program instructions for executing computer processes.
- the electronic circuitry 142 is realized with two circuits.
- the electronic circuitry 142 comprises a communication circuitry 126 and an authentication circuitry 120 which are connected to each other with a communication channel 118.
- the communication circuitry communicates with the key, receives an electric signal comprising the access data, extracts the access data, and forwards the access data to the authentication circuitry 120.
- the authentication circuitry 120 analyzes the received access data by comparing the received access data with reference access data stored in a memory (not shown). If the received access data matches the reference access data, the authentication circuitry 120 controls the lock to open.
- the communication channel 118 may be a logical communication channel between two computer processes executed by the same processor, for example, but it may alternatively be a physical channel between two physically separate circuitries.
- the authentication circuit 120 is realized with a microcontroller and a memory unit, and the communication circuit is ASIC.
- other embodiments utilize different physical structures for the electronic circuitry 142.
- the lock further comprises an actuator 124 which controls the lock bolt 114.
- the authentication circuitry configures the actuator 124 to set the lock in a mechanically openable state.
- the actuator 124 may be powered by electric power produced by a generator 122 configured to convert mechanical motion into electric signals, when the user applies the mechanical motion to the lock by turning the knob 108, by turning the key in the lock, or by inserting the key into the lock.
- the generator 122 is connected only to the authentication circuitry, but it may also be connected to the communication circuitry 126 and receive the mechanical motion through the interface 112. Instead of using the generator transforming the mechanical motion into electric energy, a battery may be utilized, or the lock may be connected to a power source, e.g. an electric outlet.
- the lock may acquire its electric energy from the key through the interface and electric connection between the lock and the key.
- the actual implementation of the power supply of the lock depends on the implementation, and the skilled person designing the system takes into account the location of the lock, availability of different power sources, the physical dimensions of the lock, the design of the interfaces of the lock and the key, etc.
- the actuator 124 may be set to a locked state mechanically, but a detailed discussion thereon is not necessary to illuminate the present embodiments.
- the bolt mechanism 114 can be moved by operating the lock mechanism (knob) 108, for example.
- the actuator 124 may in response to the command from the authentication circuitry 120 mechanically move the bolt mechanism 114 so that the door may be opened without any specific action by the user.
- the user only needs to insert the key into contact with the lock so that the connection between the lock and the key is established and the lock will be opened, provided that the user has access rights to the door.
- the electromechanical key comprises an electronic circuitry 107 comprising a memory 130, a control circuitry 132, a rechargeable battery 136, and a communication circuitry 134.
- a communication circuitry 134 may comprise analog and digital components enabling establishment of a radio connection according to any radio access technology listed above. In the following description, a Bluetooth radio access is described. It should be noted that other embodiments utilize other radio access schemes, and the structure and the operation of the communication circuitry 134 is configured according to the supported radio access scheme.
- the control circuitry 132 controls the operation of the key by controlling the communication with the server and the cellular phone or wireless network and by controlling the transfer of access codes between the locks and the key.
- the control circuitry 132 may also be configured to carry out other procedures, as will be described in greater detail.
- the control circuitry 132 may be implemented by ASIC, micro controller, or another processor, depending on the required computational capacity, power consumption requirements, etc.
- the memory 130 stores the access codes received from the processor as being linked to corresponding locks which each code is arranged to open.
- the memory 130 may also store instructions of a computer program configuring the operation of the control circuitry 132 and/or communication circuitry 134 when they are software-defined processors.
- the memory 130 may comprise a non-volatile memory part storing the computer program(s), and a volatile memory (e.g. RAM) for storing the access codes and temporary data needed in the operation of the control circuitry.
- the access codes may be stored in the non-volatile memory so that they will not be erased in an uncontrolled manner.
- the battery 136 is rechargeable, and the electromagnetic interface 140 functions also as an interface for charging the battery 136.
- the interface 140 may comprise a separate wire for charging the battery or the same wiring used for transferring the access codes may be used for charging the battery.
- a charging device may include a slot (or receptable) structurally similar to the interface 112 of the lock.
- circuitry refers to all of the following: (a) hardware-only circuit implementations, such as implementations in only analog and/or digital circuitry, and (b) combinations of circuits and software (and/or firmware), such as (as applicable): (i) a combination of processor(s) or (ii) portions of processor(s)/software including digital signal processor(s), software, and memory(ies) that work together to cause an apparatus to perform various functions, and (c) circuits, such as a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation, even if the software or firmware is not physically present.
- This definition of "circuitry” applies to all uses of this term in this application.
- the term “circuitry” would also cover an implementation of merely a processor (or multiple processors) or a portion of a processor and its (or their) accompanying software and/or firmware.
- FIG. 3 is a flow diagram illustrating a process for updating access rights and accessing locks according to an embodiment of the invention.
- the process is carried out in the electromechanical key, but the following description describes also operations carried out by the server, the electromechanical lock, and the cellular phone / wireless network.
- the process may be defined by a computer program comprising instructions configuring a processor of the electromechanical key to carry out the steps of the process, when the processor executes the computer program.
- the process starts in block 300.
- the key is paired with the cell phone carried by the user.
- the pairing is carried out between the key and a wireless network realized by a network of base stations installed in the premises where the access control system is used.
- the pairing may be a conventional Bluetooth pairing.
- the Bluetooth specification version may be Bluetooth 2.1 + EDR (Enhanced Data Rate) class 1 but other specification versions may alternatively be used, depending on the required data transfer capacity, required operational range, and power consumption requirements.
- Step 302 may be executed when the key is given to the user, and no pairing is necessarily needed again unless the user acquires a new cellular phone or a key.
- the control circuitry of the key controls the communication circuitry to establish a communication connection with an ASP (Application Service Provider) server managing the access rights.
- the communication connection may be a TCP/IP connection, and an IP address of the ASP server may be stored in the memory of the key or in the memory of the cellular phone. In the latter case, the IP address of the ASP server may be read in connection with the pairing in block 302.
- the TCP/IP connection between the key and the ASP server is routed through the cellular phone or wireless network with which the pairing was performed in block 302.
- the cellular phone may route the TCP/IP connection through the public cellular telecommunication system and through the Internet, and the wireless network may route the TCP/IP connection through the private network installed in the premises of the access control system.
- the TCP/IP connection may be encrypted with a cryptographic protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security).
- SSL Secure Sockets Layer
- TLS Transport Layer Security
- the connection in block 304 is established automatically without any user intervention.
- the control circuitry of the key is configured to autonomously utilize the Bluetooth dial-up networking profile (or a corresponding profile of another radio access scheme) so as to configure the cellular phone / wireless network to establish the TCP/IP connection.
- the cellular phone is used merely as a modem or a bridge for routing the connection, and such operation is invisible to the user in that the user does not have to operate the cellular phone after the initial, one-time pairing in block 302.
- the establishment of the connection may include transmission of encrypted key identification data enabling the ASP server to identify the key (and the user of the key).
- the control circuitry Upon establishment of the connection with the ASP server in block 304, the control circuitry transmits a request for up-to-date access codes to the ASP server in block 306.
- the ASP server receives the request, checks a database storing the access rights for each key/user of the access control system in order to acquire access codes currently linked to the key (or the user of the key) requesting the access codes.
- the database may store identifiers of all the locks in the access control system as being associated with an access code which opens the particular lock.
- the ASP server Upon acquiring the access codes and corresponding door identifiers from the database, the ASP server transmits the access codes and corresponding door identifiers over the encrypted TCP/IP connection to the key.
- the key receives the access codes and corresponding door identifiers and stores them in the memory. Then, the TCP/IP connection may be terminated or, alternatively, it may be maintained so that the establishment of a new connection in connection with the next access right update may be omitted.
- the key may be configured to update the access rights, i.e. to request the ASP server to send up-to-date access codes, at predetermined intervals. In other words, blocks 304 and 306 may be carried out at the predetermined time intervals to ensure that the key has up-to-date access codes all the time.
- the predetermined interval may be a one-minute interval, for example.
- the key may omit block 304, and block 304 may be carried out when the key enters the premises of the access control system and the TCP/IP connection is newly created, or when the TCP/IP connection breaks down for some reason, e.g. a time out.
- Block 310 is optionally executed, when the key is configured to retrieve up-to-date access codes every time a lock is being accessed.
- Block 310 includes the retrieval of the up-to-date access codes from the ASP server, i.e. execution of block 306 and optionally block 304 (if the connection has not been maintained).
- the embodiment including the execution of block 310 is advantageous when the access rights of the user has just been modified by adding new access rights to a given lock.
- the user may simply try to access the lock, and the key retrieves the updated access codes automatically with no need to wait for the next periodic check.
- the periodic retrieval of the access codes is omitted, and the key is configured to access the ASP server only in connection with an access event, e.g. when the user tries to access a lock of the access control system.
- the key may identify the access event when a given lock, with which the electric connection is detected in block 308, by successfully retrieving an identifier of the lock through the electric connection, i.e. from the fact that the lock and the key are able to communicate with each other.
- the control circuitry reads the lock's identifier received through the electromagnetic interface over the electric connection between the lock and the key. If the execution of block 310 is dependent on the correct reading of the lock's identifier, block 312 may be executed before block 310.
- the control circuitry accesses the memory to check whether or not the memory includes an entry for the lock identifier read in block 312. If the memory includes the entry for the lock identifier, the control circuitry retrieves an access code linked to the lock identifier. In block 316, the control circuitry transfers the access code to the lock through the electromechanical interface over the electric connection between the lock and the key.
- the authentication circuitry of the lock may be configured to transmit an acknowledgment message to the key over the electric connection so that the control circuitry of the key obtains information on the successful entry.
- the authentication circuitry may also control the actuator to open the lock, as described above. If the memory of the key contains no entry for the lock identifier, the lock access procedure ends.
- the control circuitry may also send an error message to the lock, and the lock may indicate an erroneous entry to the user by flashing a red light or by providing another visual or audiovisual indication that the access has been denied.
- the control circuitry of the key may be configured to transmit a message indicating the failed access to the server.
- the message may include the identifier of the lock so that the failed access is linked to the appropriate lock and optionally time information indicating the time when the entry was attempted.
- the time may, however, be determined implicitly from the time when the message is transferred to the ASP server.
- the ASP server may check whether or not the key had rights to access that door at the time the entry was made so as to verify whether the user has tried to access a lock which he/she has no rights to access or whether there has been an operational error in the lock, key, server, or in the communication between them.
- the system may record operational failures so as to detect faulty components in the access control system, and the system may also record information that the user has tried to access a lock to which (s)he has no access rights.
- the control circuitry of the key may be configured to transfer a message of a successful entry to a given lock to the ASP server for location tracking purposes.
- a message may comprise an indication of the successful entry and an identifier of the lock which has been successfully opened.
- the transfer of such a message may be triggered by the acknowledgment message received from the lock as a result of the successful entry.
- the server may record the locks the user of the key has accessed successfully and times when the locks have been accessed so as to track the movement of the user in the premises of the access control system.
- the server may store a layout of the premises of the access control system where physical locations of the electromechanical locks have been stored. When the server receives information on the lock a given key has accessed, it may map the key to a given location when the server knows the physical location of that lock.
- the location tracking may also be used for tracking working time of the user when the access control system is installed in a working place.
- the ASP server is further configured to count a time of presence of a given personal electronic device from access information received from the keys of the staff.
- the location tracking may be used for monitoring and storing the working time of each member of the staff on the basis of the time duration the staff member is detected to have been in the premises of the area where the location tracking is carried out.
- the start time is the time when the staff member accesses an entry/exit door of the premises for the first time, i.e. when the key of the staff member indicates entry through that door.
- the end time is the time when the key indicates exit through the entry/exit door or another corresponding entry/exit door.
- the working time may be stored in the user record on a daily basis.
- the server may each day store a time when a given key is detected in the area and a time when the key is assumed to have left the area. From these stored times, a duration of the personal radio communication device in the area may be calculated by applying simple mathematics, and the thus obtained working hours per day may be stored in the user record.
- the location tracking may be utilized for other purposes as well.
- the user's cellular phone (or another communication device or devices) may be linked to the location tracking system and to the ASP server. This enables a given user to establish a voice connection to a selected place, instead of a selected phone number.
- the user may establish a call which is routed to the ASP server, wherein the call establishment includes transfer of a message comprising an identifier of a location to which the caller wishes to give call.
- the ASP server checks the location tracking records in order to find out another user closest to the desired location and, upon finding such a user, the ASP server routes the call connection to that user's cellular phone (or another communication device).
- the location tracking is used for routing alarm messages to the nearest persons.
- the key, cellular phone, or another device carried by the user may be used for transmitting an alarm message to the server.
- the key may comprise an alarm button which, when pressed, configures the control circuitry to transmit the alarm message to the ASP server.
- the alarm message is an indication that help is needed in the location where the user requesting for help resides.
- the server checks the location tracking records in order to find out another user closest to the desired location and, upon finding such a user, the ASP server routes the alarm to that user's cellular phone (or another communication device) in connection with the location where the help is needed (the most recent location of the user/key requesting the help). This may be particularly useful in a hospital or other health care institutions where emergencies occur.
- Other location tracking means for monitoring the location of the users in the premises are used in other embodiments.
- the database of the ASP server stores key or user identifiers indicating the locks that each key or user is allowed to open.
- a particular key may thus be configured to open a plurality of locks, rather than having a dedicated key for every lock.
- the set of locks to which a certain key/user has access rights may be updated in real time simply by editing the database.
- the ASP server may be triggered to transmit the updated access codes to the key immediately so that the updated access rights are put to use immediately.
- the periodic update check and/or block 310 described above in connection with Figure 3 may even be omitted, although it is not necessary.
- the key may still verify that it has appropriate access rights periodically or when a lock is being accessed.
- the key Upon reception of the updated access codes from the server, the key modifies the stored access codes so as to make them up-to-date.
- the transfer of the updated access codes and lock identifiers from the server to the key may include all the key identifiers and corresponding access codes to which access is granted every time the access rights update is carried out. If the update includes addition of one or more new access rights, only new access codes and lock identifiers may be sent to the key and no old access rights which have already been transferred need to be sent again. Similarly, if the update includes deletion of access rights, the ASP server may send a message indicating which access rights (access code and lock identifier) need to be deleted. This reduces the amount of data traffic, since transfer of redundant information is reduced.
- the key may be configured to attempt reestablishment of the connection. If the reestablishment is not successful within a determined duration or number of attempts, the control circuitry of the key may be configured to irrevocably erase the access rights from the memory. The control circuitry may alternatively erase the access rights immediately upon losing TCP/IP connection with the server. As a consequence, the access codes will be deleted immediately if the user's key is stolen and the connection to the cellular phone or wireless network is lost or if the connection to the ASP server is otherwise lost. This improves the security of the system.
- the whole operation for retrieving the access rights and communicating with the lock so as to enter the access code is carried out automatically without any user interaction.
- the user only has to bring the counterpart interfaces provided in the electromechanical key and the lock into connection with one another, and then open the door, latch, or another element the lock protects.
- the user convenience and speed of opening the lock is improved, as the complexity of the procedure is reduced.
- the process or method described in Figure 3 may also be carried out in the form of a computer process defined by a computer program.
- the computer program may be in source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, which may be any entity or device capable of carrying the program.
- Such carriers include a record medium, computer memory, read-only memory, electrical carrier signal, telecommunications signal, and software distribution package, for example.
- the computer program may be executed in a single electronic digital processing unit or it may be distributed amongst a number of processing units.
- the present invention is applicable to any access control system utilizing electromechanical locks.
- the electromechanical locks require no connection with the server, and in some embodiment they do not even require batteries as the energy needed for the authentication and opening the lock is provided by the user with mechanical motion. This facilitates the installation of the system. Otherwise, the installation is very simple.
- the database of the server is constructed to contain the access rights for the users/keys.
- the keys are preconfigured to carry out the operations described above. When taken into use, a key may be paired with the user's cellular phone or the wireless network, and after the pairing the key automatically acquires the access rights. Depending on the radio access protocol the keys are configured to use, even the pairing may be omitted.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09180266.0A EP2348490B1 (de) | 2009-12-22 | 2009-12-22 | Zugangskontrollsystem |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09180266.0A EP2348490B1 (de) | 2009-12-22 | 2009-12-22 | Zugangskontrollsystem |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2348490A1 true EP2348490A1 (de) | 2011-07-27 |
EP2348490B1 EP2348490B1 (de) | 2020-03-04 |
Family
ID=42149028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09180266.0A Active EP2348490B1 (de) | 2009-12-22 | 2009-12-22 | Zugangskontrollsystem |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP2348490B1 (de) |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123769A (zh) * | 2014-06-13 | 2014-10-29 | 厦门华数电力科技有限公司 | 一种安全智能锁的开锁、关锁控制方法 |
CN104167041A (zh) * | 2014-09-11 | 2014-11-26 | 祁春富 | 基于智能手机使用的门禁系统及其控制方法 |
EP2819103A1 (de) * | 2013-06-25 | 2014-12-31 | Evva Sicherheitstechnologie GmbH | Verfahren zur Zutrittskontrolle |
CN104282060A (zh) * | 2014-08-21 | 2015-01-14 | 厦门华数电力科技有限公司 | 一种安全智能锁系统的开锁方法 |
CN104282062A (zh) * | 2014-08-21 | 2015-01-14 | 厦门华数电力科技有限公司 | 基于安全智能锁系统的开锁和关锁方法 |
CN104282061A (zh) * | 2014-08-21 | 2015-01-14 | 厦门华数电力科技有限公司 | 一种安全智能锁系统及其开、关锁方法 |
CN104504792A (zh) * | 2014-12-17 | 2015-04-08 | 张家港保税区润桐电子技术研发有限公司 | 一种基于二维码的门禁系统 |
CN104517338A (zh) * | 2015-01-20 | 2015-04-15 | 蹇晓梅 | 基于无线网络的远程门禁控制系统及其实现方法 |
CN104809795A (zh) * | 2015-05-21 | 2015-07-29 | 河南传通电子科技有限公司 | 一种利用手机app与云平台及蓝牙智能钥匙控制开关锁的电路结构及其实现方法 |
CN104851168A (zh) * | 2015-05-19 | 2015-08-19 | 上海思慧德安防设备有限公司 | 无电锁门禁系统 |
CN104881912A (zh) * | 2015-05-20 | 2015-09-02 | 厦门城力机电设备有限公司 | 一种开门系统及开门方法 |
CN105069868A (zh) * | 2015-07-21 | 2015-11-18 | 杭州晟元数据安全技术股份有限公司 | 一种基于手机动态安全二维码识别智能小区云系统 |
CN105118131A (zh) * | 2015-10-05 | 2015-12-02 | 李轩涛 | 互联网条码/二维码/身份证智能锁 |
CN105118111A (zh) * | 2015-07-15 | 2015-12-02 | 国网天津武清供电有限公司 | 一种外来人员施工登记系统及方法 |
CN105184935A (zh) * | 2015-10-22 | 2015-12-23 | 深圳优方网络技术有限公司 | 一种可微信分享密码的蓝牙智能锁系统 |
EP2821970B1 (de) | 2013-07-05 | 2016-04-27 | Assa Abloy Ab | Kommunikationsvorrichtung zur Zugriffssteuerung, Verfahren, Computerprogramm und Computerprogrammprodukt |
WO2016092432A1 (en) * | 2014-12-10 | 2016-06-16 | Viadact N.V. | Key management system |
CN105913527A (zh) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | 基于小区云的访客二维码智能验证系统及验证方法 |
CN106204853A (zh) * | 2016-07-28 | 2016-12-07 | 乐视控股(北京)有限公司 | 服务器、门禁设备管理中心、移动终端、控制门禁的方法及系统 |
CN106447843A (zh) * | 2016-08-27 | 2017-02-22 | 桂林信通科技有限公司 | 一种小区门禁安防方法和系统 |
US9841743B2 (en) | 2014-04-07 | 2017-12-12 | Videx, Inc. | Apparatus and method for remote administration and recurrent updating of credentials in an access control system |
CN108154580A (zh) * | 2017-12-22 | 2018-06-12 | 深圳供电局有限公司 | 一种智能安全锁及使用方法 |
US10115256B2 (en) | 2014-04-07 | 2018-10-30 | Videx, Inc. | Remote administration of an electronic key to facilitate use by authorized persons |
CN108877006A (zh) * | 2018-06-29 | 2018-11-23 | 深圳春沐源控股有限公司 | 一种门禁管理方法、系统及相关设备 |
US10192380B2 (en) | 2013-07-05 | 2019-01-29 | Assa Abloy Ab | Key device and associated method, computer program and computer program product |
CN110706381A (zh) * | 2019-09-30 | 2020-01-17 | 深圳市纳泽科技有限公司 | 一种自动检测房屋并自动冻结门锁密码的公寓管理系统 |
US11010995B2 (en) | 2019-09-06 | 2021-05-18 | Videx, Inc. | Access control system with dynamic access permission processing |
CN113034759A (zh) * | 2021-03-10 | 2021-06-25 | 鄂尔多斯市嵘泰电力工程建设有限公司 | 一种蓝牙门禁系统及其门禁方法 |
CN113034734A (zh) * | 2019-12-06 | 2021-06-25 | 中国石油天然气股份有限公司 | 电子钥匙的授权方法、存储介质以及计算机设备 |
US20210390808A1 (en) * | 2018-10-31 | 2021-12-16 | Swedlock Ab | System to provide access to premises that comprise entrances locked by means of electromechanical key locks |
US11339589B2 (en) | 2018-04-13 | 2022-05-24 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
SE2151168A1 (en) * | 2021-09-24 | 2023-03-25 | Assa Abloy Ab | Access control device |
US11804084B2 (en) | 2013-09-10 | 2023-10-31 | Lockfob, Llc | Contactless electronic access control system |
US11913254B2 (en) | 2017-09-08 | 2024-02-27 | dormakaba USA, Inc. | Electro-mechanical lock core |
US11933076B2 (en) | 2016-10-19 | 2024-03-19 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US12027001B2 (en) | 2020-03-31 | 2024-07-02 | Lockfob, Llc | Electronic access control |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030117260A1 (en) * | 2001-12-22 | 2003-06-26 | Koninklijke Philips Electronics N.V. | Access control system |
EP1324276A2 (de) * | 2001-12-28 | 2003-07-02 | Matsushita Electric Works, Ltd. | Elektronischer Schlüssel, elektronisches Schloss, elektronisches Sicherheitssystem und Schlüsselverwaltungsserver |
EP1336937A1 (de) * | 2002-02-13 | 2003-08-20 | Swisscom AG | Zutrittskontrollsystem, Zutrittskontrollverfahren und dafur geeignete Vorrichtungen |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2236973T3 (es) * | 1999-01-28 | 2005-07-16 | International Business Machines Corporation | Metodo y sistema de control de acceso electronico. |
ATE463810T1 (de) * | 2001-12-21 | 2010-04-15 | Kaba Ag | Verfahren zur regelung des zutrittsregimes zu einem objekt |
US7167094B2 (en) * | 2003-01-31 | 2007-01-23 | Secure Care Products, Inc. | Systems and methods for providing secure environments |
WO2004092514A1 (en) * | 2003-04-16 | 2004-10-28 | Tcam Technology Pte. Ltd. | Electronic lock and key for access management |
ES2253971B1 (es) * | 2004-02-05 | 2007-07-16 | Salto Systems, S.L. | Sistema de control de acceso. |
AT506344B1 (de) * | 2008-01-30 | 2015-06-15 | Evva Sicherheitstechnologie | Verfahren und vorrichtung zur steuerung der zutrittskontrolle |
-
2009
- 2009-12-22 EP EP09180266.0A patent/EP2348490B1/de active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030117260A1 (en) * | 2001-12-22 | 2003-06-26 | Koninklijke Philips Electronics N.V. | Access control system |
EP1324276A2 (de) * | 2001-12-28 | 2003-07-02 | Matsushita Electric Works, Ltd. | Elektronischer Schlüssel, elektronisches Schloss, elektronisches Sicherheitssystem und Schlüsselverwaltungsserver |
EP1336937A1 (de) * | 2002-02-13 | 2003-08-20 | Swisscom AG | Zutrittskontrollsystem, Zutrittskontrollverfahren und dafur geeignete Vorrichtungen |
Cited By (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2819103A1 (de) * | 2013-06-25 | 2014-12-31 | Evva Sicherheitstechnologie GmbH | Verfahren zur Zutrittskontrolle |
US10282930B2 (en) | 2013-07-05 | 2019-05-07 | Assa Abloy Ab | Access control communication device, method, computer program and computer program product |
US10192380B2 (en) | 2013-07-05 | 2019-01-29 | Assa Abloy Ab | Key device and associated method, computer program and computer program product |
EP2821970B1 (de) | 2013-07-05 | 2016-04-27 | Assa Abloy Ab | Kommunikationsvorrichtung zur Zugriffssteuerung, Verfahren, Computerprogramm und Computerprogrammprodukt |
US11804084B2 (en) | 2013-09-10 | 2023-10-31 | Lockfob, Llc | Contactless electronic access control system |
US10115256B2 (en) | 2014-04-07 | 2018-10-30 | Videx, Inc. | Remote administration of an electronic key to facilitate use by authorized persons |
US9841743B2 (en) | 2014-04-07 | 2017-12-12 | Videx, Inc. | Apparatus and method for remote administration and recurrent updating of credentials in an access control system |
US10423136B2 (en) | 2014-04-07 | 2019-09-24 | Videx, Inc. | Distribution of access control information based on movement of an electronic key |
US10643414B2 (en) | 2014-04-07 | 2020-05-05 | Videx, Inc. | Electronic key device utilizing user input to facilitate access by authorized persons |
US11423723B2 (en) | 2014-04-07 | 2022-08-23 | Videx, Inc. | Enhanced access control based on key proximity |
CN104123769A (zh) * | 2014-06-13 | 2014-10-29 | 厦门华数电力科技有限公司 | 一种安全智能锁的开锁、关锁控制方法 |
CN104123769B (zh) * | 2014-06-13 | 2016-01-13 | 厦门华数电力科技有限公司 | 一种安全智能锁的开锁、关锁控制方法 |
CN104282062B (zh) * | 2014-08-21 | 2017-01-18 | 厦门华数电力科技有限公司 | 基于安全智能锁系统的开锁和关锁方法 |
CN104282061A (zh) * | 2014-08-21 | 2015-01-14 | 厦门华数电力科技有限公司 | 一种安全智能锁系统及其开、关锁方法 |
CN104282060A (zh) * | 2014-08-21 | 2015-01-14 | 厦门华数电力科技有限公司 | 一种安全智能锁系统的开锁方法 |
CN104282062A (zh) * | 2014-08-21 | 2015-01-14 | 厦门华数电力科技有限公司 | 基于安全智能锁系统的开锁和关锁方法 |
CN104282061B (zh) * | 2014-08-21 | 2017-05-24 | 厦门华数电力科技有限公司 | 一种安全智能锁系统的开锁方法 |
CN104282060B (zh) * | 2014-08-21 | 2016-10-19 | 厦门华数电力科技有限公司 | 一种安全智能锁系统的开锁方法 |
CN104167041A (zh) * | 2014-09-11 | 2014-11-26 | 祁春富 | 基于智能手机使用的门禁系统及其控制方法 |
WO2016092432A1 (en) * | 2014-12-10 | 2016-06-16 | Viadact N.V. | Key management system |
CN104504792A (zh) * | 2014-12-17 | 2015-04-08 | 张家港保税区润桐电子技术研发有限公司 | 一种基于二维码的门禁系统 |
CN104517338A (zh) * | 2015-01-20 | 2015-04-15 | 蹇晓梅 | 基于无线网络的远程门禁控制系统及其实现方法 |
CN104851168A (zh) * | 2015-05-19 | 2015-08-19 | 上海思慧德安防设备有限公司 | 无电锁门禁系统 |
CN104881912A (zh) * | 2015-05-20 | 2015-09-02 | 厦门城力机电设备有限公司 | 一种开门系统及开门方法 |
CN104809795A (zh) * | 2015-05-21 | 2015-07-29 | 河南传通电子科技有限公司 | 一种利用手机app与云平台及蓝牙智能钥匙控制开关锁的电路结构及其实现方法 |
CN105118111A (zh) * | 2015-07-15 | 2015-12-02 | 国网天津武清供电有限公司 | 一种外来人员施工登记系统及方法 |
CN105069868B (zh) * | 2015-07-21 | 2018-04-20 | 杭州晟元数据安全技术股份有限公司 | 一种基于手机动态安全二维码识别智能小区云系统 |
CN105069868A (zh) * | 2015-07-21 | 2015-11-18 | 杭州晟元数据安全技术股份有限公司 | 一种基于手机动态安全二维码识别智能小区云系统 |
CN105118131A (zh) * | 2015-10-05 | 2015-12-02 | 李轩涛 | 互联网条码/二维码/身份证智能锁 |
CN105184935A (zh) * | 2015-10-22 | 2015-12-23 | 深圳优方网络技术有限公司 | 一种可微信分享密码的蓝牙智能锁系统 |
CN105913527A (zh) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | 基于小区云的访客二维码智能验证系统及验证方法 |
CN106204853A (zh) * | 2016-07-28 | 2016-12-07 | 乐视控股(北京)有限公司 | 服务器、门禁设备管理中心、移动终端、控制门禁的方法及系统 |
CN106447843A (zh) * | 2016-08-27 | 2017-02-22 | 桂林信通科技有限公司 | 一种小区门禁安防方法和系统 |
US11933076B2 (en) | 2016-10-19 | 2024-03-19 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US11913254B2 (en) | 2017-09-08 | 2024-02-27 | dormakaba USA, Inc. | Electro-mechanical lock core |
CN108154580A (zh) * | 2017-12-22 | 2018-06-12 | 深圳供电局有限公司 | 一种智能安全锁及使用方法 |
US11447980B2 (en) | 2018-04-13 | 2022-09-20 | Dormakaba Usa Inc. | Puller tool |
US12071788B2 (en) | 2018-04-13 | 2024-08-27 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US11466473B2 (en) | 2018-04-13 | 2022-10-11 | Dormakaba Usa Inc | Electro-mechanical lock core |
US12031357B2 (en) | 2018-04-13 | 2024-07-09 | Dormakaba Usa Inc. | Electro-mechanical lock core |
US11339589B2 (en) | 2018-04-13 | 2022-05-24 | Dormakaba Usa Inc. | Electro-mechanical lock core |
CN108877006A (zh) * | 2018-06-29 | 2018-11-23 | 深圳春沐源控股有限公司 | 一种门禁管理方法、系统及相关设备 |
WO2020000894A1 (zh) * | 2018-06-29 | 2020-01-02 | 深圳春沐源控股有限公司 | 一种门禁管理方法、系统及相关设备 |
US11893845B2 (en) | 2018-10-31 | 2024-02-06 | Swedlock Ab | System to provide access to premises that comprise entrances locked by means of electromechanical key locks |
EP3874474A4 (de) * | 2018-10-31 | 2022-08-17 | Swedlock AB | System zur bereitstellung von zugang zu gebäuden mit eingängen, die mittels elektromechanischer schlüsselschlösser verriegelt sind |
US20210390808A1 (en) * | 2018-10-31 | 2021-12-16 | Swedlock Ab | System to provide access to premises that comprise entrances locked by means of electromechanical key locks |
US11580801B2 (en) | 2019-09-06 | 2023-02-14 | Videx, Inc. | Access control system with dynamic access permission processing |
US11010995B2 (en) | 2019-09-06 | 2021-05-18 | Videx, Inc. | Access control system with dynamic access permission processing |
CN110706381A (zh) * | 2019-09-30 | 2020-01-17 | 深圳市纳泽科技有限公司 | 一种自动检测房屋并自动冻结门锁密码的公寓管理系统 |
CN113034734A (zh) * | 2019-12-06 | 2021-06-25 | 中国石油天然气股份有限公司 | 电子钥匙的授权方法、存储介质以及计算机设备 |
CN113034734B (zh) * | 2019-12-06 | 2023-02-10 | 中国石油天然气股份有限公司 | 电子钥匙的授权方法、存储介质以及计算机设备 |
US12027001B2 (en) | 2020-03-31 | 2024-07-02 | Lockfob, Llc | Electronic access control |
CN113034759A (zh) * | 2021-03-10 | 2021-06-25 | 鄂尔多斯市嵘泰电力工程建设有限公司 | 一种蓝牙门禁系统及其门禁方法 |
SE2151168A1 (en) * | 2021-09-24 | 2023-03-25 | Assa Abloy Ab | Access control device |
SE545778C2 (en) * | 2021-09-24 | 2024-01-09 | Assa Abloy Ab | Electronic lock comprising a first credential interface and a second credential interface |
Also Published As
Publication number | Publication date |
---|---|
EP2348490B1 (de) | 2020-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2348490B1 (de) | Zugangskontrollsystem | |
AU2018229480B2 (en) | Access control communication device, method, computer program and computer program product | |
US11799671B2 (en) | Secure locking of physical resources using asymmetric cryptography | |
US8604903B2 (en) | Electronic locking system with wireless update and cascade lock control | |
US11189117B2 (en) | Method and system for controlling a smart lock | |
ES2713424T3 (es) | Sistemas y métodos para la gestión de acceso a cerraduras utilizando señales inalámbricas | |
US20120213362A1 (en) | Distribution Of Lock Access Data For Electromechanical Locks In An Access Control System | |
CN107742339B (zh) | 一种基于平台的无源电子锁具的管理方法 | |
JP6009783B2 (ja) | 出入管理システム | |
CN103227776A (zh) | 配置方法、配置设备、计算机程序产品和控制系统 | |
CN100409697C (zh) | 使用多个验证服务器的无线设备网络的管理方法及其设备 | |
CN104050742A (zh) | 一种智能门以及一种智能门控制方法和系统 | |
CN104504796A (zh) | 一种基于无线网络的机房智能门禁开启方法及开启系统 | |
US12027001B2 (en) | Electronic access control | |
KR102301478B1 (ko) | 스마트 시건 장치, 그 장치를 포함한 시건 관리 시스템 및 그 시스템을 이용한 시건 관리 방법 | |
CN210864848U (zh) | 一种电箱的蓝牙智能锁装置及系统 | |
JP5269408B2 (ja) | 盗用防止装置 | |
US11210386B2 (en) | Technique for managing a right of access to a service for a communicating device | |
CN118280022A (zh) | 车辆解闭锁系统、方法和nfc数字钥匙管理方法 | |
KR20210053254A (ko) | 전자 키 관리 시스템 및 서버 | |
CN111599070A (zh) | 一种复合组网门锁控制方法 | |
CN117774746A (zh) | 无感鉴权充电方法、充电桩及存储介质 | |
KR20230086887A (ko) | 스마트 다중 보안 도어락 시스템 | |
CN118300226A (zh) | 充电架的充电口控制方法、系统及充电架 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
17P | Request for examination filed |
Effective date: 20120125 |
|
17Q | First examination report despatched |
Effective date: 20160309 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
TPAC | Observations filed by third parties |
Free format text: ORIGINAL CODE: EPIDOSNTIPA |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20191011 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ILOQ OY Owner name: 9SOLUTIONS OY |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: HERRALA, SAMI |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1241261 Country of ref document: AT Kind code of ref document: T Effective date: 20200315 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602009061334 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: FI Ref legal event code: FGE |
|
REG | Reference to a national code |
Ref country code: SE Ref legal event code: TRGR |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200604 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200604 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200605 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200729 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200704 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1241261 Country of ref document: AT Kind code of ref document: T Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602009061334 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
26N | No opposition filed |
Effective date: 20201207 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20201231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201222 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201222 Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201231 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200304 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20201231 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20231215 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: SE Payment date: 20231218 Year of fee payment: 15 Ref country code: FI Payment date: 20231214 Year of fee payment: 15 Ref country code: DE Payment date: 20231218 Year of fee payment: 15 |