EP2348490A1 - Système de contrôle d'accès - Google Patents

Système de contrôle d'accès Download PDF

Info

Publication number
EP2348490A1
EP2348490A1 EP09180266A EP09180266A EP2348490A1 EP 2348490 A1 EP2348490 A1 EP 2348490A1 EP 09180266 A EP09180266 A EP 09180266A EP 09180266 A EP09180266 A EP 09180266A EP 2348490 A1 EP2348490 A1 EP 2348490A1
Authority
EP
European Patent Office
Prior art keywords
electromechanical
key
lock
access
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP09180266A
Other languages
German (de)
English (en)
Other versions
EP2348490B1 (fr
Inventor
Sami Herrala
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iloq Oy
9Solutions Oy
Original Assignee
Iloq Oy
9Solutions Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iloq Oy, 9Solutions Oy filed Critical Iloq Oy
Priority to EP09180266.0A priority Critical patent/EP2348490B1/fr
Publication of EP2348490A1 publication Critical patent/EP2348490A1/fr
Application granted granted Critical
Publication of EP2348490B1 publication Critical patent/EP2348490B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Definitions

  • the invention relates to the field of access control systems.
  • the field of access control systems encompasses conventional mechanical locks with keys mechanically adapted to operate such locks and electronic lock systems where keys interact with electronic locks by utilizing electric signals transferred between a lock and a key. If the key contains correct electronic information, it will control the lock to open and grant access. On the other hand, incorrect electronic information keeps the lock closed.
  • the prior art even teaches using an electronic key adapted to communicate with a cellular phone carried by a user over a Bluetooth connection.
  • the user When the user wishes to open a lock on a door, for example, the user inserts the key into the lock and controls his/her cellular phone to launch an appropriate application.
  • the application controls the cellular phone to access a server controlling access rights. If the user may access the door, the server provides authorization to open the lock, and the authorization is delivered to the lock through the cellular phone and the electronic key.
  • a problem with this approach is that while the user may obtain authorization to access on-the-fly, the access itself is complicated because the user has to operate both the key and the cellular phone.
  • an electromechanical key as specified in claim 1.
  • an access control system as specified in claim 11.
  • an electromechanical key is utilized for operating an electromechanical lock.
  • the key may be a personal key carried by a person.
  • Figure 1 shows an embodiment of an electromechanical locking system.
  • a user 105 is about to open a door 115.
  • the user carries an electromechanical key 106.
  • the electromechanical key 106 is illustrated as a box but in a preferred embodiment the physical dimensions are similar to those of a conventional mechanical key having a protrusion which is inserted into a receptable in a lock so as to implement a mechanical connection between the lock and the key.
  • the electromechanical key 106 comprises an electromechanical interface matching a counterpart interface 112 provided in an electromechanical lock 116 the electromechanical key 106 is adapted to open when the electromechanical interface of the electromechanical key 106 is brought into contact with the counterpart interface 112 of the electromechanical lock.
  • the contact may be a physical contact, i.e. the interfaces touch each other.
  • the contact is short range electromagnetic contact based on electromagnetic induction, short range radio communication, etc.
  • the interfaces are electromagnetic interfaces.
  • Other embodiments utilize other electronic interfaces and, in general, the electromechanical key may be considered in such embodiments where no mechanical contact between the lock and key is necessary as an electronic key.
  • An electronic connection 110 is established between the electromechanical key 106 and the electromechanical lock 116 when the interfaces are brought into contact with one another, i.e. when the key is inserted into the lock.
  • the electromechanical key further comprises a communication circuitry configured to establish a radio connection, and a memory for storing access codes used for opening access-controlled locks and other information enabling the operation of the electromechanical key.
  • the electromechanical key 106 further comprises a control circuitry configured to control the communication circuitry to establish an end-to-end communication connection with a server 101 managing access rights, to communicate with the server 101 so as to receive an access code granting access to at least one electromechanical lock, and to communicate an appropriate access code received from the server to the electromechanical lock through the electronic connection between the electromechanical key and the electromechanical lock so as to open the electromechanical lock.
  • a control circuitry configured to control the communication circuitry to establish an end-to-end communication connection with a server 101 managing access rights, to communicate with the server 101 so as to receive an access code granting access to at least one electromechanical lock, and to communicate an appropriate access code received from the server to the electromechanical lock through the electronic connection between the electromechanical key and the electromechanical lock so as to open the electromechanical lock.
  • the communication connection between the electromechanical key 106 and the server 101 may comprise at least one wireless communication link, wherein a wireless communication link is established at least between the electromechanical key and another radio device communicating directly with the electromechanical key.
  • the electromechanical key 106 may have a wireless network channel 104 connection to a wireless network 102 or to a cellular phone carried by the user 105 (not shown).
  • the wireless channel 104 and the wireless network 102 may be implemented according to the Bluetooth, Zigbee, or any other suitable standard/non-standard short-range wireless communication means. It may also be foreseen that the electromechanical key has medium or even long range communication capabilities, thereby comprising terminal device equipment for cellular network communications according to GSM, CDMA, or UMTS (or another cellular network) specifications.
  • the wireless network 102 may establish a pico network, realized by a network of private base stations distributed to cover the area where the location tracking is being carried out.
  • the private base station network may establish a wireless mesh network based on the Bluetooth technology, for example, and configured to route signals through a plurality of base stations between a plurality of user equipment and the server.
  • One or more of the base stations may be connected to a wired network, e.g. Ethernet, so as to connect to the server. If the server is located in a remote location, the connection between the base station network and the server may be routed through the Internet.
  • Other embodiments may utilize other communication technologies to implement the mesh network, such as IEEE 802.11 x (WiFi). Modern cellular telecommunication systems, e.g.
  • the UMTS allow for employing private networks and utilizing the UMTS specifications in the private networks.
  • the private networks operate in parallel with public UMTS networks and may even utilize the same frequency bands.
  • the wireless network 102 may thus employ the UMTS radio access specifications.
  • the server may be a computer installed in the same local network as the wireless network or it may be a remote computer accessible through the Internet.
  • the physical structure of the server 101 may be similar to other corresponding servers, i.e. it may comprise one or more processors, network interface for providing communication functionality and network access, and a memory (for example hard drive(s)) for storing the access rights database and other data.
  • the electromechanical lock 116 comprises the counterpart interface 112 where the key is inserted to make the electromechanical connection, a lock mechanism 108 and a lock bolt 114.
  • the user inserts the electromechanical interface of the key 106 into contact with the counterpart interface 112 of the door.
  • the user operates the lock mechanism 108 provided in the lock.
  • the operating may comprise turning a doorknob or turning the key in the lock.
  • the operation activates the lock and provides operating power for the lock to perform the authentication.
  • the key transfers the access data into the lock, and the lock reads the access data. If the access data is correct, the lock is set to an openable state and allows the user to operate the lock bolt.
  • Any suitable authentication technique may be used in connection with the embodiments of the present invention.
  • the selection of the authentication technique depends on the desired security level of the access control system and possibly also on the permitted consumption of electricity for the authentication (especially in user-powered electromechanical locks).
  • the authentication is performed with a SHA-1 (Secure Hash Algorithm) function, designed by the National Security Agency (NSA).
  • SHA-1 Secure Hash Algorithm
  • a condensed digital representation (known as a message digest) is computed from a given input data sequence (known as the message).
  • the message digest is to a high degree of probability unique for the message.
  • SHA-1 is called "secure" because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different messages that produce the same message digest. Any change to a message will, with a very high probability, result in a different message digest.
  • the electromechanical key receives from the server message digests of one or more locks as the access codes, and transfers the message digest to the lock when the electric connection between the lock and the key has been established.
  • the lock compares the received message digest with a reference message digest computed from a message stored in a memory of the lock. If the received message digest corresponds with the computed reference message digest, the lock is opened.
  • FIG. 2 shows a more detailed example of the electromechanical lock 116 and the electromechanical key 106.
  • An electromechanical interface 140 of the electromechanical key 106 and the corresponding interface 112 in the electromechanical lock 116 are counterparts, as described above, and establish the electronic connection between the lock and the key when brought into contact with each other.
  • the electronic connection may be realized by a wired bus through bus connectors in both interfaces 140, 112.
  • the wired bus may be a one-wire bus.
  • the lock 116 further comprises an electronic circuitry configured to receive the access code from the key 106 upon establishment of the electronic connection through the interfaces 140, 112 and to control the opening of the lock in response to the reception of a correct access code.
  • the electronic circuitry 142 may be implemented as one or more integrated circuits, such as application-specific integrated circuits ASIC. Other embodiments are also feasible, such as a circuit built of separate logic components, or memory units and one or more processors with software. A hybrid of these different embodiments is also feasible. When selecting the method of implementation, a person skilled in the art will consider the requirements set on the power consumption of the device, production costs, and production volumes, for example.
  • the electronic circuitry 142 may be configured to execute computer program instructions for executing computer processes.
  • the electronic circuitry 142 is realized with two circuits.
  • the electronic circuitry 142 comprises a communication circuitry 126 and an authentication circuitry 120 which are connected to each other with a communication channel 118.
  • the communication circuitry communicates with the key, receives an electric signal comprising the access data, extracts the access data, and forwards the access data to the authentication circuitry 120.
  • the authentication circuitry 120 analyzes the received access data by comparing the received access data with reference access data stored in a memory (not shown). If the received access data matches the reference access data, the authentication circuitry 120 controls the lock to open.
  • the communication channel 118 may be a logical communication channel between two computer processes executed by the same processor, for example, but it may alternatively be a physical channel between two physically separate circuitries.
  • the authentication circuit 120 is realized with a microcontroller and a memory unit, and the communication circuit is ASIC.
  • other embodiments utilize different physical structures for the electronic circuitry 142.
  • the lock further comprises an actuator 124 which controls the lock bolt 114.
  • the authentication circuitry configures the actuator 124 to set the lock in a mechanically openable state.
  • the actuator 124 may be powered by electric power produced by a generator 122 configured to convert mechanical motion into electric signals, when the user applies the mechanical motion to the lock by turning the knob 108, by turning the key in the lock, or by inserting the key into the lock.
  • the generator 122 is connected only to the authentication circuitry, but it may also be connected to the communication circuitry 126 and receive the mechanical motion through the interface 112. Instead of using the generator transforming the mechanical motion into electric energy, a battery may be utilized, or the lock may be connected to a power source, e.g. an electric outlet.
  • the lock may acquire its electric energy from the key through the interface and electric connection between the lock and the key.
  • the actual implementation of the power supply of the lock depends on the implementation, and the skilled person designing the system takes into account the location of the lock, availability of different power sources, the physical dimensions of the lock, the design of the interfaces of the lock and the key, etc.
  • the actuator 124 may be set to a locked state mechanically, but a detailed discussion thereon is not necessary to illuminate the present embodiments.
  • the bolt mechanism 114 can be moved by operating the lock mechanism (knob) 108, for example.
  • the actuator 124 may in response to the command from the authentication circuitry 120 mechanically move the bolt mechanism 114 so that the door may be opened without any specific action by the user.
  • the user only needs to insert the key into contact with the lock so that the connection between the lock and the key is established and the lock will be opened, provided that the user has access rights to the door.
  • the electromechanical key comprises an electronic circuitry 107 comprising a memory 130, a control circuitry 132, a rechargeable battery 136, and a communication circuitry 134.
  • a communication circuitry 134 may comprise analog and digital components enabling establishment of a radio connection according to any radio access technology listed above. In the following description, a Bluetooth radio access is described. It should be noted that other embodiments utilize other radio access schemes, and the structure and the operation of the communication circuitry 134 is configured according to the supported radio access scheme.
  • the control circuitry 132 controls the operation of the key by controlling the communication with the server and the cellular phone or wireless network and by controlling the transfer of access codes between the locks and the key.
  • the control circuitry 132 may also be configured to carry out other procedures, as will be described in greater detail.
  • the control circuitry 132 may be implemented by ASIC, micro controller, or another processor, depending on the required computational capacity, power consumption requirements, etc.
  • the memory 130 stores the access codes received from the processor as being linked to corresponding locks which each code is arranged to open.
  • the memory 130 may also store instructions of a computer program configuring the operation of the control circuitry 132 and/or communication circuitry 134 when they are software-defined processors.
  • the memory 130 may comprise a non-volatile memory part storing the computer program(s), and a volatile memory (e.g. RAM) for storing the access codes and temporary data needed in the operation of the control circuitry.
  • the access codes may be stored in the non-volatile memory so that they will not be erased in an uncontrolled manner.
  • the battery 136 is rechargeable, and the electromagnetic interface 140 functions also as an interface for charging the battery 136.
  • the interface 140 may comprise a separate wire for charging the battery or the same wiring used for transferring the access codes may be used for charging the battery.
  • a charging device may include a slot (or receptable) structurally similar to the interface 112 of the lock.
  • circuitry refers to all of the following: (a) hardware-only circuit implementations, such as implementations in only analog and/or digital circuitry, and (b) combinations of circuits and software (and/or firmware), such as (as applicable): (i) a combination of processor(s) or (ii) portions of processor(s)/software including digital signal processor(s), software, and memory(ies) that work together to cause an apparatus to perform various functions, and (c) circuits, such as a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation, even if the software or firmware is not physically present.
  • This definition of "circuitry” applies to all uses of this term in this application.
  • the term “circuitry” would also cover an implementation of merely a processor (or multiple processors) or a portion of a processor and its (or their) accompanying software and/or firmware.
  • FIG. 3 is a flow diagram illustrating a process for updating access rights and accessing locks according to an embodiment of the invention.
  • the process is carried out in the electromechanical key, but the following description describes also operations carried out by the server, the electromechanical lock, and the cellular phone / wireless network.
  • the process may be defined by a computer program comprising instructions configuring a processor of the electromechanical key to carry out the steps of the process, when the processor executes the computer program.
  • the process starts in block 300.
  • the key is paired with the cell phone carried by the user.
  • the pairing is carried out between the key and a wireless network realized by a network of base stations installed in the premises where the access control system is used.
  • the pairing may be a conventional Bluetooth pairing.
  • the Bluetooth specification version may be Bluetooth 2.1 + EDR (Enhanced Data Rate) class 1 but other specification versions may alternatively be used, depending on the required data transfer capacity, required operational range, and power consumption requirements.
  • Step 302 may be executed when the key is given to the user, and no pairing is necessarily needed again unless the user acquires a new cellular phone or a key.
  • the control circuitry of the key controls the communication circuitry to establish a communication connection with an ASP (Application Service Provider) server managing the access rights.
  • the communication connection may be a TCP/IP connection, and an IP address of the ASP server may be stored in the memory of the key or in the memory of the cellular phone. In the latter case, the IP address of the ASP server may be read in connection with the pairing in block 302.
  • the TCP/IP connection between the key and the ASP server is routed through the cellular phone or wireless network with which the pairing was performed in block 302.
  • the cellular phone may route the TCP/IP connection through the public cellular telecommunication system and through the Internet, and the wireless network may route the TCP/IP connection through the private network installed in the premises of the access control system.
  • the TCP/IP connection may be encrypted with a cryptographic protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security).
  • SSL Secure Sockets Layer
  • TLS Transport Layer Security
  • the connection in block 304 is established automatically without any user intervention.
  • the control circuitry of the key is configured to autonomously utilize the Bluetooth dial-up networking profile (or a corresponding profile of another radio access scheme) so as to configure the cellular phone / wireless network to establish the TCP/IP connection.
  • the cellular phone is used merely as a modem or a bridge for routing the connection, and such operation is invisible to the user in that the user does not have to operate the cellular phone after the initial, one-time pairing in block 302.
  • the establishment of the connection may include transmission of encrypted key identification data enabling the ASP server to identify the key (and the user of the key).
  • the control circuitry Upon establishment of the connection with the ASP server in block 304, the control circuitry transmits a request for up-to-date access codes to the ASP server in block 306.
  • the ASP server receives the request, checks a database storing the access rights for each key/user of the access control system in order to acquire access codes currently linked to the key (or the user of the key) requesting the access codes.
  • the database may store identifiers of all the locks in the access control system as being associated with an access code which opens the particular lock.
  • the ASP server Upon acquiring the access codes and corresponding door identifiers from the database, the ASP server transmits the access codes and corresponding door identifiers over the encrypted TCP/IP connection to the key.
  • the key receives the access codes and corresponding door identifiers and stores them in the memory. Then, the TCP/IP connection may be terminated or, alternatively, it may be maintained so that the establishment of a new connection in connection with the next access right update may be omitted.
  • the key may be configured to update the access rights, i.e. to request the ASP server to send up-to-date access codes, at predetermined intervals. In other words, blocks 304 and 306 may be carried out at the predetermined time intervals to ensure that the key has up-to-date access codes all the time.
  • the predetermined interval may be a one-minute interval, for example.
  • the key may omit block 304, and block 304 may be carried out when the key enters the premises of the access control system and the TCP/IP connection is newly created, or when the TCP/IP connection breaks down for some reason, e.g. a time out.
  • Block 310 is optionally executed, when the key is configured to retrieve up-to-date access codes every time a lock is being accessed.
  • Block 310 includes the retrieval of the up-to-date access codes from the ASP server, i.e. execution of block 306 and optionally block 304 (if the connection has not been maintained).
  • the embodiment including the execution of block 310 is advantageous when the access rights of the user has just been modified by adding new access rights to a given lock.
  • the user may simply try to access the lock, and the key retrieves the updated access codes automatically with no need to wait for the next periodic check.
  • the periodic retrieval of the access codes is omitted, and the key is configured to access the ASP server only in connection with an access event, e.g. when the user tries to access a lock of the access control system.
  • the key may identify the access event when a given lock, with which the electric connection is detected in block 308, by successfully retrieving an identifier of the lock through the electric connection, i.e. from the fact that the lock and the key are able to communicate with each other.
  • the control circuitry reads the lock's identifier received through the electromagnetic interface over the electric connection between the lock and the key. If the execution of block 310 is dependent on the correct reading of the lock's identifier, block 312 may be executed before block 310.
  • the control circuitry accesses the memory to check whether or not the memory includes an entry for the lock identifier read in block 312. If the memory includes the entry for the lock identifier, the control circuitry retrieves an access code linked to the lock identifier. In block 316, the control circuitry transfers the access code to the lock through the electromechanical interface over the electric connection between the lock and the key.
  • the authentication circuitry of the lock may be configured to transmit an acknowledgment message to the key over the electric connection so that the control circuitry of the key obtains information on the successful entry.
  • the authentication circuitry may also control the actuator to open the lock, as described above. If the memory of the key contains no entry for the lock identifier, the lock access procedure ends.
  • the control circuitry may also send an error message to the lock, and the lock may indicate an erroneous entry to the user by flashing a red light or by providing another visual or audiovisual indication that the access has been denied.
  • the control circuitry of the key may be configured to transmit a message indicating the failed access to the server.
  • the message may include the identifier of the lock so that the failed access is linked to the appropriate lock and optionally time information indicating the time when the entry was attempted.
  • the time may, however, be determined implicitly from the time when the message is transferred to the ASP server.
  • the ASP server may check whether or not the key had rights to access that door at the time the entry was made so as to verify whether the user has tried to access a lock which he/she has no rights to access or whether there has been an operational error in the lock, key, server, or in the communication between them.
  • the system may record operational failures so as to detect faulty components in the access control system, and the system may also record information that the user has tried to access a lock to which (s)he has no access rights.
  • the control circuitry of the key may be configured to transfer a message of a successful entry to a given lock to the ASP server for location tracking purposes.
  • a message may comprise an indication of the successful entry and an identifier of the lock which has been successfully opened.
  • the transfer of such a message may be triggered by the acknowledgment message received from the lock as a result of the successful entry.
  • the server may record the locks the user of the key has accessed successfully and times when the locks have been accessed so as to track the movement of the user in the premises of the access control system.
  • the server may store a layout of the premises of the access control system where physical locations of the electromechanical locks have been stored. When the server receives information on the lock a given key has accessed, it may map the key to a given location when the server knows the physical location of that lock.
  • the location tracking may also be used for tracking working time of the user when the access control system is installed in a working place.
  • the ASP server is further configured to count a time of presence of a given personal electronic device from access information received from the keys of the staff.
  • the location tracking may be used for monitoring and storing the working time of each member of the staff on the basis of the time duration the staff member is detected to have been in the premises of the area where the location tracking is carried out.
  • the start time is the time when the staff member accesses an entry/exit door of the premises for the first time, i.e. when the key of the staff member indicates entry through that door.
  • the end time is the time when the key indicates exit through the entry/exit door or another corresponding entry/exit door.
  • the working time may be stored in the user record on a daily basis.
  • the server may each day store a time when a given key is detected in the area and a time when the key is assumed to have left the area. From these stored times, a duration of the personal radio communication device in the area may be calculated by applying simple mathematics, and the thus obtained working hours per day may be stored in the user record.
  • the location tracking may be utilized for other purposes as well.
  • the user's cellular phone (or another communication device or devices) may be linked to the location tracking system and to the ASP server. This enables a given user to establish a voice connection to a selected place, instead of a selected phone number.
  • the user may establish a call which is routed to the ASP server, wherein the call establishment includes transfer of a message comprising an identifier of a location to which the caller wishes to give call.
  • the ASP server checks the location tracking records in order to find out another user closest to the desired location and, upon finding such a user, the ASP server routes the call connection to that user's cellular phone (or another communication device).
  • the location tracking is used for routing alarm messages to the nearest persons.
  • the key, cellular phone, or another device carried by the user may be used for transmitting an alarm message to the server.
  • the key may comprise an alarm button which, when pressed, configures the control circuitry to transmit the alarm message to the ASP server.
  • the alarm message is an indication that help is needed in the location where the user requesting for help resides.
  • the server checks the location tracking records in order to find out another user closest to the desired location and, upon finding such a user, the ASP server routes the alarm to that user's cellular phone (or another communication device) in connection with the location where the help is needed (the most recent location of the user/key requesting the help). This may be particularly useful in a hospital or other health care institutions where emergencies occur.
  • Other location tracking means for monitoring the location of the users in the premises are used in other embodiments.
  • the database of the ASP server stores key or user identifiers indicating the locks that each key or user is allowed to open.
  • a particular key may thus be configured to open a plurality of locks, rather than having a dedicated key for every lock.
  • the set of locks to which a certain key/user has access rights may be updated in real time simply by editing the database.
  • the ASP server may be triggered to transmit the updated access codes to the key immediately so that the updated access rights are put to use immediately.
  • the periodic update check and/or block 310 described above in connection with Figure 3 may even be omitted, although it is not necessary.
  • the key may still verify that it has appropriate access rights periodically or when a lock is being accessed.
  • the key Upon reception of the updated access codes from the server, the key modifies the stored access codes so as to make them up-to-date.
  • the transfer of the updated access codes and lock identifiers from the server to the key may include all the key identifiers and corresponding access codes to which access is granted every time the access rights update is carried out. If the update includes addition of one or more new access rights, only new access codes and lock identifiers may be sent to the key and no old access rights which have already been transferred need to be sent again. Similarly, if the update includes deletion of access rights, the ASP server may send a message indicating which access rights (access code and lock identifier) need to be deleted. This reduces the amount of data traffic, since transfer of redundant information is reduced.
  • the key may be configured to attempt reestablishment of the connection. If the reestablishment is not successful within a determined duration or number of attempts, the control circuitry of the key may be configured to irrevocably erase the access rights from the memory. The control circuitry may alternatively erase the access rights immediately upon losing TCP/IP connection with the server. As a consequence, the access codes will be deleted immediately if the user's key is stolen and the connection to the cellular phone or wireless network is lost or if the connection to the ASP server is otherwise lost. This improves the security of the system.
  • the whole operation for retrieving the access rights and communicating with the lock so as to enter the access code is carried out automatically without any user interaction.
  • the user only has to bring the counterpart interfaces provided in the electromechanical key and the lock into connection with one another, and then open the door, latch, or another element the lock protects.
  • the user convenience and speed of opening the lock is improved, as the complexity of the procedure is reduced.
  • the process or method described in Figure 3 may also be carried out in the form of a computer process defined by a computer program.
  • the computer program may be in source code form, object code form, or in some intermediate form, and it may be stored in some sort of carrier, which may be any entity or device capable of carrying the program.
  • Such carriers include a record medium, computer memory, read-only memory, electrical carrier signal, telecommunications signal, and software distribution package, for example.
  • the computer program may be executed in a single electronic digital processing unit or it may be distributed amongst a number of processing units.
  • the present invention is applicable to any access control system utilizing electromechanical locks.
  • the electromechanical locks require no connection with the server, and in some embodiment they do not even require batteries as the energy needed for the authentication and opening the lock is provided by the user with mechanical motion. This facilitates the installation of the system. Otherwise, the installation is very simple.
  • the database of the server is constructed to contain the access rights for the users/keys.
  • the keys are preconfigured to carry out the operations described above. When taken into use, a key may be paired with the user's cellular phone or the wireless network, and after the pairing the key automatically acquires the access rights. Depending on the radio access protocol the keys are configured to use, even the pairing may be omitted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
EP09180266.0A 2009-12-22 2009-12-22 Système de contrôle d'accès Active EP2348490B1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP09180266.0A EP2348490B1 (fr) 2009-12-22 2009-12-22 Système de contrôle d'accès

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP09180266.0A EP2348490B1 (fr) 2009-12-22 2009-12-22 Système de contrôle d'accès

Publications (2)

Publication Number Publication Date
EP2348490A1 true EP2348490A1 (fr) 2011-07-27
EP2348490B1 EP2348490B1 (fr) 2020-03-04

Family

ID=42149028

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09180266.0A Active EP2348490B1 (fr) 2009-12-22 2009-12-22 Système de contrôle d'accès

Country Status (1)

Country Link
EP (1) EP2348490B1 (fr)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104123769A (zh) * 2014-06-13 2014-10-29 厦门华数电力科技有限公司 一种安全智能锁的开锁、关锁控制方法
CN104167041A (zh) * 2014-09-11 2014-11-26 祁春富 基于智能手机使用的门禁系统及其控制方法
EP2819103A1 (fr) * 2013-06-25 2014-12-31 Evva Sicherheitstechnologie GmbH Procédé de contrôle d'accès
CN104282060A (zh) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 一种安全智能锁系统的开锁方法
CN104282061A (zh) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 一种安全智能锁系统及其开、关锁方法
CN104282062A (zh) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 基于安全智能锁系统的开锁和关锁方法
CN104504792A (zh) * 2014-12-17 2015-04-08 张家港保税区润桐电子技术研发有限公司 一种基于二维码的门禁系统
CN104517338A (zh) * 2015-01-20 2015-04-15 蹇晓梅 基于无线网络的远程门禁控制系统及其实现方法
CN104809795A (zh) * 2015-05-21 2015-07-29 河南传通电子科技有限公司 一种利用手机app与云平台及蓝牙智能钥匙控制开关锁的电路结构及其实现方法
CN104851168A (zh) * 2015-05-19 2015-08-19 上海思慧德安防设备有限公司 无电锁门禁系统
CN104881912A (zh) * 2015-05-20 2015-09-02 厦门城力机电设备有限公司 一种开门系统及开门方法
CN105069868A (zh) * 2015-07-21 2015-11-18 杭州晟元数据安全技术股份有限公司 一种基于手机动态安全二维码识别智能小区云系统
CN105118111A (zh) * 2015-07-15 2015-12-02 国网天津武清供电有限公司 一种外来人员施工登记系统及方法
CN105118131A (zh) * 2015-10-05 2015-12-02 李轩涛 互联网条码/二维码/身份证智能锁
CN105184935A (zh) * 2015-10-22 2015-12-23 深圳优方网络技术有限公司 一种可微信分享密码的蓝牙智能锁系统
EP2821970B1 (fr) 2013-07-05 2016-04-27 Assa Abloy Ab Dispositif de communication de commande d'accès, procédé, programme informatique et produit de programme informatique
WO2016092432A1 (fr) * 2014-12-10 2016-06-16 Viadact N.V. Système de gestion de clés
CN105913527A (zh) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 基于小区云的访客二维码智能验证系统及验证方法
CN106204853A (zh) * 2016-07-28 2016-12-07 乐视控股(北京)有限公司 服务器、门禁设备管理中心、移动终端、控制门禁的方法及系统
CN106447843A (zh) * 2016-08-27 2017-02-22 桂林信通科技有限公司 一种小区门禁安防方法和系统
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
CN108154580A (zh) * 2017-12-22 2018-06-12 深圳供电局有限公司 一种智能安全锁及使用方法
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
CN108877006A (zh) * 2018-06-29 2018-11-23 深圳春沐源控股有限公司 一种门禁管理方法、系统及相关设备
US10192380B2 (en) 2013-07-05 2019-01-29 Assa Abloy Ab Key device and associated method, computer program and computer program product
CN110706381A (zh) * 2019-09-30 2020-01-17 深圳市纳泽科技有限公司 一种自动检测房屋并自动冻结门锁密码的公寓管理系统
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
CN113034759A (zh) * 2021-03-10 2021-06-25 鄂尔多斯市嵘泰电力工程建设有限公司 一种蓝牙门禁系统及其门禁方法
CN113034734A (zh) * 2019-12-06 2021-06-25 中国石油天然气股份有限公司 电子钥匙的授权方法、存储介质以及计算机设备
US20210390808A1 (en) * 2018-10-31 2021-12-16 Swedlock Ab System to provide access to premises that comprise entrances locked by means of electromechanical key locks
US11339589B2 (en) 2018-04-13 2022-05-24 Dormakaba Usa Inc. Electro-mechanical lock core
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
SE2151168A1 (en) * 2021-09-24 2023-03-25 Assa Abloy Ab Access control device
US11804084B2 (en) 2013-09-10 2023-10-31 Lockfob, Llc Contactless electronic access control system
US11913254B2 (en) 2017-09-08 2024-02-27 dormakaba USA, Inc. Electro-mechanical lock core
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030117260A1 (en) * 2001-12-22 2003-06-26 Koninklijke Philips Electronics N.V. Access control system
EP1324276A2 (fr) * 2001-12-28 2003-07-02 Matsushita Electric Works, Ltd. Clef électronique, serrure électronique, système électronique de sécurité et serveur de gestion de clefs
EP1336937A1 (fr) * 2002-02-13 2003-08-20 Swisscom AG Système de contrôle d'accès, methode de contrôle d'accès et dispositifs pour la mettre en oeuvre

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2236973T3 (es) * 1999-01-28 2005-07-16 International Business Machines Corporation Metodo y sistema de control de acceso electronico.
DE50214332D1 (de) * 2001-12-21 2010-05-20 Kaba Ag Verfahren zur Regelung des Zutrittsregimes zu einem Objekt
US7167094B2 (en) * 2003-01-31 2007-01-23 Secure Care Products, Inc. Systems and methods for providing secure environments
WO2004092514A1 (fr) * 2003-04-16 2004-10-28 Tcam Technology Pte. Ltd. Cle et serrure electroniques destinees a la gestion d'acces
ES2253971B1 (es) * 2004-02-05 2007-07-16 Salto Systems, S.L. Sistema de control de acceso.
AT506344B1 (de) * 2008-01-30 2015-06-15 Evva Sicherheitstechnologie Verfahren und vorrichtung zur steuerung der zutrittskontrolle

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030117260A1 (en) * 2001-12-22 2003-06-26 Koninklijke Philips Electronics N.V. Access control system
EP1324276A2 (fr) * 2001-12-28 2003-07-02 Matsushita Electric Works, Ltd. Clef électronique, serrure électronique, système électronique de sécurité et serveur de gestion de clefs
EP1336937A1 (fr) * 2002-02-13 2003-08-20 Swisscom AG Système de contrôle d'accès, methode de contrôle d'accès et dispositifs pour la mettre en oeuvre

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2819103A1 (fr) * 2013-06-25 2014-12-31 Evva Sicherheitstechnologie GmbH Procédé de contrôle d'accès
US10282930B2 (en) 2013-07-05 2019-05-07 Assa Abloy Ab Access control communication device, method, computer program and computer program product
US10192380B2 (en) 2013-07-05 2019-01-29 Assa Abloy Ab Key device and associated method, computer program and computer program product
EP2821970B1 (fr) 2013-07-05 2016-04-27 Assa Abloy Ab Dispositif de communication de commande d'accès, procédé, programme informatique et produit de programme informatique
US11804084B2 (en) 2013-09-10 2023-10-31 Lockfob, Llc Contactless electronic access control system
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
US10423136B2 (en) 2014-04-07 2019-09-24 Videx, Inc. Distribution of access control information based on movement of an electronic key
US10643414B2 (en) 2014-04-07 2020-05-05 Videx, Inc. Electronic key device utilizing user input to facilitate access by authorized persons
US11423723B2 (en) 2014-04-07 2022-08-23 Videx, Inc. Enhanced access control based on key proximity
CN104123769A (zh) * 2014-06-13 2014-10-29 厦门华数电力科技有限公司 一种安全智能锁的开锁、关锁控制方法
CN104123769B (zh) * 2014-06-13 2016-01-13 厦门华数电力科技有限公司 一种安全智能锁的开锁、关锁控制方法
CN104282062B (zh) * 2014-08-21 2017-01-18 厦门华数电力科技有限公司 基于安全智能锁系统的开锁和关锁方法
CN104282062A (zh) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 基于安全智能锁系统的开锁和关锁方法
CN104282060A (zh) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 一种安全智能锁系统的开锁方法
CN104282061A (zh) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 一种安全智能锁系统及其开、关锁方法
CN104282061B (zh) * 2014-08-21 2017-05-24 厦门华数电力科技有限公司 一种安全智能锁系统的开锁方法
CN104282060B (zh) * 2014-08-21 2016-10-19 厦门华数电力科技有限公司 一种安全智能锁系统的开锁方法
CN104167041A (zh) * 2014-09-11 2014-11-26 祁春富 基于智能手机使用的门禁系统及其控制方法
WO2016092432A1 (fr) * 2014-12-10 2016-06-16 Viadact N.V. Système de gestion de clés
CN104504792A (zh) * 2014-12-17 2015-04-08 张家港保税区润桐电子技术研发有限公司 一种基于二维码的门禁系统
CN104517338A (zh) * 2015-01-20 2015-04-15 蹇晓梅 基于无线网络的远程门禁控制系统及其实现方法
CN104851168A (zh) * 2015-05-19 2015-08-19 上海思慧德安防设备有限公司 无电锁门禁系统
CN104881912A (zh) * 2015-05-20 2015-09-02 厦门城力机电设备有限公司 一种开门系统及开门方法
CN104809795A (zh) * 2015-05-21 2015-07-29 河南传通电子科技有限公司 一种利用手机app与云平台及蓝牙智能钥匙控制开关锁的电路结构及其实现方法
CN105118111A (zh) * 2015-07-15 2015-12-02 国网天津武清供电有限公司 一种外来人员施工登记系统及方法
CN105069868B (zh) * 2015-07-21 2018-04-20 杭州晟元数据安全技术股份有限公司 一种基于手机动态安全二维码识别智能小区云系统
CN105069868A (zh) * 2015-07-21 2015-11-18 杭州晟元数据安全技术股份有限公司 一种基于手机动态安全二维码识别智能小区云系统
CN105118131A (zh) * 2015-10-05 2015-12-02 李轩涛 互联网条码/二维码/身份证智能锁
CN105184935A (zh) * 2015-10-22 2015-12-23 深圳优方网络技术有限公司 一种可微信分享密码的蓝牙智能锁系统
CN105913527A (zh) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 基于小区云的访客二维码智能验证系统及验证方法
CN106204853A (zh) * 2016-07-28 2016-12-07 乐视控股(北京)有限公司 服务器、门禁设备管理中心、移动终端、控制门禁的方法及系统
CN106447843A (zh) * 2016-08-27 2017-02-22 桂林信通科技有限公司 一种小区门禁安防方法和系统
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core
US11913254B2 (en) 2017-09-08 2024-02-27 dormakaba USA, Inc. Electro-mechanical lock core
CN108154580A (zh) * 2017-12-22 2018-06-12 深圳供电局有限公司 一种智能安全锁及使用方法
US11339589B2 (en) 2018-04-13 2022-05-24 Dormakaba Usa Inc. Electro-mechanical lock core
US11447980B2 (en) 2018-04-13 2022-09-20 Dormakaba Usa Inc. Puller tool
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
WO2020000894A1 (fr) * 2018-06-29 2020-01-02 深圳春沐源控股有限公司 Procédé et système de gestion de contrôle d'accès ainsi que dispositifs associés
CN108877006A (zh) * 2018-06-29 2018-11-23 深圳春沐源控股有限公司 一种门禁管理方法、系统及相关设备
EP3874474A4 (fr) * 2018-10-31 2022-08-17 Swedlock AB Système pour fournir un accès à des locaux qui comprennent des entrées verrouillées au moyen de serrures à clé électromécaniques
US11893845B2 (en) 2018-10-31 2024-02-06 Swedlock Ab System to provide access to premises that comprise entrances locked by means of electromechanical key locks
US20210390808A1 (en) * 2018-10-31 2021-12-16 Swedlock Ab System to provide access to premises that comprise entrances locked by means of electromechanical key locks
US11580801B2 (en) 2019-09-06 2023-02-14 Videx, Inc. Access control system with dynamic access permission processing
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
CN110706381A (zh) * 2019-09-30 2020-01-17 深圳市纳泽科技有限公司 一种自动检测房屋并自动冻结门锁密码的公寓管理系统
CN113034734A (zh) * 2019-12-06 2021-06-25 中国石油天然气股份有限公司 电子钥匙的授权方法、存储介质以及计算机设备
CN113034734B (zh) * 2019-12-06 2023-02-10 中国石油天然气股份有限公司 电子钥匙的授权方法、存储介质以及计算机设备
CN113034759A (zh) * 2021-03-10 2021-06-25 鄂尔多斯市嵘泰电力工程建设有限公司 一种蓝牙门禁系统及其门禁方法
SE2151168A1 (en) * 2021-09-24 2023-03-25 Assa Abloy Ab Access control device
SE545778C2 (en) * 2021-09-24 2024-01-09 Assa Abloy Ab Electronic lock comprising a first credential interface and a second credential interface

Also Published As

Publication number Publication date
EP2348490B1 (fr) 2020-03-04

Similar Documents

Publication Publication Date Title
EP2348490B1 (fr) Système de contrôle d'accès
AU2018229480B2 (en) Access control communication device, method, computer program and computer program product
US11799671B2 (en) Secure locking of physical resources using asymmetric cryptography
US8604903B2 (en) Electronic locking system with wireless update and cascade lock control
ES2713424T3 (es) Sistemas y métodos para la gestión de acceso a cerraduras utilizando señales inalámbricas
US20120213362A1 (en) Distribution Of Lock Access Data For Electromechanical Locks In An Access Control System
CN107742339B (zh) 一种基于平台的无源电子锁具的管理方法
US11189117B2 (en) Method and system for controlling a smart lock
CN103227776A (zh) 配置方法、配置设备、计算机程序产品和控制系统
CN106600757A (zh) 一种基于智能终端的无线锁具控制系统及方法
CN100409697C (zh) 使用多个验证服务器的无线设备网络的管理方法及其设备
CN104504796A (zh) 一种基于无线网络的机房智能门禁开启方法及开启系统
JP2013185346A (ja) 出入管理システム
US11574513B2 (en) Electronic access control
KR102301478B1 (ko) 스마트 시건 장치, 그 장치를 포함한 시건 관리 시스템 및 그 시스템을 이용한 시건 관리 방법
CN110570557A (zh) 基于无线通讯网络的门禁系统
KR100894421B1 (ko) 지문 인증 단말기와 이를 포함하는 출입 통제 시스템 및사용자 인증 방법
CN210864848U (zh) 一种电箱的蓝牙智能锁装置及系统
WO2024002952A1 (fr) Procédé et dispositifs de communication entre un dispositif de l'internet des objets et un système informatique distant
JP5269408B2 (ja) 盗用防止装置
US11210386B2 (en) Technique for managing a right of access to a service for a communicating device
KR20210053254A (ko) 전자 키 관리 시스템 및 서버
CN111599070A (zh) 一种复合组网门锁控制方法
CN117774746A (zh) 无感鉴权充电方法、充电桩及存储介质
KR20230086887A (ko) 스마트 다중 보안 도어락 시스템

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

AX Request for extension of the european patent

Extension state: AL BA RS

17P Request for examination filed

Effective date: 20120125

17Q First examination report despatched

Effective date: 20160309

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

TPAC Observations filed by third parties

Free format text: ORIGINAL CODE: EPIDOSNTIPA

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20191011

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ILOQ OY

Owner name: 9SOLUTIONS OY

RIN1 Information on inventor provided before grant (corrected)

Inventor name: HERRALA, SAMI

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1241261

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200315

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602009061334

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: FI

Ref legal event code: FGE

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200604

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200604

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200605

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200729

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200704

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1241261

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200304

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602009061334

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

26N No opposition filed

Effective date: 20201207

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20201231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201222

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201222

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201231

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200304

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201231

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231215

Year of fee payment: 15

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20231218

Year of fee payment: 15

Ref country code: FI

Payment date: 20231214

Year of fee payment: 15

Ref country code: DE

Payment date: 20231218

Year of fee payment: 15