EP2355066B1 - Verfahren zum Betreiben eines Steuergeräts und Mastereinheit damit als Zugangsvorrichtung - Google Patents

Verfahren zum Betreiben eines Steuergeräts und Mastereinheit damit als Zugangsvorrichtung Download PDF

Info

Publication number
EP2355066B1
EP2355066B1 EP11000429.8A EP11000429A EP2355066B1 EP 2355066 B1 EP2355066 B1 EP 2355066B1 EP 11000429 A EP11000429 A EP 11000429A EP 2355066 B1 EP2355066 B1 EP 2355066B1
Authority
EP
European Patent Office
Prior art keywords
external control
master unit
access
control device
ecdn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP11000429.8A
Other languages
English (en)
French (fr)
Other versions
EP2355066A3 (de
EP2355066A2 (de
Inventor
Martin Sandal Nielsen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VKR Holding AS
Original Assignee
VKR Holding AS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VKR Holding AS filed Critical VKR Holding AS
Publication of EP2355066A2 publication Critical patent/EP2355066A2/de
Publication of EP2355066A3 publication Critical patent/EP2355066A3/de
Application granted granted Critical
Publication of EP2355066B1 publication Critical patent/EP2355066B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link

Definitions

  • the invention relates to a method for controlling a control system according to claim 1.
  • the international patent application WO 03/028300 A1 relates to a remote control system using a mobile communication terminal.
  • a user of the mobile communication terminal executes a program in the mobile communication terminal to communicate wirelessly with a controller.
  • the mobile communication terminal hereby can transmit commands, e.g. state information of a controlled apparatus to remotely controlled apparatuses.
  • a security code is added to the transmitted signal, and when the controller receives a contact request from the mobile communication terminal, the contact request is authenticated by the controller.
  • the communication between the mobile communication terminal and the controller could be performed by a short message service (SMS), WAP or the like.
  • SMS short message service
  • WAP wireless personal area network
  • a problem with this approach is that no authentication of the controller is performed by the controlled apparatus when it receives a signal, which makes the communication less safe. Further, the controlled apparatus is controlled dependently of the controller.
  • US 2005/0216738 discloses a system for transmitting AV data signals by radio, where mutual authentication of opposite parties between radio transmission devices performing radio transmission is provided.
  • US 2006/174105 discloses a device authentication method in a home network system. The system comprises a control device, a home server and a plurality of slaves.
  • the invention relates to a method of operating a controller configured to control an independent control system according to claim 1, where the independent control system comprises at least two units wherein at least one of said units is designed to operate as a master unit and wherein at least one of said units is designed to operate as a slave unit, where said at least one master unit and said at least one slave unit comprise one and the same code key, said code key being unique to said independent control system, and where said at least one slave unit comprises an address being unique to said at least one slave unit and being registered by said at least one master unit, wherein at least one of said at least one master unit further is configured as an access device, which can communicate with one or more external control units, which are external to said independent control system,
  • the independent control system is a safe control system, among other things due to that master units and slave units of the independent control system comprise the one and same code key, and that slave units comprise an address being unique to the slave units. Furthermore, since slave units of the independent control system are identified by the master unit configured as an access device, so that the master unit knows the address unique to each slave unit, it can be achieved that the unique address of the slave unit is kept internal in the independent control system, and is not known outside the independent control system. Therefore it is possible for master units configured as an access devices in a safe way to control the access to the slave units from the external control devices. This is advantageous, since the safety of the independent control system is not jeopardised by the use of an external control device.
  • control devices By utilizing external control devices as explained above, it is likewise possible to add control devices to the independent control system, different from the master units of the independent control unit, whereby a more dynamic and user friendly operation of the control system can be achieved without jeopardising the safety of the control system.
  • control commands may comprise a control command to request that a slave unit initiates an action, e.g. to open and close a window, operate a shutter, a blind or the like, it may comprise a status request to receive a status update from a slave unit and/or a master unit, for example to access data from sensors such as rain sensors, position sensors, temperature sensors, anemometers or the like.
  • identification is understood that identification of said at least one external control device may take place by an address and/or credentials, but identification may also be performed based on type of external device or the communication link or protocol used with the external device or parameters of the protocol used or combinations hereof.
  • the identification may likewise comprise that the external control unit transmits an identification code, e.g. an identification code unique to the external control device, to the master unit configured as an access device.
  • an identification code may in an aspect of the invention be added to the external control device by means of a pairing process between the external control device and a master unit configured as an access device.
  • the pairing process may comprise a gathering of information from the external control device by means of a near field network such as blue tooth, zigbee or the like, and may comprise that the master unit configured as an access device transmits a code to the external control unit which is stored in the external control unit. This code should then be transmitted by the external control device (e.g. by incorporating the code in the control signal) and may be utilized for identification and/or authentication of the external control device.
  • a near field network such as blue tooth, zigbee or the like
  • the term "authentication” shall be understood as that a master unit configured as an access device processes the received identification information and/or other data received from the external control device, to determine if the external control device is registered as an external control device allowed to transmit control commands to a slave unit of the independent control system and/or request slave unit status and/or master unit status.
  • the authentication preferably at least comprises processing of the transmitted identification of the external control device.
  • independent control system shall be understood as that the control system can operate completely independent of control devices external to the independent control system (e.g the external control devices) by means of only at least one master unit and at least one slave unit.
  • the term "dependently operateable” shall be understood as that the at least one external control device can only access slave units of the independent control system via a master unit configured as an access device.
  • the external control device(s) preferably comprise identification means for identifying the at least one external control device(s).
  • an authentication request signal to said at least one master unit configured as an access device is generated by said at least one slave unit in response to said coded control signals, whereby said at least one master unit configured as an access device generates and transmits a response signal to said authentication request from said at least one slave unit, and whereby said at least one slave unit processes said coded control signals if said response signal from said at least one master unit configured as an access device is verified by said at least one slave unit.
  • said authentication request signal to said at least one master unit from said at least one slave unit is generated at least partly by means of said code key.
  • the at least one master unit configured as an access device when said at least one master unit configured as an access device receives said control signals from said at least one external control device, the at least one master unit configured as an access device transmit at least one acknowledgement signal to said at least one external control device.
  • the acknowledgement signal may comprise an acknowledge regarding that the command signal is received and/or that the command signal (and/or control command of the command signal) is or is not authenticated, but the acknowledgement signal may also comprise other information relevant for the user/operator of the external control unit.
  • the communication in said independent control system may operate by means of communication means of a different type than at least one type of communication means of said at least one external control device utilized for communication between said master unit configured as an access device and said at least one external control device.
  • communication means means facilitating communication on the basis of a communication protocol and/or message format allowing systems to communicate over a transmission medium.
  • Such communication means may e.g. be e.g. Bluetooth, wibree, 3G, Turbo-3G, zigbee, LAN, WLAN, wireless USB®, SMS, instant messenger, common fixed-line phone network, cell phone networks, WAP or any other suitable means.
  • external control devices may access the independent control system in a very advantageous way, since external control devices may operate with different communication means than the independent control system
  • said master unit configured as an access device may facilitate communication between units of the independent control system, and at least one of a plurality of different communication means.
  • the master unit configured as an access device may support one or more different external control devices operating with different communication means.
  • the master unit configured as an access device thereby facilitates translation between the communication means utilized internal in the independent control system, and the external control unit, thereby enhancing the user friendliness of the control system.
  • communication to said at least one slave unit distinguish between critical and non-critical coded control signals from said at least one master unit and/or master unit configured as an access device.
  • the at least one slave unit may change operation form / execute a command directly, without communication with the at least one master unit, thereby minimising communication in the independent control system.
  • a non-critical control signal is preferably a signal which does not compromise the safety of the independent control system.
  • a non-critical control signal may e.g. be a signal for operating a roof window high above ground, operating a shutter, a blind, light means or the like.
  • a critical control signal is preferably a signal which may, at least under certain circumstances, compromise the safety of the independent control system.
  • a critical control signal may e.g. be a signal for operating a window, a gate or door, an alarm, a window or the like.
  • a non-critical control signal is processed by said at least one slave unit without authentication of said at least one master unit.
  • said processing comprises an evaluation of the control signal received from an external control device (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) to determine if the control command of the control signal should be accepted.
  • control unit configured as an access device processes data such as e.g. data received from the external control device (e.g. ID, control ommand, communication means utilized by the external control device for transmitting the signal etc.), data regarding relevant slave unit(s) (e.g. to a slave unit to which a control command is intended), different safety measures such as access security parameters (explained in more details later on) of slave units, hierarchy levels of external control devices (explained in more details below) and/or the like, to determine if the control command should be allowed.
  • data received from the external control device e.g. ID, control ommand, communication means utilized by the external control device for transmitting the signal etc.
  • relevant slave unit(s) e.g. to a slave unit to which a control command is intended
  • different safety measures such as access security parameters (explained in more details later on) of slave units, hierarchy levels of external control devices (explained in more details below) and/or the like, to determine if the control command should be
  • the external control device may (beyond transmitting control commands and identification) also transmit other data relevant to the evaluation of the control signal and/or external control device.
  • data may e.g. be user specific data (especially if more users with different access allowances may operate the same external control device e.g. by utilizing different user identification or user profiles), data regarding the geographical location of the external control command at the time of transmitting the command signal, time of transmittance of the command signal and any other data which may be relevant to the authentication of the control signal and/or external control device.
  • communication to at least one of said at least one slave units of the independent control system is associated with at least one access security parameter.
  • the term "access security parameter” shall be understood a parameter or a group of parameters which is/are associated to a slave unit of the independent control system and which defines security demands which has to be complied with to allow operation/access to the slave unit.
  • the access security parameter may e.g. be a security flag in a slave unit, and/or a security flag in another master unit.
  • the access security parameter is preferably a security flag stored in a master unit configured as an access device, for example in an access security parameter table.
  • the access security parameter may change safety level over time, and in such a case, the master unit configured as an access device is updated over time, at least if the status of the access security parameter in stored in the master unit configured as an access device.
  • the said at least one access security parameter is selected from a group of access security parameters comprising at least two access security parameters.
  • the access control parameter group may define an access security parameter hierarchy so that by choosing an access control parameter, the safety level of the slave unit required to allow access to/operation of the slave unit may easily be defined. Furthermore, it may ease the division of a group of slave units in the independent control system into a group of slave units with different safety levels.
  • the said at least one access security parameter is dependent of a time parameter.
  • the slave unit and/or master unit configured as an access device at least in this embodiment comprises a clock/time function to be able to register the time of receiving a control signal.
  • the external control device may transmit the time of transmittance of the control signal, as a part of the control signal.
  • the dependence of a time parameter may also comprise that the time parameter may define one or more time limits used for defining different security levels for the same slave unit.
  • the dependence of a time parameter may comprise that the type of access security parameter is change over time, e.g. by choosing between different access security parameters in the said group of access security parameters.
  • said at least one access security parameter is associated with demands to the geographical location of one or more of said external control devices.
  • the independent control system may therefore for example ensure that safety critical control commands and/or control demands which is dedicated to a slave unit assigned a certain access security parameter has to be transmitted by means of a near field network allowing only close range communication.
  • the near field network facilitates communication between the master unit configured as an access device and the external control unit only within a limited range, and may be e.g. Bluetooth, Zigbee or the like.
  • an automatic safety control is established in that at least critical functions of the independent control system in at least some situations are not available/allowed by utilizing certain communication means such as GPRS, WLAN, 3G or the like, which facilitates communication over a longer range.
  • certain communication means such as GPRS, WLAN, 3G or the like, which facilitates communication over a longer range.
  • the independent control system, and the external control unit, or the like are not available/allowed by utilizing certain communication means such as GPRS, WLAN, 3G or the like, which facilitates communication over a longer range.
  • At least one of said at least one external control device is assigned at least one hierarchy level selected from a plurality of hierarchy levels.
  • the evaluation comprises processing of said hierarchy level assigned to an external control device and said access security parameter assigned to a slave unit to determine if a control signal should be accepted or denied.
  • said control signals from the at least one external control device is evaluated by said at least one master unit configured as an access device on the basis said at least one hierarchy level assigned to said at least one external control device.
  • an advantageous aspect of the invention is achieved, since it hereby is possible to assign an external control, device a different safety level. This e.g. facilitates that different users and/or external control devices may gain various access to different functions of the independent control system. Furthermore, safety of the control system may be enhanced.
  • control signals from said at least one external control device may advantageously be evaluated on the basis of geographical placement of said at least one external control device, user information of the user operating said at least one external control device, time and/or date, distance between the said at least one master unit configured as an access device and said at least one external control device, and/or the utilized type of communication means.
  • the control command may be accepted.
  • the external control device may in this example for example be a laptop communicating wirelessly with the master unit configured as an access device by means of e.g. Bluetooth.
  • the user may as one example be a parent logged onto a user interface (for example a user interface as explained later on) for control of the independent control system, and when the master unit configured as an access device recognizes the logged in parent and that a near field network is utilized, a safety critical control command may be accepted even though it is transmitted from an external control unit and not a master unit of the independent control system.
  • said master unit configured as an access device imposes a safety limit to a control command of the said received control signal.
  • the safety limit may facilitate that in some safety critical situations, a control command is limited.
  • an external control device transmitting a control signal to open a window to e.g. 80% of its total opening range may be imposed said safety limit so that the window is only allowed to open to e.g. 5% or 10% of its total opening range. Thereby, the window is opened, and unauthorised persons are not able to enter through the window.
  • the safety limit is preferably imposed during the above mentioned evaluation, but it may also be imposed before or after the evaluation.
  • an user interface is communicated to said at least one external control device, and said user interface is operated by a user to access functions of the independent control system.
  • the user interface may for example be implemented in a platform-independent object-oriented programming language such as e.g. a JAVA. This may e.g. facilitate cross-platform (also known as multi platform) implementation of the user interface.
  • a web browser e.g. in a way so that the user may accesses a homepage and enter a user login (e.g. also utilizing a digital signature) to gain access to control of the control system.
  • PC's, laptops, handheld wireless devices such as mobile phones, PDAs, GPS, MP3 players or the like for accessing functions of the independent control system.
  • the at least one external control device accesses aliases to the at least one slave unit of the independent control system.
  • said at least one external control device is updated with the status of said at least one slave unit of the independent control system continuously, periodically, as a response to a slave status request signal from an external control device which could be generated automatically or manually by a user of said external control device or any combination thereof.
  • a user of an external control device retrieve status of the slave units of the slave units of the independent control system.
  • This facilitates that the user may be updated with the status of the units of the control system, e.g. to see which windows that are open or closed, if it rains at the building which comprises the independent control system (if one of the slave unit is a rain sensor), the temperature (if one of the slave unit is a temperature sensor), to see status of shutters and/or blinds, or the like.
  • the before mentioned at least one hierarchy level may be selected based on the type of the communication link used.
  • the invention may furthermore relate to a unit being a master unit configured as an access device, said master unit configured as an access device being a part of an independent control system comprising at least one slave unit,
  • Such a unit being a master unit configured as an access device is advantageous in that it facilitates safe communication between external control devices and units of the independent control system.
  • the above mentioned unit being a master unit configured as an access device is configured to operate according to any of the claims 1-15.
  • the above mentioned unit being a master unit configured as an access device may be configured to be retrofitted into an existing independent control system to allow access to said at least one slave unit by means of said at least one external control device.
  • the existing independent control system is capable of being updated with newer and more modern management facilities.
  • the invention may also relate to use of the method according any of claims 1- 15 as well as according to other aspects described in this document in a building automation system such as a home automation system.
  • the invention may relate to use of the method according any of claims 1- 15 as well as according to other aspects described in this document for operating at least one window, blind, shutter, door, gate, awning, curtain or light source of a building and/or the premises of a building.
  • Fig. 1 shows a general overview of a control system 1 according to an embodiment of the invention.
  • the system 1 comprises an independent control system 3, and at least one external control device ECD1-ECDn.
  • the independent control system 3 comprises a plurality of units 2, 4, 6, 8 (U1 - Un) comprising or linked to for example drive units for various devices 10, 12, 14, 16. These devices may for example be activators of various types and used in a wide variety of applications.
  • the units 2, 4, 6, 8 may also or instead comprise or be linked to assorted apparatuses, sensor devices, indicating devices, controllers etc. that may need to receive information, control signals etc. at certain points of time.
  • Examples of the devices 10, 12, 14, 16 may be means such as actuators, motors or the like for controlling windows, blind, shutters, doors, gates, awnings, curtains, light sources of a building, it may be rain sensors, anemometers, temperature sensors or the like.
  • the independent control system is a building automation system such as a home automation system.
  • a building automation system/home automation system may also be known as domotics.
  • a common feature of the units 2, 4, 6, 8 is that it is necessary or advantageous to be able to transmit some sort of information signal to the units, e.g. a control command, a status request or the like. Furthermore, it may be necessary or preferred to be able to receive information or signals from the units, e.g. confirmation signals, acknowledgement signals, measurement signals, status signals etc.
  • all units 2, 4, 6, 8 are equipped with receiving means for radio frequency signals, e.g. including antenna means 18, 20, 22, 24.
  • Each unit comprises e.g. one or more motor drive units or control units and is connected to a driven or controlled member 10, 12, 14, 16. It will be understood that the means driven by, controlled by etc. the unit may be integrated with the unit. It will further be understood that a system may comprise one or more units 2, 4, 6, 8 as illustrated and that, when more than one unit is involved, these may be similar or dissimilar and may control one or more similar or different devices 10, 12, 14, 16.
  • the units 2, 4, 6, 8 may also be referred to as controllable units or slave units in the following.
  • the independent control system 3 in fig. 1 further comprises a remote control unit (C1) 26 designed for transmission of signals by means of radio frequency transmission means, e.g. including antenna means 28.
  • This control unit 26 may be used for transmitting control signals or other types of signals to one or more of the units U1 - Un in the independent control system 1, e.g. by request from a user accessing buttons, touch screens or the like of the remote control unit (C1) 26.
  • the independent system 3 may likewise comprise at least one additional control unit (C2, Cn) 30, 34 similar to the first remote control, e.g. designed for transmission of signals by means of radio frequency transmission means, e.g. including antenna means 32, 36 or dissimilar to the first remote control, e.g. designed for transmission by other means such as wired means, infra red transmission means etc (not illustrated in fig. 1 ).
  • additional control unit (C2, Cn) 30, 34 similar to the first remote control, e.g. designed for transmission of signals by means of radio frequency transmission means, e.g. including antenna means 32, 36 or dissimilar to the first remote control, e.g. designed for transmission by other means such as wired means, infra red transmission means etc (not illustrated in fig. 1 ).
  • the slave units 2, 4, 6, 8 may instead of comprising receiving means for radio frequency signals be connected to other units of the system by means of one or more wires such as electrical wire, a bus system, optical wires or other any other wired communication means.
  • wires such as electrical wire, a bus system, optical wires or other any other wired communication means.
  • combinations receiving means for radio frequency signals and wires as mentioned above may be advantageous.
  • infrared receiving means may in some aspects of the invention also be relevant.
  • the remote controls C1 - Cn will also be referred to as controllers or master units in the following.
  • the master units 26, 30, 34 (C1-Cn) and slave units may be continuously powered, e.g. by 230 Volt, powered by batteries, solar power, kinetic energy, a combination of different power supply technologies known to a person skilled in the art or any other suitable means.
  • An external control device ECD1-ECDn may e.g. be remote controls different from the remote controls of the independent system, common devices such as PDAs, cell phones, laptops, stationary PCs, pocket PCs, plug-in devices for PCs or laptops, or the like.
  • An external control device ECD1-ECDn may access a slave unit U1-Un of the independent control system via at least one master unit 26, 30, 34 of the independent control system 3 which further is configured as an access device.
  • the master unit 30 (C2) is further configured as an access device, and comprises an access control part 38 which facilitates communication and preferably also translation between the at least one external control device ECD1-ECDn and the independent control system 3.
  • the slave units U1-Un may hereby be dependently operated by the at least one external control device ECD1-ECDn by means of the master unit configured as an access device.
  • the slave units of the independent control system are furthermore independently operateable by the master units C1-Cn of the independent system 3, and the master units C1-Cn can hereby access and control the slave units U1-Un independently of the external slave units ECD1-ECDn.
  • master units configured as access devices besides facilitating communication and translation between the independent control system 3 and external control devices ECD1-ECDn may comprise all the functions of a master unit 26, 30, 34 as mentioned above.
  • a master unit configured as an access device may also be referred to as only access master unit.
  • a plurality of master units C1-Cn are configured as access devices, and a plurality of external control devices ECD1-ECDn can access the independent control system 3 by means of any of these access master units.
  • the access master unit(s) may be hierarchically divided, e.g. by numbers, addresses, codes or the like, to facilitate that only one master units configured as an access device is accessed at a time by external control devices ECD1-ECDn, to minimize redundancy, and the like.
  • ECD1-ECDn may be assigned different access master units, access master unit(s) may communicate internally to control the communication with external control devices ECD1-ECDn or the like.
  • an external control device ECD1-ECDn may be assigned to an access master unit randomly, or the external control device may be assigned to a preselected access master unit.
  • a user interface may be applied to an existing user interface of an external control device(s) ECD1-ECDn.
  • This additional user interface preferably comprises all means necessary for the user of the control device to gain access to the independent control system 3 and its functions.
  • the additional user interface preferably utilise one or more already existing communication means of the external control device EDC1-EDCn, and may hereby communicate with at least one master unit configured as an access device 30 (C2) of the independent control system 3.
  • the external control devices ECD1-ECDn may communicate by means of communication means different from the communication means of the independent control system 3, and an access master unit of the independent system 3 may therefore comprise means for translating communication between the independent control system 3 and the at least one external control device (ECD1-ECDn).
  • Communication means utilized by the at least one external control device ECD1-ECDn, and supported by the access master unit may be both wired and wireless communication methods. Examples of such communication means could be e.g. Bluetooth, wibree, 3G, Turbo-3G, zigbee, LAN, WLAN, wireless USB®, SMS, instant messenger, common fixed-line phone network, cell phone networks, WAP or any other suitable means.
  • an access master unit may communicate with units of the independent control system 3 and facilitate communication by means of a plurality of different communication methods know to a person skilled in the art, and can hereby be an interface for communication between a plurality of different types of external control devices ECD1-ECDn, and the independent control system 3.
  • an external control device ECD1-ECDn transmits a control signal to the access master unit 30 of the independent control system 3.
  • a control signal at least comprises a control command relating to at least one slave unit U1-Un of the independent control system 3, and identification of the external control device ECD1-ECDn transmitting the control signal(s).
  • the identification of the external control device ECD1-ECDn transmitting the control signal(s) may also be referred to in the following as identification means.
  • the at least one master unit C1-Cn and the at least one slave unit U1-Un of the independent control system 3 comprise one and the same code key which is unique to the independent control system 3.
  • Each of the slave units U1-Un of the independent control system 3 further comprise an address being unique to the individual slave unit U1-Un, and this unique addresses of the slave units U1-Un are registered by the at least one master unit C1-Cn.
  • the external control device ECD1-ECDn do not know the code key which is unique to the independent control system 3, the unique addresses of the at least one slave unit U1-Un of the independent control system 3 and/or the general identification and communication form of the independent control system 3.
  • the external control device(s) ECD1-ECDn preferably knows, accesses and/or utilizes aliases to the slave units U1-Un, master unit(s) C1-Cn and/or master unit(s) configured as access devices of the independent control system 3.
  • aliases are different to the internal identification of the slave units U1-Un, master unit(s) and master unit(s) configured as access devices of the independent control system3.
  • Examples of such aliases may be names given to the slave units U1-Un, e.g. "Living room awning 1", “Kitchen shutter A", "Office roof window 3", "Blind 22".
  • the aliases may be numbers (e.g.
  • the communication between access master units and the external control device ECD1-ECDn, regarding the slave unit U1-Un of the independent control system 3, comprises these aliases or codes for these aliases, and do not comprise the code key unique to the independent control system 3 and the unique addresses of the at least one slave unit U1-Un.
  • the aliases are registered by the access master unit(s), and the slave unit(s) to which a control command is dedicated is thereby identifyable due to that the access master unit both knows the aliases utilized by the external control device(s) and the internal identification of the slave units of the independent control system 3.
  • the access master unit may also comprise translation of control commands.
  • a control command comprising an "open" control command to open a window may be translated to a command to a slave unit facilitating opening of a window anywhere in an interval between 0 and 100%, in an interval in steps between 0 and 255 (one byte) or the like.
  • an "open" command may for example be translated to a command to open the window to e.g. 100%, of its opening range.
  • the access master unit may impose a safety limit to control commands received from external control units.
  • An external control unit may for example only be able to open windows, doors and gates to a predefined limit so that none unauthorized persons may enter the building.
  • an "open" command to a window e.g. a window near ground
  • ECD1-ECDn far away from the independent control system 3 may be translated by the access master unit so that the specific window is only opened to maximum 5% or 10%. If the same command is transmitted from the external control device, but near the independent control system, the "open" command may on the other hand be translated by the master unit configured as an access device so that the specific window is allowed to be opened to its maximum limit.
  • the safety limit may also be imposed based on the identification of the independent control unit and/or the user of the control unit.
  • Fig. 2 illustrates a system according an embodiment of the invention.
  • the system 1 in this particular embodiment comprises one external control device 64, a master unit configured as an access device 62 and a slave unit 60, where the master unit configured as an access device 62 and the slave unit 60 are comprised in the independent control system 3. It is noted that a plurality of master units, master units configured as access devices, slave units and external control devices could be comprised in the control system 1.
  • the external control device 64 external to the independent control system 3, transmits a control signal 40 to the master unit configured as an access device 62.
  • the control signal 40 at least comprises a control command relating to at least one slave unit 60 of the independent system 3, and identification of the external control device 64.
  • the control command is dedicated the slave unit 60, but it could also be dedicated a group of slave units, all slave units or the like.
  • the identification of the external control device 64 may be an ID of the external control device 64, a code key or the like.
  • the identification of the external control device 64 may be unique to the external control device 64, it may be generated by the master unit configured as an access device 62 and given to the external control device 64 during a synchronization process/ pairing process with the master unit configured as an access device 62, or the like.
  • the identification by the external control device 64 of the slave units to which the control commands are dedicated preferably comprises aliases of slave units.
  • the master unit configured as an access device 62 evaluates the control signal 40 from the external control unit 64, to perform authentication of the control signal 40 from the external control device 64, by authenticating the identification of the external control device 64. If the performed authentication of the identification of the at least one external control device 64 is verified, the control signal 40 from the external control device 64 is accepted.
  • the master unit configured as an access device 62 transmits an authentication request signal to the external control device 64, and the external control device 64 transmits a response signal to the master unit configured as an access device 62. If this response signal is verified by the master unit 62, the control signal 40 from the external control device 64 is accepted.
  • the external control device 64 transmits a preamble signal before the control signal 40.
  • This preamble signal wakes up the master unit configured as an access device 62, and or slave units, e.g. low power units supplied with power from batteries, solar cells or the like, relevant to the following control signal 40.
  • the preamble signal from the external control device 64 may comprise identification of the external control device 64 together with the preamble.
  • the master unit configured as an access device 62 may facilitate the generation and transmittance of a preamble signal to the slave units, when it receives the control signal 40 from the external control device 64, to wake up the slave units relevant to the control signal 40.
  • the master unit configured as an access device 62 when the master unit configured as an access device 62 receives a control signal 40 from the external control device 64, the master unit configured as an access device 62 transmits an acknowledgement signal 42 to the external control device 64.
  • This acknowledgement signal 42 may comprise information regarding if the control signal 40 from the external control device 64 is authenticated or not, if the if the control signal 40 from the external control device 64 is authenticated but do not have access to the control command relating to a slave unit 60 of the independent system 3 that the control signal 40 comprises, or the like.
  • the control command relating to the slave unit 60 of the independent system 3 is evaluated and a control command 44 corresponding to the control command of the control signal 40 from the external control unit 64 is forwarded to the slave unit 60 of the independent control system 3.
  • the slave unit 60 receives the control command 44, it generates and transmits an authentication request signal 46 to the master unit configured as an access device 62.
  • the master unit configured as an access device 62 receives the authentication request signal 46 from the slave unit 60 and generates and transmits an authentication response signal 48 thereto.
  • the authentication response signal 48 is received by the slave unit 60, and if the response signal 48 is verified by the slave unit 60, the control command 44 is processed.
  • the authentication response signal 48 may comprise a code, an ID or the like which the slave unit 60 is able to verify.
  • At least parts of the authentication request signal 46 and the authentication response signal 48 are generated by means of the unique code key of the master unit configured as an access device 62 and the slave unit 60.
  • the master unit configured as an access device 62 transmits a command status request signal 50 to the slave unit 60 after a predetermined time interval from transmittance of the control command 44.
  • the slave unit 60 then transmits a command status signal 52, containing information regarding the status of the command 44, as respond to the command status request signal 50.
  • This command status signal 52 is translated and forwarded by the master unit configured as an access device 60, by means of a command status signal 54 from the master unit 62 to the external control device 64.
  • the external control device 64 may transmit a command status request signal to the master unit configured as an access device 60, e.g. after a predetermined time interval from the transmittance of the control signal 40.
  • the master unit configured as an access device 60 then transmit the command status request signal from the external control device 64 to the slave unit 60, which responds to this signal, and the master unit configured as an access device 60 translates and forwards this respond signal to the external control device 64.
  • a slave unit of the independent control system 3 can distinguish between critical and non-critical control commands of the command signal 44 from the master unit configured as an access device 62.
  • a critical control command may be commands which may be critical to the safety such as opening a window, unlocking a door, opening a garage door or the like.
  • a non-critical control command may be the controlling of shutters, blinds, light or the like. If a critical control command are received by the slave unit 60, the slave unit requests for authentication of the master unit (not illustrated in figure 2 ) or master units configured as an access device 62. If instead a non-critical control command is received, the at least one slave unit may in an embodiment of the invention be processed by the slave unit without authentication request of the master unit or master unit configured as an access device.
  • Fig. 3 illustrates an embodiment of a flowchart according to the invention wherein an access master unit beyond authenticating an external control device also evaluates a control command received from the external control device.
  • the access master unit of the independent control system 3 tests if a control signal is received from an external control device ECD. If a control signal is received, the access master unit in step S31 processes the received command signal to authenticate the external control unit which has transmitted the control signal. If the external control device is not authenticated, the control command is denied in step S32. However, if the access master unit authenticates the external control device, the master unit configured as an access device in step S33 initiates an evaluation of the control command of the received command signal. If the control command is not accepted by means of the evaluation, the control command is denied in step S34 even though the external control device is authenticated. However, if the control command is accepted by means of the evaluation, the control command is executed in step S35.
  • the evaluation of the control signal may in an embodiment of the invention comprise processing of a plurality of access security parameters ASP.
  • access security parameters are associated with a slave unit, so that the slave unit defines a security level necessary to allow control of the slave unit.
  • Fig 4 illustrates an example of a group of access security parameters ASP defining an access security parameter hierarchy.
  • a slave unit is associated with an access security parameter ASP defining a level of security needed to access/control the slave unit.
  • the access security parameter(s) may be stored in the slave unit, for example in the form of a safety flag.
  • access security parameters of associated with slave units may be stored in the master unit configured as an access device preferably in the form of a table such as the access security parameter table 90 of fig. 4 . In fig.
  • a first and fourth slave unit, Slave 1 and Slave 4 of the independent control system 3 is associated with ASP 1
  • a second slave unit Slave 2 is associated with ASP 3
  • a third slave unit Slave 3 is associated with ASP 2
  • a fifth slave unit Slave 5 is associated with ASP n and so on.
  • Access security parameter ASP 1 is an access security parameter demanding a high security level. For example that a slave unit associated with access security parameter ASP 1 can only be controlled by a master unit of the independent control unit, and every attempt to control the slave unit by means of an external control device is denied even though the external control device is authenticated by a master unit configured as an access device.
  • Access security parameter ASP 2 may be an access security parameter demanding a lower level of security than ASP1.
  • control of a slave unit of the independent control system 3 by an external control device ECD is accepted, but only in the case that the external control device which has transmitted the control signal is located near the individual control system 3. This may for example be achieved by demanding that the command signal has to have been transmitted to the master unit configured as an access device by means of communication means with a limited range, such as e.g. Bluetooth or zigbee, or by evaluating position data received from the external control unit ECD.
  • Access security parameter ASP 3 may be an access control level where the access security parameter is dependent of a time parameter. Thereby a slave unit associated with access security parameter ASP 3 may only allow operation of the slave unit by an external control device during daytime.
  • Access security parameter ASP 4 may be an access control level allowing any authenticated external control device to operate the slave unit associated with a the access security parameter ASP n.
  • Access security parameter ASP n may be an access control level allowing any authenticated external control device to operate the slave unit associated with a the access security parameter ASP n.
  • one or more access control parameters assigned to a slave unit may be altered dynamically over time.
  • a slave unit may in an embodiment of the invention be assigned more than one access security parameter ASP.
  • an access security parameter may in an embodiment of the invention change safety level over time, and in such a case, the master unit configured as an access device is preferably updated over time, at least if the status of the access security parameter is stored in the access master unit.
  • a hierarchy between external control devices ECD1-ECDn is present. Such hierarchy could e.g. be determined on the basis of the identification data of the individual external control device ECD1-ECDn, the present geographical placement of the external control device ECD1-ECDn, the type or types of communication means used by the external control device ECD1-ECDn, time and/or date or the like.
  • a master unit C1-Cn of the independent system 3 may be assigned a higher rank than the external control devices U1-Un so that users directly controlling the independent control system by means of a master unit C1-Cn may overrule commands transmitted by external control devices (ECD1-ECDn).
  • Fig. 5 illustrates an embodiment of the invention where a master unit configured as an access device (not illustrated in fig. 5 ) of the independent control system 3 comprises hierarchy management means for handling a hierarchy of an external control device ECD.
  • hierarchy management means may e.g. be a hierarchy table 56 facilitating control of hierarchy settings relating to one or more external control devices ECD1-ECDn.
  • An external control device ECD1-ECDn may thereby be assigned at least one of a plurality of hierarchy levels HILEV1 - HILEVn by means of such hierarchy management means.
  • the hierarchy management means may, as illustrated in fig. 5 where the hierarchy management means comprises a hierarchy table, further comprise a list of command types CMDTYP1- CMDTYPn of the independent control system 3.
  • command types CMDTYP1- CMDTYPn are the command types that are possible for a master unit(s) configured as access device(s) to transmit to the slave units of the independent control system 3.
  • the hierarchy levels HILEV1 - HILEVn each define a list of command types CMDTYP1-CMDTYPn of the independent control system 3, that an external control device ECD can access in the independent control system 3 (not illustrated in fig. 5 ). As illustrated in fig.
  • the hierarchy level HILEV 1 gives access to all command types CMDTYP1-CMDTYPn of the independent control system 3
  • the hierarchy level HILEV2 gives access to the command types CMDTYP1, CMDTYP2 and CMDTYP3
  • the hierarchy level HILEV3 gives access to the command types CMDTYP2 and CMDTYP4 and so on.
  • an access master unit hereby may control which command types CMDTYP1-CMDTYPn the external control device(s) is/are allowed to access, based on the hierarchy level HILEV 1 - HILEVn assigned to an external access devices ECD.
  • an external control device ECD1-ECDn transmits its assigned hierarchy level, together with an identification of the external control device and the control command. Furthermore, an external control device ECD1-ECDn may individually control which control commands it is able to transmit on the basis of a hierarchy table comprised in an external control device ECD.
  • At least one of the HILEV1 - HILEVn only allow the external control system to access status data of slave units of the independent control system 3.
  • status data may be room temperatures, rain sensor status, status of awnings, shutters, windows and the like.
  • the assignment of a hierarchy level HILEV 1 - HILEVn to an external control device EDC may in an embodiment of the invention be determined by fixed hierarchy level assignments or dynamically shifting hierarchy level assignments, determined on the basis of e.g. geographical placement of an external control device ECD, user information of the user operating the at least one external control device ECD, time and/or date or the like.
  • dynamically shifting hierarchy level assignments to external control devices ECD is understood that a hierarchy level assigned to an external control device may change over time. Examples of such dynamic shifting between hierarchy assignments could be that an external control device ECD changes hierarchy level when it is positioned with a certain distance from a master unit configured as an access device of the independent control system to which it is assigned. Another example of dynamic shifting between hierarchy assignments may be when a user of an external control device ECD is changing, e.g. by accessing the external control device ECD with a pin code, finger print, voice recognition or the like.
  • the external control device ECD comprises positioning determination means such as e.g. GPS or the like.
  • the position of the at least one external control device ECD may be defined by the user, a telecommunication network, by evaluation of the communication means utilized for communication with an access master unit or the like.
  • Fig. 6 illustrates an embodiment of the invention, where the external control device 74 is updated with the status of one or more slave units 70 of the independent control system 3 without transmitting control signals comprising control commands.
  • the update may be performed continuously, periodically, by a user of an external control device 74 or the like.
  • the external control device 74 transmits a slave status request signal 76 to a master unit configured as an access device 72.
  • the external control device may transmit the slave status request signal 76 periodically, continuously, in response to user request or the like.
  • the master unit configured as an access device 72 receives the slave status request signal 76, and transmits a status request signal 78 to one ore more slave units 70 of the independent control system 3.
  • the slave unit or slave units 70 transmits a status signal 80 in response to the status request signal 78, but the one or more slave units 70 may also request authentication of the master unit configured as an access device 72 as described earlier, before the transmission of the status signal 80.
  • the master unit configured as an access device 72 then translates and transmits the received status of the slave unit or slave units 72, to the external control device 74.
  • access master unit 72 periodically transmits status request signals 78 to one more more slave units 70 of the independent control system 3, to get updated with the status of the one or more slave units 70.
  • the status request signals 78 in this embodiment may be transmitted without receiving slave status request from external control devices 74.
  • the master unit configured as an access device 72 is hereby continually updated with the status of the slave units 70 of the independent control system 3.
  • the master unit configured as an access device 72 may comprise means for storing data relating to the status of slave units of the independent control system 3.
  • the slave status signals 82 from the master unit configured as an access device 72 is then transmitted continuously, periodically, as a response to a slave status request signal from an external control device 74 which may be generated automatically or by a user of the external control device 74 or any combination thereof to an external control device 74 which can hereby be updated with the status of one or more slave units 70 of the independent control system 3.
  • the external control device 74 and/or a master unit configured as an access device may be updated with the status of the slave units of the independent control system every time a slave unit changes value/status.
  • master units configured as access devices may continuously monitor status from other masters within the independent control system 3 to establish an up to date system status table of the system.
  • Fig. 7 illustrates an example of a preferred method of operating a controller configured to control the independent control system 3.
  • the master unit configured as an access device 72 registers the address being unique to the slave unit 70, e.g. by receiving the address from the slave unit 70.
  • the master unit configured as an access device 72 and the slave unit comprise one and the same code key being unique to the independent control system 3.
  • the master unit configured as an access device 72 may register other parameters such as hierarchy levels, access security parameters and/or the like.
  • the slave unit 70 may receive and transmit other information from the master unit 72, e.g. to authenticate the said code key, to register information of the master unit 72, or the like.
  • the master unit configured as an access device 72 receives a control signal 40 from an external control device 74
  • the master unit configured as an access device 72 processes the received control signal 40 to establish an identification of the external control device 74 and to authenticate the external control device 74 which has transmitted the control signal 40. If the external control device 74 which has transmitted the control signal 40 is authenticated, the master unit configured as an access device 72 retrieves the address which is unique to the slave unit(s) 70 which is/are intended to be controlled by means of the control command of the control signal 40. This retrieving of the unique address of the slave unit(s) 70 may e.g. be performed by processing information of the control signal which may comprise information regarding to which slave unit(s) the control command of the control signal 40 is intended.
  • the control signal 40 may for example (as mentioned earlier) comprise an alias for the slave unit(s) 70, to avoid that the unique address of the slave unit is transmitted between the external control device 74 and the master unit configured as an access device 72.
  • Another way of retrieving the unique address may be that an external control device 74 may be allowed to operate only one slave unit 70, and identification and authentication of the external control device 74 may hereby facilitate automatic identification of the unique address of the slave unit to which the control command is intended without processing further information of the control signal 40.
  • the master unit configured as an access device 72 When the slave unit 70 is identified, the master unit configured as an access device 72 generates/establishes and transmits/communicates coded command(s) to the slave unit 70, based on the received control command(s) of the control signal 40 received from the external control device 74.
  • the master unit configured as an access device 72 may in an embodiment of the invention establish and communicate a feedback signal to the external control device, e.g. to inform the user of the external control device of the status of the control command of the control signal, transmitted to the independent control system 3.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)
  • Hardware Redundancy (AREA)

Claims (15)

  1. Verfahren zum Betreiben einer Steuerung, die dafür eingerichtet ist, ein unabhängiges Steuerungssystem (3) zu steuern, das wenigstens zwei Einheiten umfasst, wobei wenigstens eine der Einheiten dafür eingerichtet ist, als eine Mastereinheit (26, 30, 34, 62, 72) zu arbeiten, und wobei wenigstens eine der Einheiten dafür eingerichtet ist, als eine Slaveeinheit (2, 4, 6, 8, 60, 70) zu arbeiten, wobei die wenigstens eine Mastereinheit (26, 30, 34, 62, 72) und die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) ein und denselben Codeschlüssel umfassen, wobei der Codeschlüssel in dem unabhängigen Steuerungssystem (3) einmalig ist, und wobei die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) eine Adresse umfasst, die für die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) eindeutig ist und die bei der wenigstens einen Mastereinheit (26, 30, 34, 62, 72) registriert ist, wobei wenigstens eine von der wenigstens einen Mastereinheit (26, 30, 34, 62, 72) außerdem als eine Zugriffsvorrichtung eingerichtet ist, die mit einer oder mehreren externen Steuerungseinheiten (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) kommunizieren kann, die nicht Teil des unabhängigen Steuerungssystems (3) sind,
    - wobei die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) mittels der wenigstens einen Mastereinheit und/oder einer Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, unabhängig betrieben werden kann,
    - wobei die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) mittels wenigstens einer externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) abhängig betrieben werden kann, wobei die wenigstens eine externe Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) über die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, betreibt,
    - wobei ein Betriebsvorgang der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) Folgendes umfasst:
    Empfangen eines Steuersignals (40) von wenigstens einer externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) durch die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, wobei das Steuersignal wenigstens einen Steuerbefehl umfasst, der wenigstens einer der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) zugeordnet ist, sowie eine Kennung der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn),
    - wobei, wenn die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, das Steuersignal von der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) empfängt, die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, das empfangene Steuersignal von der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) verarbeitet, um eine Authentifizierung der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) durchzuführen und um die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) zu identifizieren, um dadurch die Adresse abzurufen, die der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) eindeutig zugeordnet ist,
    wobei die Verarbeitung eine Auswertung des von der externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) empfangenen Steuersignals umfasst, um festzustellen, ob der Steuerbefehl des Steuersignals akzeptiert werden soll,
    - wobei die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, codierte Steuersignale (44) an die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) überträgt, basierend auf den Steuerbefehlen des Steuersignals von der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn), wenn die wenigstens eine externe Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) von der wenigstens einen Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, authentifiziert wurde, und
    - wobei ein Zugriff-Sicherheitsparameter (ASP1-ASPn) einer Slaveeinheit des unabhängigen Steuerungssystems zugeordnet ist, und wobei der Zugriff-Sicherheitsparameter (ASP1-ASPn) Sicherheitsanforderungen definiert, die zu erfüllen sind, um eine Betätigung der Slaveeinheit zu gestatten.
  2. Verfahren nach Anspruch 1, wobei ein Authentifizierungs-Anforderungssignal (46) an die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, von der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) in Reaktion auf die codierten Steuersignale (44) erzeugt wird,
    - wobei die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, ein Antwortsignal (48) auf die Authentifizierungs-Anforderung (46) von der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) erzeugt und überträgt, und
    - wobei die wenigstens eine Slaveeinheit (2, 4, 6, 8, 60, 70) die codierten Steuersignale (44) verarbeitet, falls das Antwortsignal von der wenigstens einen Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, von der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) verifiziert wird.
  3. Verfahren nach einem der vorhergehenden Ansprüche, wobei die Kommunikation in dem unabhängigen Steuerungssystem (3) mittels eines Kommunikationsmittels einer anderen Art arbeitet, als wenigstens eine Art Kommunikationsmittel der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn), das zur Kommunikation zwischen der Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, und der wenigstens einen externen Steuerungsvorrichtung verwendet wird.
  4. Verfahren nach einem der vorhergehenden Ansprüche, wobei die Kommunikation mit der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) zwischen kritischen und nicht-kritischen codierten Steuersignalen von der wenigstens einen Mastereinheit (26, 30, 34, 62, 72) und/oder der Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, unterscheidet.
  5. Verfahren nach Anspruch 1, wobei die Auswertung die Verarbeitung einer Hierarchieebene, die einer externen Steuerungsvorrichtung zugeordnet ist, und des Zugriff-Sicherheitsparameters, der einer Slaveeinheit zugeordnet ist, umfasst, um festzustellen, ob ein Steuersignal akzeptiert oder zurückgewiesen werden soll.
  6. Verfahren nach einem der vorhergehenden Ansprüche, wobei der Kommunikation mit wenigstens einer von der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) des unabhängigen Steuerungssystems (3) wenigstens ein Zugriff-Sicherheitsparameter (ASP) zugeordnet ist.
  7. Verfahren nach Anspruch 6, wobei der wenigstens eine Zugriff-Sicherheitsparameter (ASP) aus einer Gruppe von Zugriff-Sicherheitsparametern (ASP1-ASPn) gewählt ist, die wenigstens zwei Zugriff-Sicherheitsparameter umfasst, und/oder wobei der wenigstens eine Zugriff-Sicherheitsparameter von einem Zeitparameter abhängt.
  8. Verfahren nach Anspruch 6 oder 7, wobei der wenigstens eine Zugriff-Sicherheitsparameter (ASP) mit Anforderungen an den geografischen Standort eines oder mehrerer der externen Steuerungsvorrichtungen (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) verbunden ist.
  9. Verfahren nach Anspruch 1, wobei die Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, ein Hierarchie-Verwaltungsmittel umfasst, wobei dieses beispielsweise eine Hierarchietabelle (56) umfasst,
    wobei einer externen Steuerungsvorrichtung (ECD1-ECDn) mittels des Hierarchie-Verwaltungsmittels wenigstens eine von mehreren Hierarchieebenen HILEV1-HILEVn zugeordnet wird,
    wobei das Hierarchie-Verwaltungsmittel Information umfasst, die Befehlstypen (CMDTYP1-CMDTYPn) des unabhängigen Steuerungssystems (3) betreffen, und
    wobei die Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, steuert, auf welche Befehlstypen (CMDTYP1-CMDTYPn) die externe(n) Steuerungsvorrichtung(en) basierend auf der Identifikation der externen Steuerungsvorrichtung(en) (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) zugreifen darf/dürfen.
  10. Verfahren nach einem der Ansprüche 1 bis 9, wobei wenigstens einer der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) wenigstens eine Hierarchieebene (HILEV 1, HILEV 2, HILEV 3, HILEV 4, HILEV 5, HILEV n) zugeordnet ist, die aus mehreren Hierarchieebenen ausgewählt ist.
  11. Verfahren nach Anspruch 10, wobei die Steuersignale von der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) durch die wenigstens eine Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, basierend auf der wenigstens einen Hierarchieebene ausgewertet werden, die der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) zugeordnet ist.
  12. Verfahren nach einem der Ansprüche 1 bis 11, wobei die Steuersignale von der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) basierend auf Folgendem ausgewertet werden: dem geografischen Standort der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn), Benutzerinformation des Benutzers, der die wenigstens eine externe Steuerungsvorrichtung (64, ECD, ECD1, ECD2, ECD3, ECDn) betreibt, der Uhrzeit und/oder dem Datum, dem Abstand zwischen der wenigstens einen Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, und der wenigstens einen externen Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) und/oder der verwendeten Art des Kommunikationsmittels.
  13. Verfahren nach einem der vorhergehenden Ansprüche, wobei die Mastereinheit, die als eine Zugriffsvorrichtung eingerichtet ist, für einen Steuerbefehl des empfangenen Steuersignals eine Sicherheitseinschränkung vorgibt, und/oder
    wobei die wenigstens eine externe Steuerungsvorrichtung (64, 74, ECD, ECD1, ECD2, ECD3, ECDn) auf Aliaskennungen der wenigstens einen Slaveeinheit (2, 4, 6, 8, 60, 70) des unabhängigen Steuerungssystems (3) zugreift.
  14. Verfahren nach einem der Ansprüche 10 bis 12, wobei wenigstens eine Hierarchieebene (HILEV 1, HILEV 2, HILEV 3, HILEV 4, HILEV 5, HILEV n) basierend auf der Art der verwendeten Kommunikationsverbindung ausgewählt wird.
  15. Verfahren nach einem der vorhergehenden Ansprüche, wobei das unabhängige Steuerungssystem ein Gebäudeautomatisierungssystem ist, und/oder wobei das unabhängige Steuerungssystem (3) mehrere Slaveeinheiten (2, 4, 6, 8, 60, 70) umfasst, wobei diese Slaveeinheiten vorzugsweise dafür eingerichtet sind, Vorrichtungen (10, 12, 14, 16) zu steuern, wie etwa Aktoren oder Motoren, die Fenster, Jalousien, Rollläden, Türen, Tore, Markisen, Vorhänge, und/oder Lichtquellen eines Gebäudes.
EP11000429.8A 2010-01-28 2011-01-20 Verfahren zum Betreiben eines Steuergeräts und Mastereinheit damit als Zugangsvorrichtung Active EP2355066B1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DKPA201000067 2010-01-28

Publications (3)

Publication Number Publication Date
EP2355066A2 EP2355066A2 (de) 2011-08-10
EP2355066A3 EP2355066A3 (de) 2014-04-09
EP2355066B1 true EP2355066B1 (de) 2018-09-19

Family

ID=43983999

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11000429.8A Active EP2355066B1 (de) 2010-01-28 2011-01-20 Verfahren zum Betreiben eines Steuergeräts und Mastereinheit damit als Zugangsvorrichtung

Country Status (1)

Country Link
EP (1) EP2355066B1 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973528B (zh) * 2014-05-28 2017-06-20 梅志国 基于ieee802.15.4的智能家居系统的控制网络建立方法
PT108027A (pt) * 2014-11-11 2016-05-11 Pinheiro Pedro José De Araújo Comando universal controlado remotamente
DE102015002077B3 (de) 2015-02-18 2016-06-09 Audi Ag Batteriezelle für eine Batterie eines Kraftfahrzeugs, Batterie, Kraftfahrzeug und Verfahren zum Betreiben einer Batteriezelle
US10333905B2 (en) * 2015-10-16 2019-06-25 Orock Technologies, Inc. System for providing end-to-end protection against network-based attacks
JP6577442B2 (ja) * 2016-11-01 2019-09-18 日本電信電話株式会社 不正侵入防止装置、不正侵入防止方法および不正侵入防止プログラム

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5886647A (en) * 1996-12-20 1999-03-23 Badger; Berkley C. Apparatus and method for wireless, remote control of multiple devices
KR100425252B1 (ko) 2001-09-27 2004-03-30 모빌토크(주) 이동통신 단말기를 이용한 원격제어시스템
JP2005318527A (ja) * 2004-03-29 2005-11-10 Sanyo Electric Co Ltd 無線伝送装置、相互認証方法および相互認証プログラム
KR100611304B1 (ko) * 2005-01-27 2006-08-10 삼성전자주식회사 기 입력된 버튼의 코드값을 이용하여 1회용 비밀키를생성하는 제어기기, 상기 1회용 비밀키를 이용하여 상기제어기기를 인증하는 홈서버, 및, 상기 1회용 비밀키를이용한 제어기기 인증방법
ES2264387B1 (es) * 2005-06-08 2007-11-01 Stop Casa Segura, S.L. Sistema de control de un aparato.

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
EP2355066A3 (de) 2014-04-09
EP2355066A2 (de) 2011-08-10

Similar Documents

Publication Publication Date Title
AU2020244502B2 (en) Remote monitoring and control system for a barrier operator
EP2355066B1 (de) Verfahren zum Betreiben eines Steuergeräts und Mastereinheit damit als Zugangsvorrichtung
EP2701407B1 (de) Domotikvorrichtungspaarung über eine Nahfeldkommunikations-fähige tragbare Vorrichtung
EP3097246B1 (de) Intelligentes fenstersystem aufweisend eine fernsteuerung
US9661123B1 (en) Secure remote actuation system with data connection port
US20240177548A1 (en) Movable barrier operator and transmitter pairing over a network
EP3355521A1 (de) Intelligenter heimdienst-server und steuerungsverfahren dafür
US20150067792A1 (en) Owner access point to control the unlocking of an entry
US11220856B2 (en) Movable barrier operator enhancement device and method
CN104103111A (zh) 基于手机蓝牙通信的自动门禁系统及其实现方法
EP3080952B1 (de) Präsenzerkennung in einem gebäudeautomatisierungssystem
CN106254357B (zh) 一种基于二维码的楼宇对讲系统配置系统和方法
EP2237483A1 (de) Radio Kommunikation in der Automatisierungstechnik
KR101726356B1 (ko) 모바일 앱을 이용한 도어록 개폐 제어시스템 및 방법
EP3328000B1 (de) Heimautomationssteuerungsvorrichtung und steuerungsverfahren dafür
US12020524B2 (en) Movable barrier operator system and methods of installation and use
US20170344140A1 (en) Wireless fob
EP2291016A1 (de) Eine vorrichtung mit einem mobiltelefon verwendendes drahtloses steuersystem
EP1732050A1 (de) Gerätesteuerungssystem
KR101333656B1 (ko) 근접 통신을 이용한 건물 자동화 시스템
CN118677933A (zh) 一种基于Zigbee与Knx的混合组网系统
AU2022283718B1 (en) Electric door controller
AU2012100227A4 (en) A system for automatically controlling the operation of a motorized door or gate through a wireless connection with a portable device
CN104756472A (zh) 控制建筑物内舒适和/或安全状况的移动单元

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RIC1 Information provided on ipc code assigned before grant

Ipc: G08C 17/02 20060101AFI20140228BHEP

17P Request for examination filed

Effective date: 20141008

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20180518

RIN1 Information on inventor provided before grant (corrected)

Inventor name: NIELSEN, MARTIN SANDAL

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1044144

Country of ref document: AT

Kind code of ref document: T

Effective date: 20181015

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602011052114

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181219

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181220

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181219

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1044144

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190119

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190119

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602011052114

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

26N No opposition filed

Effective date: 20190620

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190120

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20190131

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190131

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190120

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190120

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20110120

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180919

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231207

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20231222

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20231205

Year of fee payment: 14