EP2620919A1 - Locking system - Google Patents

Locking system Download PDF

Info

Publication number
EP2620919A1
EP2620919A1 EP12152711.3A EP12152711A EP2620919A1 EP 2620919 A1 EP2620919 A1 EP 2620919A1 EP 12152711 A EP12152711 A EP 12152711A EP 2620919 A1 EP2620919 A1 EP 2620919A1
Authority
EP
European Patent Office
Prior art keywords
key
data set
mobile phone
key data
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP12152711.3A
Other languages
German (de)
French (fr)
Other versions
EP2620919B1 (en
Inventor
Ivan Götz
Ludger Voss
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SimonsVoss Technologies GmbH
Original Assignee
SimonsVoss Technologies GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SimonsVoss Technologies GmbH filed Critical SimonsVoss Technologies GmbH
Priority to EP12152711.3A priority Critical patent/EP2620919B1/en
Publication of EP2620919A1 publication Critical patent/EP2620919A1/en
Application granted granted Critical
Publication of EP2620919B1 publication Critical patent/EP2620919B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • the present invention generally relates to an access control system and a method for using said system.
  • the present invention relates to locking system and a corresponding method for controlling and customizing access of a mobile key to a lock.
  • the invention provides an easy, convenient and still safe system and method which allows an administrator to control and customize a mobile phone which comprises an NFC (Near Field Communication) device, as a mobile key for one a plurality of locks of a locking system.
  • NFC Near Field Communication
  • the method and system according to the present invention is not limited on access control systems for locks but can be used for any kind of access control systems.
  • Locking systems with a plurality of electronic locks and a plurality of electronic keys are known in the art.
  • transponders (active or passive) or RFID cards can be used as portable electronic keys (in the following also called credentials), which provide a plurality of advantages over pure mechanical locking systems with mechanical keys and mechanical locks.
  • the electronic keys and/or the electronic locks may be programmed individually, which allows to provide very flexible locking plans. For instance, each hotel guest or employee has its own electronic key, which can be individually programmed for unlocking a particular lock or a plurality of locks during a specific period of time.
  • the electronic key e.g., the RFID card
  • a card reader/writer of an administrator is required.
  • a locking system management e.g. a central computer with appropriate software which allows the administrator to program the electronic key(s) and/or the individual lock(s) individually.
  • a drawback of such known locking systems is, however, that the electronic key has to be connected physically to the card reader of the administrator for programming or re-programming.
  • the electronic locks have to be connected to the locking system management to allow individual programming of the locks.
  • Such an connection between the locking system management and the electronic locks typically requires complex wiring or sophisticated wireless networks.
  • the present invention further relates to a corresponding method for administrating the locking system according to the present invention.
  • a locking system comprises at least one electronic lock, preferably a plurality of electronic locks and at least one portable electronic key, preferably a plurality of electronic keys.
  • the system further comprises a locking system management (also called Locking-System-Management; LSM in the following) which allows controlling and administrating access of individual or groups of electronic keys to individual or groups of electronic locks.
  • LSM Locking-System-Management
  • a locking system according to the present invention a may be based on a digital locking and access control system (see e.g. System 3060 from SimonsVoss) which is an electronic version of a mechanical locking system which provides all the functions of a classical access control system.
  • Electronic transponders electronic keys
  • Electronic keys may be used instead of mechanical keys, along with electronic locks, such as digital locking cylinders. Radio communication between the electronic locks and the electronic keys takes the place of a key turning in a lock.
  • Data is preferably transferred from the transponder to the locking cylinders or SmartRelays inductively at a frequency range of 25 kHz. The typical reading distance up to 40 cm for the locking cylinder and up to 120 cm for the SmartRelays may be provided.
  • the locking system according to the present invention is preferably a further advancement of the above discussed locking system.
  • the present invention provides the further advantage that access management of electronic locks, which are not connected via a network to the LSM, can still be flexibly and individually managed by using mobile phones (also labeled cell phones throughout the present application) as electronic keys, wherein said mobile phones are connectable to the LSM via the cellular network (mobile network; mobile communication network) of the mobile network operators (mobile phone providers).
  • mobile phones with NFC (Near Field Communication) devices are used as mobile electronic keys.
  • Transponders in particular passive transponders, are well known in the art to be used in electronic access control devices.
  • RFID Radio Frequency IDentification
  • An RFID tag is typically a small object that can be attached to or incorporated into a product.
  • RFID tags contain silicon chips to enable them to receive and respond to queries from an RFID reader/writer.
  • the power supply to the transponder and the data exchange between the transponder and a reader is achieved without the use of galvanic contacts, using instead magnetic or electromagnetic fields.
  • An RFID system is always made up of two components, the transponder/RFID tag and the reader.
  • NFC Near Field Communication
  • NFC communication is enabled by bringing two NFC-compatible devices within a few centimeters of one another. This "context of proximity" is basis for many new NFC-based applications, e.g.: contactless transactions such as payment, transit ticketing, simple and fast data transfers including electronic business cards and access to online digital content or access control to locking systems.
  • NFC is a standards-based technology that enables simple and safe two-way interactions between electronic devices, allowing consumers to perform contactless transactions, access digital content, and connect electronic devices with a single touch.
  • NFC is not an RFID system, but a wireless data interface between devices, similar to infrared or Bluetooth.
  • Bluetooth wireless technology was designed to replace cables between cell phones, laptops, and other computing and communication devices within a 10-meter range.
  • NFC provides several features with are of interest in relation to RFID systems. For instance, data transmission between two NFC interfaces uses high-frequency magnetic alternating fields in the frequency range of 13.56 MHz.
  • NFC is compatible with existing RFID standards and makes it possible both to read transponders and to emulate transponders, i.e., to behave like transponders.
  • an NFC interface has a 13.56 MHz transmitter and a 13.56 MHz receiver that are alternately connected to an antenna.
  • NFC devices are active devices and are unique in that they can change their mode of operation to be in (i) reader/writer mode, (ii) peer-to-peer mode, or (iii) card emulation mode.
  • the different operating modes are based on the ISO/IEC 18092 NFC IP-1 and ISO/IEC 14443 contactless smart card standards.
  • an NFC tag is typically a passive device (for example, integrated in a smart poster) that stores data that can be read by an NFC-enabled device.
  • NFC card and “NFC tag” will be used synonymously.
  • a "NFC card” and “NFC tag” are technically the same, however, contactless cards used in ticketing and payment often include additional technology to store secure data.
  • the NFC device In reader/writer mode, the NFC device is capable of reading NFC tag types, such as in the scenario of reading an NFC Smart Poster tag.
  • P2P Peer-to-Peer
  • two NFC devices can exchange data. For example, a user can share Bluetooth or WiFi link set up parameters or a user can exchange data such as virtual business cards or digital photos.
  • the NFC device appears to an external reader much the same as a traditional contactless smart card (RFID card).
  • RFID card contactless smart card
  • This mode is secure and supported by a contactless communication API.
  • a secure element on the device communicates and transacts with an external reader over RFID hardware.
  • the internal security element interacts with an external reader.
  • the application is notified when the external reader has been detected, and, if needed, the application communicates with the secure element, using the contactless communication API connection interface.
  • Preferred embodiments of the present invention may be characterized as follows.
  • the present invention relates to a locking system for managing access of (an) electronic key(s) to (an) electronic lock(s).
  • the system comprises at least one electronic lock which may be unlocked by means of a transponder, preferably by means of an active and/or passive transponder.
  • the electronic lock is adapted to be unlocked by an RFID card, e.g., a MIFARE® Classic and/or a MIFARE® DESFire RFID card.
  • the invention is further characterized by providing at least one mobile phone with a NFC device.
  • the NFC device may be integrated in the mobile phone or provided as an additional external device, e.g., as a NFC card or NFC sticker with is attached to the mobile phone.
  • the external NFC device may work as a Near Field Communication (NFC)/Radio Frequency Identification (RFID) Reader.
  • the NFC device preferably comprises an embedded smart-chip.
  • the mobile phone is preferably further adapted to install a mobile key application such that the mobile phone can be used as electronic key for the electronic lock.
  • a locking system management (LSM) is provided for managing the access of the mobile phone (preferably also for managing additional active and/or passive transponder and/or RFID cards) to the electronic lock by means of individual key data sets.
  • each electronic key comprises its own individual key data set.
  • An OTA key server is preferably further provided for storing and distrusting encrypted key data sets, wherein said locking system management (LSM) is adapted to encrypt the key data set in a secure environment of the LSM and to push said encrypted key data set to the OTA (over the air) key server.
  • the secure environment of the LSM may be provided by firewalls which filter the data traffic to and from the LSM.
  • the OTA server can not download key data sets and preferably also no other data from the LSM.
  • the key data sets and preferably also any kind of data is actively pushed (sent) from the LSM to the OTA key server.
  • the LSM controls actively which data may be transmitted to the OTA key server.
  • the mobile phone is preferably adapted to download (preferably by means of the installed mobile key application) the appropriate/dedicated encrypted key data set from the OTA key server via the cellular mobile network and to decrypt the downloaded (encrypted) key data set and to store said decrypted key data set in a secure element of the NFC device.
  • download preferably by means of the installed mobile key application
  • decrypt the downloaded (encrypted) key data set and to store said decrypted key data set in a secure element of the NFC device.
  • the NFC device is preferably further adapted to switch in a card emulation mode and to transmit the key data set during said card emulation mode to the electronic lock for unlocking.
  • the NFC device behaves in the card emulation mode like an RFID card, e.g., a MIFARE® Classic and MIFARE® DESFire RFID card, such that there is no reconfiguration necessary for already installed locks.
  • the electronic locks which are adapted to be unlocked by a RFID card (MIFARE® Classic and MIFARE® DESFire RFID card), may be unlocked with the above described adapted mobile phone.
  • the encryption on the locking system management and the corresponding decryption on the mobile phone and/or NFC device is preferably achieved by an initial setup of the locking system management and the mobile phone.
  • the LSM and the mobile phone negotiate at least one secret key, e.g., a secret key for symmetric encryption and/or at least a pair of keys for asymmetric encryption.
  • Such an initial negotiation is preferably done in a secure environment, e.g., by connecting the mobile phone and/or the NFC device to the LSM via cable or a local read/write device.
  • a universal mobile key application may be used for all mobile phones. However, it may be necessary to adapt this mobile key application to the operating system of the mobile phone.
  • the individuality of the electronic key is preferably based on the individual key data set, not on the basis of the basis application. Accordingly, the mobile key application may be distributed via classical data storage medium or may be provided on a server which allows a user to download the application.
  • the mobile key application is provided in an app store, wherein the mobile phone is preferably adapted to download the mobile key application from the app store.
  • the locking system management is preferably adapted to manage key data sets for active transponders and/or passive transponder and mobile phones.
  • a locking system management may be used for managing a plurality of electronic locks and electronic cylinders.
  • an advantage of the present invention is based on a flexible locking system management, which can manage a plurality of different electronic keys. For instance, only a subset of electronic keys - which are managed in the locking system management - are defined as electronic keys on the basis of mobile phones. To keep the mobile phones up to date, it may be preferably to automatically updated key data sets on the OTA server whenever the administrator chooses to change access authorizations of any of these electronic keys (based on the mobile phone).
  • the present invention also relates to a corresponding method for managing access of an electronic key to an electronic lock.
  • the lock at the location 102 has to be reprogrammed. This may be achieved either by integrating the lock in a network, such that the lock may be programmed by the LSM. However, if the lock is not accessible via a network from the LSM, a portable device, e.g., a laptop or a handheld, may be used to program the lock locally at location 102.
  • a mobile phone 1 may be individually programmed for unlocking particular electronic locks for a limited time, thus making sure that employees will have to upload their changing access authorizations on a regular basis. For instance, by means of the key distribution service 200, a mobile phone may be programmed every Monday via the cellular network, to get access to specified locks at location 102. In case the employee should not get access to location 102, programming via the cellular mobile network is abandoned.
  • FIG. 3 shows a preferred embodiment of the locking system according to the present invention in more detail.
  • the locking system management preferably comprises at least one computer which allows individual management of all electronic keys, preferably including active transponder, passive transponder and/or mobile phones used as electronic keys according to the present invention.
  • the locking system management preferably also allows that some or all of the locks which form part of the locking system may be programmed individually. For instance, some of the locks may be connected to the LSM via a network. Some of the locks may not be connected to the LSM via a network. Programming such locks, however, may be achieved by means of a portable computer (laptop, handheld, smartphone, etc.), e.g., by programming the locks locally using the portable computer.
  • mobile phones are preferably not re-programmed via a local reader/writer, but preferably via the cellular mobile network.
  • a user downloads appropriate software on the mobile phone 1.
  • this particular software which enables a mobile phone to work within the locking system according to the present invention, may be transferred locally from the LSM or an other computer authorized by the LSM.
  • This software also called “App”, “app” (acronym for "Application") or "mobile key application” may be provided by an “app store”.
  • the app store according to the present invention is a digital application distribution platform, particularly for mobile phones.
  • the app store allows users to browse and download applications that were developed for the mobile phone.
  • the application (app) can be downloaded directly to a target device (the mobile phone), or downloaded onto a computer and afterwards transferred to the mobile phone.
  • a user may download the mobile key application (app) from an app store as illustrated in step 01 of Fig. 3 .
  • the mobile phone as used as electronic key comprises an NFC device, e.g., an NFC chip.
  • the NFC device preferably further comprises a secure element.
  • the secure element may be embedded within the mobile phone in a secure chip, in the SIM card and/or in an external device, attached to the mobile phone.
  • the key data set which represents or comprises data needed for unlocking a particular lock, is preferably stored within said secure element.
  • the key data set is generated individually for each mobile phone 1. Accordingly, it is preferred that each mobile phone stores a unique key data set in the secure element. Since the secure element of an NFC device is adapted to store sensible data securely, a save mobile key is provided.
  • said key data set is preferably transferred from the Locking System Management 201 via an OTA (Over The Air) key server 202, to the mobile phone 1 as follows.
  • the key data set with the individual access codes is generated at the LSM 201. Since the LSM 201 may bee seen as the "heart" of the system, remote access to the LSM from outside should be avoided.
  • the key data set is encrypted (cryptographically secured) at the LSM by means of a secure key.
  • the encrypted key data set is pushed from the LSM 201 to the OTA key server 202 (see step/arrow 02 in Fig. 3 ).
  • the LSM 201 and the OTA key server 201 are connected via TCP/IP, further preferred via the Internet.
  • the key data set is pushed only in the direction from the LSM to the OTA. In other words, it is preferably not possible to download the key data set from the LSM. Still in other words, pushing the key data set represents a one way direction of sensible data which ensures that manipulation of the LSM from outside is impossible.
  • the LSM 201 may be designed such that the administrator actively controls, e.g., by pressing a button, when a new key data set is pushed to the OTA key server.
  • the LSM 201 may additionally or alternatively designed that any amendment of access control relating to a corresponding mobile phone may result in an automatic push of the corresponding amended key data set to the OTA key server. Further preferred, amended key data set(s) may be regularly or according to an underlying timing plan pushed to the OTA key server. It is, however, preferred that only encrypted key data sets are pushed and subsequently stored on the OTA key server.
  • the OTA key server 201 is preferably provided as a trusted service manager (TSM). Such trusted service managers are typically very save. However, remote access to such OTA server can not be totally avoided such that attacker may hack in worst case the OTA key server and download the stored key data sets. However, since only encrypted key data sets are stored, even hacking the OTA server does not provide a safety problem for the locking system according to the present invention.
  • TSM trusted service manager
  • the user may then download the encrypted key data set from the OTA key server 201 by means of the mobile key application (the app) already installed on his/her mobile phone 1 (see step 03 in Fig. 3 ).
  • the mobile phone network may be used for controlling/managing mobile phones as electronic keys.
  • This provides further advantages over the traditional locking systems which typically suggest connecting the locks via a network for controlling/managing the locks of the locking system with the LSM.
  • the system of the present invention provides further flexibility, especially for locks with are not (logically) connected to the LSM. For instance, a lock may be provided as "hermit lock" anywhere. Access to said lock may still be individually and flexibly managed due to the connection of the LSM to the mobile phone 1 via the cellular network.
  • the mobile key application on the mobile phone 1 is adapted to decrypt (decipher) the encrypted key data set on the mobile phone in a secure manner.
  • the LSM 201 and the mobile key application on the mobile phone 1 both know the preferably individual secure key for encrypting and/or decrypting the key data set.
  • the mobile phone may be physically coupled to the LSM to generate an encrypting and/or decrypting key which is only known by the LSM and the mobile key application on the mobile phone.
  • the encryption/decryption on the LSM/mobile phone may be based on a symmetric key or on the basis of asymmetric keys.
  • This design ensures that solely the mobile key application knowing the secure key may decrypt the encrypted key which is distributed via the OTA key server. After decrypting the key data set, the key data set (the encrypted key data set) is stored in the secure element of the NFC device. Thus, since the secure element of the NFC device is safe against manipulation from outside, security of the locking system according to the present invention is guaranteed.
  • a user may then use the NFC device with the stored key data set for unlocking the door 2 (see step/arrow 04 in Fig. 3 ).
  • the NFC device switches into card emulation mode such that NFC device behaves like a typical RFID device.
  • the NFC device behaves like a well known MIFARE® card which transmits data for unlocking the electronic lock 2 on the basis of the key data set stored in the secure element on the mobile phone 1. This provides the advantage that legacy installed locks, which are unlocked by means of MIFARE cards, may be unlocked by traditional RFIC cards or by means of mobile phones 1 which are customized according to the present invention.

Abstract

The present invention relates to a locking system for managing access of an electronic key to an electronic lock. The system comprises at least one electronic lock (2) which may be unlocked by means of a RFID card; at least one mobile phone (1) with an NFC device, wherein said mobile phone (1) is adapted to install an mobile key application such that the mobile phone can be uses as electronic key for the electronic lock (2); a locking system management (201) for managing the access of the mobile phone (1) to the electronic lock (2) by means of a key data set; and an OTA key server (201) for storing and distrusting encrypted key data sets, wherein said locking system management (201) is adapted to encrypt the key data set and to push said encrypted key data set to the OTA key server (201). The mobile phone (1) is adapted to download by means of the mobile key application the appropriate encrypted key data set from the OTA key server (201) via the cellular mobile network, to decrypt the downloaded key data set and to store said decrypted key data set in a secure element of the NFC device, wherein said NFC device is further adapted to switch in a card emulation mode and to transmit the key data set during said card emulation mode to the electronic lock to be unlocked.

Description

  • The present invention generally relates to an access control system and a method for using said system. In particular, the present invention relates to locking system and a corresponding method for controlling and customizing access of a mobile key to a lock. More particularly, the invention provides an easy, convenient and still safe system and method which allows an administrator to control and customize a mobile phone which comprises an NFC (Near Field Communication) device, as a mobile key for one a plurality of locks of a locking system. The method and system according to the present invention, however, is not limited on access control systems for locks but can be used for any kind of access control systems.
  • BACKGROUND OF THE INVENTION
  • Locking systems with a plurality of electronic locks and a plurality of electronic keys are known in the art. In particular, it is well known that transponders (active or passive) or RFID cards can be used as portable electronic keys (in the following also called credentials), which provide a plurality of advantages over pure mechanical locking systems with mechanical keys and mechanical locks. In these known electronic locking systems, the electronic keys and/or the electronic locks may be programmed individually, which allows to provide very flexible locking plans. For instance, each hotel guest or employee has its own electronic key, which can be individually programmed for unlocking a particular lock or a plurality of locks during a specific period of time.
  • In order to program the electronic key, e.g., the RFID card, locally coupling to a card reader/writer of an administrator is required. Furthermore, in order to provide a more flexible electronic locking system it is further preferred to interconnect the electronic locks of the locking system and/or to connect these electronic locks to a locking system management, e.g. a central computer with appropriate software which allows the administrator to program the electronic key(s) and/or the individual lock(s) individually. A drawback of such known locking systems is, however, that the electronic key has to be connected physically to the card reader of the administrator for programming or re-programming. Moreover, the electronic locks have to be connected to the locking system management to allow individual programming of the locks. Such an connection between the locking system management and the electronic locks typically requires complex wiring or sophisticated wireless networks.
  • It is an object of the present invention to provide a locking system with a plurality of locks and a plurality of portable electronic keys, wherein at least some of the electronic keys are mobile phones. The present invention further relates to a corresponding method for administrating the locking system according to the present invention.
  • The object of the invention is achieved by the features of the independent claims. Further preferred embodiments of the invention are defined by the dependent claims.
  • SUMMARY OF THE INVENTION
  • A locking system according to the present invention comprises at least one electronic lock, preferably a plurality of electronic locks and at least one portable electronic key, preferably a plurality of electronic keys. The system further comprises a locking system management (also called Locking-System-Management; LSM in the following) which allows controlling and administrating access of individual or groups of electronic keys to individual or groups of electronic locks.
  • For instance a locking system according to the present invention a may be based on a digital locking and access control system (see e.g. System 3060 from SimonsVoss) which is an electronic version of a mechanical locking system which provides all the functions of a classical access control system. Electronic transponders (electronic keys) may be used instead of mechanical keys, along with electronic locks, such as digital locking cylinders. Radio communication between the electronic locks and the electronic keys takes the place of a key turning in a lock. Data is preferably transferred from the transponder to the locking cylinders or SmartRelays inductively at a frequency range of 25 kHz. The typical reading distance up to 40 cm for the locking cylinder and up to 120 cm for the SmartRelays may be provided. Using intelligent relays (SmartRelays), electronic switches can be activated depending on the transponder authorisation. For instance, the locking cylinders can be directly networked, e.g., on the basis of a 868 MHz frequency network. Furthermore, instead of using active transponder, MIFARE® Classic and MIFARE® DESFire RFID cards may be used as electronic keys. Using the Locking-System-Management (LSM) allows to define locking plans and allocate individual access rights. Access management and building automation are preferably managed by the Locking-System-Management-Software, which preferably works centrally from a single location. This basis system provides the advantage to organize one or even a plurality of locking systems and subsystems anywhere in the world.
  • The locking system according to the present invention is preferably a further advancement of the above discussed locking system. In particular, the present invention provides the further advantage that access management of electronic locks, which are not connected via a network to the LSM, can still be flexibly and individually managed by using mobile phones (also labeled cell phones throughout the present application) as electronic keys, wherein said mobile phones are connectable to the LSM via the cellular network (mobile network; mobile communication network) of the mobile network operators (mobile phone providers). According to a further preferred embodiment, mobile phones with NFC (Near Field Communication) devices are used as mobile electronic keys.
  • In the following some essential technologies which are useful for the understanding of the present invention will be discussed in more detail.
  • Transponders, in particular passive transponders, are well known in the art to be used in electronic access control devices. For instance, RFID (Radio Frequency IDentification) is an automatic identification method relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is typically a small object that can be attached to or incorporated into a product. RFID tags contain silicon chips to enable them to receive and respond to queries from an RFID reader/writer. In an RFID system, the power supply to the transponder and the data exchange between the transponder and a reader is achieved without the use of galvanic contacts, using instead magnetic or electromagnetic fields. An RFID system is always made up of two components, the transponder/RFID tag and the reader.
  • NFC (Near Field Communication) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication between electronic devices (usually mobile phones communicating with RFID readers or RDID tags). NFC communication is enabled by bringing two NFC-compatible devices within a few centimeters of one another. This "context of proximity" is basis for many new NFC-based applications, e.g.: contactless transactions such as payment, transit ticketing, simple and fast data transfers including electronic business cards and access to online digital content or access control to locking systems. NFC is a standards-based technology that enables simple and safe two-way interactions between electronic devices, allowing consumers to perform contactless transactions, access digital content, and connect electronic devices with a single touch.
  • NFC is not an RFID system, but a wireless data interface between devices, similar to infrared or Bluetooth. In contrast to NFC, Bluetooth wireless technology was designed to replace cables between cell phones, laptops, and other computing and communication devices within a 10-meter range. NFC, however, provides several features with are of interest in relation to RFID systems. For instance, data transmission between two NFC interfaces uses high-frequency magnetic alternating fields in the frequency range of 13.56 MHz. NFC is compatible with existing RFID standards and makes it possible both to read transponders and to emulate transponders, i.e., to behave like transponders. Thus, an NFC interface has a 13.56 MHz transmitter and a 13.56 MHz receiver that are alternately connected to an antenna.
  • NFC devices are active devices and are unique in that they can change their mode of operation to be in (i) reader/writer mode, (ii) peer-to-peer mode, or (iii) card emulation mode. The different operating modes are based on the ISO/IEC 18092 NFC IP-1 and ISO/IEC 14443 contactless smart card standards.
  • On the other hand, an NFC tag is typically a passive device (for example, integrated in a smart poster) that stores data that can be read by an NFC-enabled device. In the following, the terms "NFC card" and "NFC tag" will be used synonymously. Typically, a "NFC card" and "NFC tag" are technically the same, however, contactless cards used in ticketing and payment often include additional technology to store secure data. In reader/writer mode, the NFC device is capable of reading NFC tag types, such as in the scenario of reading an NFC Smart Poster tag. In Peer-to-Peer (P2P) mode, two NFC devices can exchange data. For example, a user can share Bluetooth or WiFi link set up parameters or a user can exchange data such as virtual business cards or digital photos.
  • In card emulation mode, the NFC device appears to an external reader much the same as a traditional contactless smart card (RFID card). This enables contactless payments and ticketing by NFC devices without changing the existing infrastructure. This mode is secure and supported by a contactless communication API. In particular, in card emulation mode, a secure element on the device communicates and transacts with an external reader over RFID hardware. The internal security element interacts with an external reader. The application is notified when the external reader has been detected, and, if needed, the application communicates with the secure element, using the contactless communication API connection interface.
  • Preferred embodiments of the present invention may be characterized as follows.
  • According to a first aspect, the present invention relates to a locking system for managing access of (an) electronic key(s) to (an) electronic lock(s). The system comprises at least one electronic lock which may be unlocked by means of a transponder, preferably by means of an active and/or passive transponder. According to a preferred embodiment, the electronic lock is adapted to be unlocked by an RFID card, e.g., a MIFARE® Classic and/or a MIFARE® DESFire RFID card. The invention is further characterized by providing at least one mobile phone with a NFC device. The NFC device may be integrated in the mobile phone or provided as an additional external device, e.g., as a NFC card or NFC sticker with is attached to the mobile phone. For instance the external NFC device may work as a Near Field Communication (NFC)/Radio Frequency Identification (RFID) Reader. The NFC device preferably comprises an embedded smart-chip.
  • The mobile phone is preferably further adapted to install a mobile key application such that the mobile phone can be used as electronic key for the electronic lock. Moreover, a locking system management (LSM) is provided for managing the access of the mobile phone (preferably also for managing additional active and/or passive transponder and/or RFID cards) to the electronic lock by means of individual key data sets. In particular, it is preferred that each electronic key comprises its own individual key data set. An OTA key server is preferably further provided for storing and distrusting encrypted key data sets, wherein said locking system management (LSM) is adapted to encrypt the key data set in a secure environment of the LSM and to push said encrypted key data set to the OTA (over the air) key server. The secure environment of the LSM may be provided by firewalls which filter the data traffic to and from the LSM. According to the present invention, however, it is further preferred that the OTA server can not download key data sets and preferably also no other data from the LSM. In other words, it is preferred that the key data sets and preferably also any kind of data is actively pushed (sent) from the LSM to the OTA key server. Still in other words, to enhance security the LSM controls actively which data may be transmitted to the OTA key server.
  • The mobile phone is preferably adapted to download (preferably by means of the installed mobile key application) the appropriate/dedicated encrypted key data set from the OTA key server via the cellular mobile network and to decrypt the downloaded (encrypted) key data set and to store said decrypted key data set in a secure element of the NFC device. Instead of actively downloading the encrypted key data set from the OTA key server it may additionally or alternatively be possible to push the encrypted key data set from the OTA key server to the mobile phone.
  • The NFC device is preferably further adapted to switch in a card emulation mode and to transmit the key data set during said card emulation mode to the electronic lock for unlocking. Thus, it is preferred that the NFC device behaves in the card emulation mode like an RFID card, e.g., a MIFARE® Classic and MIFARE® DESFire RFID card, such that there is no reconfiguration necessary for already installed locks. In other words, the electronic locks, which are adapted to be unlocked by a RFID card (MIFARE® Classic and MIFARE® DESFire RFID card), may be unlocked with the above described adapted mobile phone.
  • The encryption on the locking system management and the corresponding decryption on the mobile phone and/or NFC device is preferably achieved by an initial setup of the locking system management and the mobile phone. Preferably, the LSM and the mobile phone negotiate at least one secret key, e.g., a secret key for symmetric encryption and/or at least a pair of keys for asymmetric encryption. Such an initial negotiation is preferably done in a secure environment, e.g., by connecting the mobile phone and/or the NFC device to the LSM via cable or a local read/write device.
  • It is preferred that a universal mobile key application may be used for all mobile phones. However, it may be necessary to adapt this mobile key application to the operating system of the mobile phone. The individuality of the electronic key is preferably based on the individual key data set, not on the basis of the basis application. Accordingly, the mobile key application may be distributed via classical data storage medium or may be provided on a server which allows a user to download the application. Preferably, and most conveniently, the mobile key application is provided in an app store, wherein the mobile phone is preferably adapted to download the mobile key application from the app store.
  • The locking system management is preferably adapted to manage key data sets for active transponders and/or passive transponder and mobile phones. According to a preferred embodiment, a locking system management may be used for managing a plurality of electronic locks and electronic cylinders. Thus, an advantage of the present invention is based on a flexible locking system management, which can manage a plurality of different electronic keys. For instance, only a subset of electronic keys - which are managed in the locking system management - are defined as electronic keys on the basis of mobile phones. To keep the mobile phones up to date, it may be preferably to automatically updated key data sets on the OTA server whenever the administrator chooses to change access authorizations of any of these electronic keys (based on the mobile phone).
  • According to a second aspect, the present invention also relates to a corresponding method for managing access of an electronic key to an electronic lock.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Various features of the embodiments of the present invention can be more fully appreciated, as the same become better understood with reference to the following detailed description of the embodiments when considered in connection with the accompanying figures, in which:
  • Fig. 1
    shows a traditional locking system with mechanical keys;
    Fig. 2
    shows key distribution system in accordance to a locking system of the present invention; and
    Fig. 3
    shows a locking system according to the present invention in more detail.
    DETAILED DESCRIPTION OF EMBODIMENTS
    • Figure 1 shows a traditional locking system with centrally stored mechanical keys. For instance, a nursing service or a company providing field maintenance stores a plurality of mechanical keys for several locations 1002 in a central key depot 1101. An employee of the nursing service or field maintenance company is leaving his/her home office 1001. Before he/she can unlock the door(s) at the place of action 1002, the employee firstly travels to the central office 1100 (see path "A"), gets the mechanical key from the central key depot 1101 for the lock at location 1002 and travels to location 1002 (see path "B"). After finishing work the employee travels back to the central office 1100 (see path "B") for depositing the key at the central key depot 1101. Depositing the keys at the central key depot 1101 ensured that misusage of the key can be avoided or that other employees may use the key at another day. Afterwards the employee travels back to her home office 1001 (see path "A").
    • Figure 2 shows a locking system in accordance with the present invention. Instead of mechanical locks, at least one or a plurality of doors at location 102 are provided with electronic locks which may be unlocked with corresponding electronic keys. The electronic keys may be provided as active and/or passive transponders. Like mechanical keys, some electronic keys may be stored at a key depot 1101. Moreover, the electronic keys may be programmed individually at the central office by means of a central Locking-System-Management (LSM), which may be realized as software running on a computer. The administrator may program the individual electronic keys. For instance, an electronic key may be programmed to unlock a particular lock every Monday between 8 am and 6 pm. This provides the advantage that an employee may keep the electronic key, such that a detour via the central office may be avoided. However, for programming the electronic key, the employee has to go to the central office since programming is typically achieved by connecting the electronic key to a card reader directly connected to the LSM.
  • Moreover, in case such a programmed electronic key is lost, there is still a potential risk every Monday between 8 am and 6 pm that the lost key may be improperly used. In order to avoid such a misusage, the lock at the location 102 has to be reprogrammed. This may be achieved either by integrating the lock in a network, such that the lock may be programmed by the LSM. However, if the lock is not accessible via a network from the LSM, a portable device, e.g., a laptop or a handheld, may be used to program the lock locally at location 102.
  • According to the present invention, such a reprogramming of the lock may be avoided by allowing individual remote control of electronic keys. According to the present invention mobile phones (cellular phones), preferably mobile phones with NFC means may be used as electronic keys. By means of a key distribution service 200, a mobile phone 1 may be individually programmed for unlocking particular electronic locks for a limited time, thus making sure that employees will have to upload their changing access authorizations on a regular basis. For instance, by means of the key distribution service 200, a mobile phone may be programmed every Monday via the cellular network, to get access to specified locks at location 102. In case the employee should not get access to location 102, programming via the cellular mobile network is abandoned.
  • Figure 3 shows a preferred embodiment of the locking system according to the present invention in more detail.
  • Central part of the key distribution service 200 (see dotted line in Fig. 3) is the locking system management (LSM) 201. The locking system management preferably comprises at least one computer which allows individual management of all electronic keys, preferably including active transponder, passive transponder and/or mobile phones used as electronic keys according to the present invention. The locking system management preferably also allows that some or all of the locks which form part of the locking system may be programmed individually. For instance, some of the locks may be connected to the LSM via a network. Some of the locks may not be connected to the LSM via a network. Programming such locks, however, may be achieved by means of a portable computer (laptop, handheld, smartphone, etc.), e.g., by programming the locks locally using the portable computer.
  • The LSM 201 may provide an access table or access array which allows easy management of the individual locks and/or keys. Programming an RFID tag may be achieved by transferring a (individual) "key data set" from the LSM 201 to the RFID tag by means of an RFID reader/writer, wherein the "key data set" represents the access control data to an electronic lock, preferably to a plurality of electronic locks of the locking system, further preferred to all electronic locks of the locking system.
  • According to the present invention, mobile phones are preferably not re-programmed via a local reader/writer, but preferably via the cellular mobile network.
  • Firstly, preparing a mobile phone to operate as a mobile key in accordance with the present invention, a user downloads appropriate software on the mobile phone 1. Preferably, this particular software, which enables a mobile phone to work within the locking system according to the present invention, may be transferred locally from the LSM or an other computer authorized by the LSM. This software, also called "App", "app" (acronym for "Application") or "mobile key application" may be provided by an "app store".
  • The app store according to the present invention is a digital application distribution platform, particularly for mobile phones. In particular, the app store allows users to browse and download applications that were developed for the mobile phone. Preferably, the application (app) can be downloaded directly to a target device (the mobile phone), or downloaded onto a computer and afterwards transferred to the mobile phone. Accordingly, a user may download the mobile key application (app) from an app store as illustrated in step 01 of Fig. 3.
  • According to the present invention, it is preferred that the mobile phone as used as electronic key comprises an NFC device, e.g., an NFC chip. The NFC device preferably further comprises a secure element. In particular, the secure element may be embedded within the mobile phone in a secure chip, in the SIM card and/or in an external device, attached to the mobile phone. The key data set, which represents or comprises data needed for unlocking a particular lock, is preferably stored within said secure element. Preferably, the key data set is generated individually for each mobile phone 1. Accordingly, it is preferred that each mobile phone stores a unique key data set in the secure element. Since the secure element of an NFC device is adapted to store sensible data securely, a save mobile key is provided.
  • According to the present invention, said key data set is preferably transferred from the Locking System Management 201 via an OTA (Over The Air) key server 202, to the mobile phone 1 as follows. Firstly, the key data set with the individual access codes is generated at the LSM 201. Since the LSM 201 may bee seen as the "heart" of the system, remote access to the LSM from outside should be avoided. According to the present invention, the key data set is encrypted (cryptographically secured) at the LSM by means of a secure key. The encrypted key data set is pushed from the LSM 201 to the OTA key server 202 (see step/arrow 02 in Fig. 3). Preferably, the LSM 201 and the OTA key server 201 are connected via TCP/IP, further preferred via the Internet. To enhance security, the key data set is pushed only in the direction from the LSM to the OTA. In other words, it is preferably not possible to download the key data set from the LSM. Still in other words, pushing the key data set represents a one way direction of sensible data which ensures that manipulation of the LSM from outside is impossible. The LSM 201 may be designed such that the administrator actively controls, e.g., by pressing a button, when a new key data set is pushed to the OTA key server. The LSM 201 may additionally or alternatively designed that any amendment of access control relating to a corresponding mobile phone may result in an automatic push of the corresponding amended key data set to the OTA key server. Further preferred, amended key data set(s) may be regularly or according to an underlying timing plan pushed to the OTA key server. It is, however, preferred that only encrypted key data sets are pushed and subsequently stored on the OTA key server. The OTA key server 201 is preferably provided as a trusted service manager (TSM). Such trusted service managers are typically very save. However, remote access to such OTA server can not be totally avoided such that attacker may hack in worst case the OTA key server and download the stored key data sets. However, since only encrypted key data sets are stored, even hacking the OTA server does not provide a safety problem for the locking system according to the present invention.
  • The user may then download the encrypted key data set from the OTA key server 201 by means of the mobile key application (the app) already installed on his/her mobile phone 1 (see step 03 in Fig. 3). In other words, the mobile phone network may be used for controlling/managing mobile phones as electronic keys. This provides further advantages over the traditional locking systems which typically suggest connecting the locks via a network for controlling/managing the locks of the locking system with the LSM. Accordingly, the system of the present invention provides further flexibility, especially for locks with are not (logically) connected to the LSM. For instance, a lock may be provided as "hermit lock" anywhere. Access to said lock may still be individually and flexibly managed due to the connection of the LSM to the mobile phone 1 via the cellular network.
  • The mobile key application on the mobile phone 1 is adapted to decrypt (decipher) the encrypted key data set on the mobile phone in a secure manner. Preferably, the LSM 201 and the mobile key application on the mobile phone 1 both know the preferably individual secure key for encrypting and/or decrypting the key data set. For instance, once the mobile key application has been installed at the mobile phone, the mobile phone may be physically coupled to the LSM to generate an encrypting and/or decrypting key which is only known by the LSM and the mobile key application on the mobile phone. The encryption/decryption on the LSM/mobile phone may be based on a symmetric key or on the basis of asymmetric keys. This design ensures that solely the mobile key application knowing the secure key may decrypt the encrypted key which is distributed via the OTA key server. After decrypting the key data set, the key data set (the encrypted key data set) is stored in the secure element of the NFC device. Thus, since the secure element of the NFC device is safe against manipulation from outside, security of the locking system according to the present invention is guaranteed.
  • A user may then use the NFC device with the stored key data set for unlocking the door 2 (see step/arrow 04 in Fig. 3). Preferably, the NFC device switches into card emulation mode such that NFC device behaves like a typical RFID device. Preferably, the NFC device behaves like a well known MIFARE® card which transmits data for unlocking the electronic lock 2 on the basis of the key data set stored in the secure element on the mobile phone 1. This provides the advantage that legacy installed locks, which are unlocked by means of MIFARE cards, may be unlocked by traditional RFIC cards or by means of mobile phones 1 which are customized according to the present invention.
  • While the invention has been described with reference to the exemplary embodiments thereof, those skilled in the art will be able to make various modifications to the described embodiments without departing from the true scope of the invention. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the methods and devices has been described by examples, the steps of the method may be performed in a different order than illustrated or simultaneously. Those skilled in the art will recognize that these and other variations are possible within the scope as defined in the claims and their equivalents.

Claims (13)

  1. A locking system for managing access of an electronic key to an electronic lock, the system comprising:
    at least one electronic lock (2) which may be unlocked by means of a RFID card;
    at least one mobile phone (1) with an NFC device, wherein said mobile phone (1) is adapted to install an mobile key application such that the mobile phone can be used as electronic key for the electronic lock (2);
    a locking system management (201) for managing the access of the mobile phone (1) to the electronic lock (2) by means of a key data set;
    an OTA key server (201) for storing and distrusting encrypted key data sets, wherein said locking system management (201) is adapted to encrypt the key data set and to push said encrypted key data set to the OTA key server (201);
    wherein said a mobile phone (1) is adapted to download by means of the installed mobile key application the appropriate encrypted key data set from the OTA key server (201) via the cellular mobile network and to decrypt the downloaded key data set and to store said decrypted key data set in a secure element of the NFC device,
    wherein said NFC device is further adapted to switch in a card emulation mode and to transmit the key data set during said card emulation mode to the electronic lock for unlocking.
  2. The system according to claim 1, wherein the NFC device is
    integrated in the mobile phone (1), preferably i) directly embedded, ii) in a SIM card or iii) in a micro memory card within the mobile phone (1); or
    attached to the mobile phone (1), wherein said mobile phone is connected via a wired connection or via Bluetooth to said NFC device.
  3. The system according to claim 1 or 2, wherein OTA key server (202) is not allowed to download the key data set from the locking system management (201); preferably the key data set is exclusively transmitted via a push communication from the locking system management to the OTA key server (202).
  4. The system according to any of any of the preceding claims, wherein the locking system management (201) is adapted to manage key data sets for active transponders and/or passive transponder and mobile phones.
  5. The system according to any of the preceding claims, wherein the locking system management (201) and the mobile phone (1) with the installed mobile key application are initialized by negotiating a secret key for symmetric encryption and/or a pair of keys for asymmetric encryption, which is used at the locking system management (201) for encrypting the key data set and used by the mobile key application to decrypt the downloaded key data set.
  6. The system according to any of the preceding claims, wherein mobile key application is provided at an appstore, wherein the mobile phone is adapted to download the mobile key application from the appstore.
  7. The system according to any of the preceding claims, wherein a subset of electronic keys being managed in the locking system management are defined as electronic keys on the basis of mobile phones, wherein the key data set is automatically updated on the OTA server whenever the administrator chooses to change access authorizations of these electronic keys.
  8. A method for managing access of an electronic key to an electronic lock, preferably on the locking system as claimed in the preceding claims, the method comprising the steps:
    providing at least one electronic lock (2) which may be unlocked by means of a RFID card;
    providing at least one mobile phone (1) with an NFC device and installing an mobile key application on said mobile phone (1) such that the mobile phone can be used as electronic key for the electronic lock (2);
    providing a locking system management (201) for managing the access of the mobile phone (1) to the electronic lock (2) by means of a key data set;
    encrypting the key data set on said locking system management (201) and pushing said encrypted key data set to an OTA key server (201);
    storing the encrypted key data sets at the OTA key server (201),
    downloading by means of the installed mobile key application the appropriate encrypted key data set from the OTA key server (201) via the cellular mobile network, decrypting the downloaded key data set and storing said decrypted key data set in a secure element of the NFC device, and
    switching said NFC device in a card emulation mode and transmitting the encrypted key data set during said card emulation mode to the electronic lock for unlocking.
  9. The method according to claim 8, wherein the NFC device is provided
    a) integrated in the mobile phone (1), preferably i) directly embedded, ii) in a SIM card or iii) in a micro memory card within the mobile phone (1); or
    b) attached to the mobile phone (1), wherein said mobile phone is connected via a wired connection or with Bluetooth to said NFC device.
  10. The method according to claim 8 or 9, wherein OTA key server (202) is not allowed to download the key data set from the locking system management (201); preferably the key data set is exclusively transmitted via a push communication from the locking system management to the OTA key server (202).
  11. The method according to any of the preceding method claims, wherein the locking system management (201) and the mobile phone (1) with the installed mobile key application are initialized by negotiating a secret key for symmetric encryption and/or a pair of keys for asymmetric encryption, which is used at the locking system management (201) for encrypting the key data set and used by the mobile key application to decrypt the downloaded key data set.
  12. The method according to any of the preceding method claims, wherein the mobile key application is provided at an app store, wherein the mobile phone is adapted to download the mobile key application from the app store.
  13. The method according to any of the preceding method claims, wherein a subset of electronic keys being managed in the locking system management are defined as electronic keys on the basis of mobile phones, wherein the key data set is automatically updated on the OTA server whenever the administrator chooses to change access authorizations of these electronic keys.
EP12152711.3A 2012-01-26 2012-01-26 Locking system Active EP2620919B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP12152711.3A EP2620919B1 (en) 2012-01-26 2012-01-26 Locking system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP12152711.3A EP2620919B1 (en) 2012-01-26 2012-01-26 Locking system

Publications (2)

Publication Number Publication Date
EP2620919A1 true EP2620919A1 (en) 2013-07-31
EP2620919B1 EP2620919B1 (en) 2022-01-05

Family

ID=45524439

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12152711.3A Active EP2620919B1 (en) 2012-01-26 2012-01-26 Locking system

Country Status (1)

Country Link
EP (1) EP2620919B1 (en)

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489245A (en) * 2013-10-18 2014-01-01 苏州新大诚科技发展股份有限公司 Passive smart lock system
CN103578169A (en) * 2013-11-19 2014-02-12 南京品佳科技开发有限公司 Intelligent informationized passive electronic lockset
US20140145823A1 (en) * 2012-11-27 2014-05-29 Assa Abloy Ab Access control system
CN104157060A (en) * 2014-08-15 2014-11-19 曹敏煊 Access control data transmission and management method
WO2015042502A1 (en) * 2013-09-20 2015-03-26 Sargent & Greenleaf, Inc. System and method of initializing and controlling locks
JP2015068086A (en) * 2013-09-30 2015-04-13 美和ロック株式会社 Lock system
CN104851158A (en) * 2014-11-28 2015-08-19 讯美电子科技有限公司 Door-opening control system for entrance guard
EP2958085A1 (en) * 2014-06-17 2015-12-23 Burg-Wächter Kg Method for operating an electronic access system
WO2016001103A1 (en) * 2014-07-02 2016-01-07 Iblue Ag System for unlocking and locking a closing mechanism
WO2016089837A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Capturing user intent when interacting with multiple access controls
WO2016089846A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Remote programming for access control system with virtual card data
WO2016089841A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Access control system with automatic mobile credentialing service hand-off
WO2016089832A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Access control system with virtual card data
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
EP3062295A1 (en) * 2015-02-25 2016-08-31 Assa Abloy AB Systems and methods for updating a mobile device
CN106600755A (en) * 2015-10-16 2017-04-26 巍世科技有限公司 Light wave encrypted and decrypted universal key system and operation method thereof
JP2017133286A (en) * 2016-01-29 2017-08-03 シャーロック株式会社 Electronic lock system
WO2017180454A1 (en) * 2016-04-11 2017-10-19 Carrier Corporation Capturing communication user intent when interacting with multiple access controls
WO2017180563A1 (en) * 2016-04-11 2017-10-19 Carrier Corporation Capturing user intent when interacting with multiple access controls
WO2017192215A1 (en) * 2016-05-03 2017-11-09 Johnson Controls Technology Company Virtual panel for access control system
CN107481361A (en) * 2017-08-01 2017-12-15 安恒世通(北京)网络科技有限公司 A kind of electronics lock management method
EP3300033A1 (en) 2016-09-23 2018-03-28 SimonsVoss Technologies GmbH Access control system, portable user device, and method of controlling access
CN107978033A (en) * 2016-10-24 2018-05-01 深圳市物联锁科技有限公司 A kind of smart lock exchange method
CN108648313A (en) * 2018-05-11 2018-10-12 广东汇泰龙科技有限公司 A kind of user tag interactive approach and system based on intelligent cloud lock
WO2018225019A1 (en) * 2017-06-08 2018-12-13 Karanvir Singh Electro mechanical sealing device
US10192372B2 (en) 2015-03-23 2019-01-29 Assa Abloy Ab Considering whether a portable key device is located inside or outside a barrier
AT520583A1 (en) * 2017-10-17 2019-05-15 Makivic Michael Method for managing and organizing door closing system in objects
EP3540656A1 (en) * 2018-03-12 2019-09-18 Assa Abloy AB Enabling distribution of a mobile key
WO2019174170A1 (en) * 2018-03-15 2019-09-19 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for controlling an intelligent lock
US10431026B2 (en) 2015-05-01 2019-10-01 Assa Abloy Ab Using wearable to determine ingress or egress
US10477398B2 (en) 2016-09-16 2019-11-12 Samsung Electronics Co., Ltd. Method of providing secure access to hotel IoT services through mobile devices
CN111179479A (en) * 2019-12-31 2020-05-19 北京三快在线科技有限公司 NFC simulation entrance guard card control method and device and electronic equipment
WO2020182178A1 (en) * 2019-03-14 2020-09-17 菜鸟智能物流控股有限公司 Door lock control system, method and device for logistics object management device, and electronic apparatus
CN111815815A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock safety system
CN112002041A (en) * 2020-09-02 2020-11-27 赵辛 Intelligent conference access control system
CN113002483A (en) * 2020-07-29 2021-06-22 上海荃信信息技术有限公司 Non-contact automobile key implementation method and device
US11164411B2 (en) 2016-04-11 2021-11-02 Carrier Corporation Capturing personal user intent when interacting with multiple access controls
US11238681B2 (en) 2017-01-09 2022-02-01 Carrier Corporation Access control system with local mobile key distribution
US11341795B2 (en) 2016-04-11 2022-05-24 Carrier Corporation Capturing behavioral user intent when interacting with multiple access controls
US11339589B2 (en) 2018-04-13 2022-05-24 Dormakaba Usa Inc. Electro-mechanical lock core
WO2022141170A1 (en) * 2020-12-30 2022-07-07 Nanjing Easthouse Electrical Co., Ltd. Secure electronic lock systems and methods of using the same
SE2150275A1 (en) * 2021-03-10 2022-09-11 Nordic Frameworks Ab Arrangement for managing, and communicating, an electronic key, and a system comprising the arrangement
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
US11617053B2 (en) 2016-04-06 2023-03-28 Otis Elevator Company Mobile visitor management
US11913254B2 (en) 2017-09-08 2024-02-27 dormakaba USA, Inc. Electro-mechanical lock core
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091182A2 (en) * 2004-03-19 2005-09-29 Roger Humbel Mobile telephone all in one remote key or software regulating card for radio bicycle locks, cars, houses, and rfid tags, with authorisation and payment function
WO2007126375A1 (en) * 2006-04-28 2007-11-08 Sics, Swedish Institute Of Computer Science Ab Access control system and method for operating said system
US20100306549A1 (en) * 2008-01-30 2010-12-02 Evva Sicherheitstechnologie Gmbh Method and device for managing access control
US20110035604A1 (en) * 2008-10-21 2011-02-10 Habraken G Wouter Dual-Interface Key Management

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009147548A2 (en) * 2008-05-27 2009-12-10 Nxp B.V. Method for storing nfc applications in a secure memory device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005091182A2 (en) * 2004-03-19 2005-09-29 Roger Humbel Mobile telephone all in one remote key or software regulating card for radio bicycle locks, cars, houses, and rfid tags, with authorisation and payment function
WO2007126375A1 (en) * 2006-04-28 2007-11-08 Sics, Swedish Institute Of Computer Science Ab Access control system and method for operating said system
US20100306549A1 (en) * 2008-01-30 2010-12-02 Evva Sicherheitstechnologie Gmbh Method and device for managing access control
US20110035604A1 (en) * 2008-10-21 2011-02-10 Habraken G Wouter Dual-Interface Key Management

Cited By (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140145823A1 (en) * 2012-11-27 2014-05-29 Assa Abloy Ab Access control system
WO2015042502A1 (en) * 2013-09-20 2015-03-26 Sargent & Greenleaf, Inc. System and method of initializing and controlling locks
CN105659564B (en) * 2013-09-20 2019-05-28 萨金特和格林利夫公司 The system and method for initializing and controlling lock
CN105659564A (en) * 2013-09-20 2016-06-08 萨金特和格林利夫公司 System and method of initializing and controlling locks
JP2015068086A (en) * 2013-09-30 2015-04-13 美和ロック株式会社 Lock system
CN103489245A (en) * 2013-10-18 2014-01-01 苏州新大诚科技发展股份有限公司 Passive smart lock system
CN103578169A (en) * 2013-11-19 2014-02-12 南京品佳科技开发有限公司 Intelligent informationized passive electronic lockset
CN103578169B (en) * 2013-11-19 2016-08-31 南京品佳科技开发有限公司 Intelligent information passive electronic lockset
EP2958085A1 (en) * 2014-06-17 2015-12-23 Burg-Wächter Kg Method for operating an electronic access system
WO2016001103A1 (en) * 2014-07-02 2016-01-07 Iblue Ag System for unlocking and locking a closing mechanism
CN104157060A (en) * 2014-08-15 2014-11-19 曹敏煊 Access control data transmission and management method
CN104157060B (en) * 2014-08-15 2017-04-05 曹敏煊 A kind of transmission of gate inhibition's data and management method
CN104851158A (en) * 2014-11-28 2015-08-19 讯美电子科技有限公司 Door-opening control system for entrance guard
CN114898482A (en) * 2014-12-02 2022-08-12 开利公司 Remote programming for access control systems using virtual card data
WO2016089846A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Remote programming for access control system with virtual card data
US11694498B2 (en) 2014-12-02 2023-07-04 Carrier Corporation Access control system with virtual card data
WO2016089837A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Capturing user intent when interacting with multiple access controls
WO2016089841A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Access control system with automatic mobile credentialing service hand-off
EP3228106B1 (en) 2014-12-02 2022-10-26 Carrier Corporation Remote programming for access control system with virtual card data
CN107004315A (en) * 2014-12-02 2017-08-01 开利公司 Utilize the metering-in control system of virtual card data
CN107004314A (en) * 2014-12-02 2017-08-01 开利公司 For the long-range programming of the metering-in control system using virtual card data
CN107005798A (en) * 2014-12-02 2017-08-01 开利公司 User view is captured when being interacted with multiple entrance controls
CN107004316A (en) * 2014-12-02 2017-08-01 开利公司 Using automatically move voucher authorize service switching metering-in control system
EP4068823A1 (en) * 2014-12-02 2022-10-05 Carrier Corporation Remote programming for access control system with virtual card data
WO2016089832A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Access control system with virtual card data
US10062226B2 (en) 2014-12-02 2018-08-28 Carrier Corporation Access control system with automatic mobile credentialing service hand-off
US11017623B2 (en) 2014-12-02 2021-05-25 Carrier Corporation Access control system with virtual card data
US10540835B2 (en) 2014-12-02 2020-01-21 Carrier Corporation Access control system with virtual card data
US10791444B2 (en) 2014-12-02 2020-09-29 Carrier Corporation Capturing user intent when interacting with multiple access controls
US10945112B2 (en) 2015-02-25 2021-03-09 Assa Abloy Ab Systems and methods for updating a mobile device
US11317266B2 (en) 2015-02-25 2022-04-26 Assa Abloy Ab Systems and methods for updating a mobile device
US10477369B2 (en) 2015-02-25 2019-11-12 Assa Abloy Ab Systems and methods for updating a mobile device
EP3062295A1 (en) * 2015-02-25 2016-08-31 Assa Abloy AB Systems and methods for updating a mobile device
US10192372B2 (en) 2015-03-23 2019-01-29 Assa Abloy Ab Considering whether a portable key device is located inside or outside a barrier
US10431026B2 (en) 2015-05-01 2019-10-01 Assa Abloy Ab Using wearable to determine ingress or egress
US10679440B2 (en) 2015-05-01 2020-06-09 Assa Abloy Ab Wearable misplacement
US11468720B2 (en) 2015-05-01 2022-10-11 Assa Abloy Ab Wearable misplacement
US11087572B2 (en) 2015-05-01 2021-08-10 Assa Abloy Ab Continuous authentication
US10854025B2 (en) 2015-05-01 2020-12-01 Assa Abloy Ab Wearable discovery for authentication
US10482698B2 (en) 2015-05-01 2019-11-19 Assa Abloy Ab Invisible indication of duress via wearable
US10490005B2 (en) 2015-05-01 2019-11-26 Assa Abloy Ab Method and apparatus for making a decision on a card
CN106600755A (en) * 2015-10-16 2017-04-26 巍世科技有限公司 Light wave encrypted and decrypted universal key system and operation method thereof
JP2017133286A (en) * 2016-01-29 2017-08-03 シャーロック株式会社 Electronic lock system
US11617053B2 (en) 2016-04-06 2023-03-28 Otis Elevator Company Mobile visitor management
US11043054B2 (en) * 2016-04-11 2021-06-22 Carrier Corporation Capturing user intent when interacting with multiple access controls
US11164411B2 (en) 2016-04-11 2021-11-02 Carrier Corporation Capturing personal user intent when interacting with multiple access controls
WO2017180563A1 (en) * 2016-04-11 2017-10-19 Carrier Corporation Capturing user intent when interacting with multiple access controls
US11341795B2 (en) 2016-04-11 2022-05-24 Carrier Corporation Capturing behavioral user intent when interacting with multiple access controls
WO2017180454A1 (en) * 2016-04-11 2017-10-19 Carrier Corporation Capturing communication user intent when interacting with multiple access controls
US11295563B2 (en) 2016-04-11 2022-04-05 Carrier Corporation Capturing communication user intent when interacting with multiple access controls
CN105915344A (en) * 2016-04-15 2016-08-31 重庆金瓯科技发展有限责任公司 Electronic key sharing service system for house renting
CN105915344B (en) * 2016-04-15 2019-03-22 重庆金瓯科技发展有限责任公司 A kind of electron key shared service system for house lease
US10839628B2 (en) 2016-05-03 2020-11-17 Johnson Controls Technology Company Virtual panel access control system
WO2017192215A1 (en) * 2016-05-03 2017-11-09 Johnson Controls Technology Company Virtual panel for access control system
US10477398B2 (en) 2016-09-16 2019-11-12 Samsung Electronics Co., Ltd. Method of providing secure access to hotel IoT services through mobile devices
EP3300033A1 (en) 2016-09-23 2018-03-28 SimonsVoss Technologies GmbH Access control system, portable user device, and method of controlling access
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core
CN107978033A (en) * 2016-10-24 2018-05-01 深圳市物联锁科技有限公司 A kind of smart lock exchange method
US11798333B2 (en) 2017-01-09 2023-10-24 Carrier Corporation Access control system with local mobile key distribution
US11238681B2 (en) 2017-01-09 2022-02-01 Carrier Corporation Access control system with local mobile key distribution
WO2018225019A1 (en) * 2017-06-08 2018-12-13 Karanvir Singh Electro mechanical sealing device
CN107481361A (en) * 2017-08-01 2017-12-15 安恒世通(北京)网络科技有限公司 A kind of electronics lock management method
US11913254B2 (en) 2017-09-08 2024-02-27 dormakaba USA, Inc. Electro-mechanical lock core
AT520583A1 (en) * 2017-10-17 2019-05-15 Makivic Michael Method for managing and organizing door closing system in objects
US11488428B2 (en) 2018-03-12 2022-11-01 Assa Abloy Ab Enabling distribution of a mobile key
EP3540656A1 (en) * 2018-03-12 2019-09-18 Assa Abloy AB Enabling distribution of a mobile key
US10891810B2 (en) 2018-03-12 2021-01-12 Assa Abloy Ab Enabling distribution of a mobile key
WO2019174170A1 (en) * 2018-03-15 2019-09-19 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for controlling an intelligent lock
US11447980B2 (en) 2018-04-13 2022-09-20 Dormakaba Usa Inc. Puller tool
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
US11339589B2 (en) 2018-04-13 2022-05-24 Dormakaba Usa Inc. Electro-mechanical lock core
CN108648313A (en) * 2018-05-11 2018-10-12 广东汇泰龙科技有限公司 A kind of user tag interactive approach and system based on intelligent cloud lock
WO2020182178A1 (en) * 2019-03-14 2020-09-17 菜鸟智能物流控股有限公司 Door lock control system, method and device for logistics object management device, and electronic apparatus
CN111179479A (en) * 2019-12-31 2020-05-19 北京三快在线科技有限公司 NFC simulation entrance guard card control method and device and electronic equipment
CN111815815A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock safety system
CN113002483B (en) * 2020-07-29 2022-08-02 上海荃信信息技术有限公司 Non-contact automobile key implementation method and device
CN113002483A (en) * 2020-07-29 2021-06-22 上海荃信信息技术有限公司 Non-contact automobile key implementation method and device
CN112002041A (en) * 2020-09-02 2020-11-27 赵辛 Intelligent conference access control system
WO2022141170A1 (en) * 2020-12-30 2022-07-07 Nanjing Easthouse Electrical Co., Ltd. Secure electronic lock systems and methods of using the same
WO2022191765A1 (en) * 2021-03-10 2022-09-15 Nordic Frameworks Ab Arrangement for managing, and communicating, an electronic key, and a system comprising the arrangement
SE2150275A1 (en) * 2021-03-10 2022-09-11 Nordic Frameworks Ab Arrangement for managing, and communicating, an electronic key, and a system comprising the arrangement

Also Published As

Publication number Publication date
EP2620919B1 (en) 2022-01-05

Similar Documents

Publication Publication Date Title
EP2620919B1 (en) Locking system
AU2016277638B2 (en) Credential management system
EP3192059B1 (en) First entry notification
EP2804153B1 (en) Electronic lock, locking system and method of operating an electronic lock
US9197313B2 (en) Remote control with near field communications capability
CN107004314B (en) Remote programming for access control systems using virtual card data
CA2926206C (en) A system and method for nfc peer-to-peer authentication and secure data transfer
US8635462B2 (en) Method and device for managing access control
CN101771754B (en) Mobile terminal and method for near-field communication thereof
US20160005248A1 (en) First entry notification
CN103118016B (en) A kind of Internet of Things trusted identities confirmation system and method
JP2018010449A (en) Smart lock authentication system and method in smart lock
JP2008504788A (en) Method for selecting one of a large number of data sets registered in a device and corresponding device
CN105934913A (en) Identification information transmission device, communication system, and communication method
US20160381495A1 (en) Application management system with contactless wrist
WO2023066816A1 (en) In-field encoding of access credentials
EP2819446A1 (en) Method of supplying a M2M device with secret data

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIMONSVOSS TECHNOLOGIES GMBH

17P Request for examination filed

Effective date: 20140131

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20170906

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602012077470

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G07C0009000000

Ipc: G07C0009270000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: G07C 9/27 20200101AFI20210701BHEP

INTG Intention to grant announced

Effective date: 20210719

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1461256

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220115

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602012077470

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20220105

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1461256

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220505

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220405

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220406

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220505

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20220131

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602012077470

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220126

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220131

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

26N No opposition filed

Effective date: 20221006

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20220405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220131

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220131

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220126

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220405

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220305

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20230130

Year of fee payment: 12

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20120126