EP2898483B1 - Method and system for the configuration of small locking systems - Google Patents

Method and system for the configuration of small locking systems Download PDF

Info

Publication number
EP2898483B1
EP2898483B1 EP13776980.8A EP13776980A EP2898483B1 EP 2898483 B1 EP2898483 B1 EP 2898483B1 EP 13776980 A EP13776980 A EP 13776980A EP 2898483 B1 EP2898483 B1 EP 2898483B1
Authority
EP
European Patent Office
Prior art keywords
data
smartphone
cloud
locking
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP13776980.8A
Other languages
German (de)
French (fr)
Other versions
EP2898483A1 (en
Inventor
Ludger Voss
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SimonsVoss Technologies GmbH
Original Assignee
SimonsVoss Technologies GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SimonsVoss Technologies GmbH filed Critical SimonsVoss Technologies GmbH
Priority to EP13776980.8A priority Critical patent/EP2898483B1/en
Publication of EP2898483A1 publication Critical patent/EP2898483A1/en
Application granted granted Critical
Publication of EP2898483B1 publication Critical patent/EP2898483B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication

Definitions

  • the invention relates to a method and a system for configuring electronic small locking systems with electronic locks, preferably electronic locking cylinders, which can preferably communicate with passive RFID cards.
  • the present invention relates to a method and system with which not only the locks / lock cylinders but also corresponding electronic identification media for unlocking the locks / lock cylinders can be easily configured, preferably using a smartphone.
  • Electronic locking systems have the advantage over mechanical locking systems that each lock or each access-authorized key, for example in the form of a transponder or RFID card, is individually configurable. To prevent manipulation, however, a complex system for the allocation and management of access rights, as well as for the generation of key data is necessary, consisting of database servers and user interface clients, as well as a Programmierinfrasturktur with programming devices and / or network infrastructure. It must be ensured that appropriate computer systems are set up safely and equipped with suitable software. Since the costs of this infrastructure are not negligible, electronic locking systems are typically used only from a certain number of lock cylinder / locks / fittings (hereinafter referred to as closure). The average locking system size is approx. 100 cylinders / fittings and approx.
  • the US2012 / 0213362A1 shows a method for configuring a key / lock system by means of a smartphone, which communicates via radio with a central server.
  • the object of the invention is therefore to provide a simplified method or system with which preferably fast, reliable and user-friendly electronic small locking systems can be configured.
  • the locking system which preferably comprises electronic locks and RFID cards for actuating the locks, can be configured by means of a smartphone.
  • a smartphone can also be understood as a small portable computer (PDA or tablet computer), preferably a small portable computer with additional functionality of a mobile phone.
  • PDA small portable computer
  • the smartphone which is equipped with appropriate software (an app), is used according to the invention as a link between the locks and the complex system for managing and generating corresponding data sets for operating the locks.
  • an app is used according to the invention as a link between the locks and the complex system for managing and generating corresponding data sets for operating the locks.
  • sensitive data of the locking system are stored outside of the smartphone and preferably also outside the company that wishes to use the locking system.
  • This central facility Part of this cloud provides a so-called SOHO cloud LSM service, which will be explained in more detail below:
  • the admin app accesses this SOHO cloud LSM service, to save locking system data centrally "in the cloud” and to request key and programming data.
  • a key server can be used to distribute key data, preferably a mobile-key server that can distribute key data to mobile phones / smartphones.
  • the distribution of key data to mobile phones / smartphones preferably takes place wirelessly, so that an appealing mobile key server is also referred to as an OTA mobile key server.
  • the admin app can directly access the (OTA) mobile key server.
  • the (OTA) mobile key server can also be addressed via the cloud.
  • a "SOHO cloud LSM service” which is preferably part of the cloud, serves as the central service of the SOHO infrastructure.
  • the user data and / or user profiles (admin access data, authorization matrix, etc.) of the user are stored and / or managed.
  • the preferred central storage of the data "in the cloud” makes it possible to conveniently manage a SOHO locking system from different devices.
  • Security-relevant data such as the locking system password are preferably not stored in the cloud, but this is also conceivable.
  • the SOHO cloud LSM service is preferably addressed by the admin app and communicates with a record service (see for example Fig. 1 ). Programming requirement calculation as well as key data records and programming protocols can be provided by the record service.
  • the record service according to the invention is a service preferably used by the SOHO cloud LSM server, which can generate key and / or programming data sets for the locks (eg locks / lock cylinders) of the locking system.
  • the generated data records preferably go back to the SOHO Cloud LSM service from the record service and can be delivered from there to the Admin app on the administrator's smartphone (lock programming, creation of conventional key cards) and / or on the one described above Mobile key server, preferably on deposited with the OTA Mobile Key Server.
  • the record service is addressed directly by the SOHO cloud LSM service.
  • a mobile-key server is preferably used for distributing key data to suitable media, i.e., mobile phones that serve as keys, transponders that serve as electronic keys, or RFID cards that can serve as electronic keys.
  • the distribution of key data from the Mobile Key Server is wireless, i.e., Over The Air (OTA).
  • OTA Over The Air
  • the OTA mobile key server is addressed by the admin app for rolling out / distributing the key data.
  • the Admin App stores key data on the OTA Mobile Key Server.
  • key data can also be stored on the OTA Mobile Key Server by the SOHO Cloud LSM Service.
  • the locking system according to the invention can manage a variety of different electronic-mechanical locking mechanisms (locks), such as special electronic locks, electronic lock cylinders, electronic fittings, etc. Since the spirit of the invention is not in the nature of the electronic-mechanical locking mechanisms used, commonly used term is closure include all these locking mechanisms.
  • the closure After waking up, the closure searches for a field coming from a reader. If a field is present, the closure switches to card emulation mode and can be read out accordingly via external commands and programmed with programming protocols. If no field is present, the closure will now actively attempt as a reader to read a key (key data) from an ID medium (key card, iCarte adapter, etc.).
  • a locking system comprising at least one electronic closure and at least one identification medium for actuating the closure.
  • a locking system according to the invention comprises a plurality of locks and a plurality of identification media, wherein a configuration on the one hand serves for the inventory of the locks and ident media, ie it is determined which locks and which ident media belong to the locking system.
  • the configuration of the locking system is used to assign access rights, ie it is determined which ident medium to open which closures are used.
  • the configuration preferably includes the following steps. First, a smartphone with a software (admin app) should be provided for configuration, the smartphone can communicate with the locks and the identification medium via radio.
  • this serves to uniquely identify the locks and the ID medium and, on the other hand, to program the locks and identification media.
  • an identification and programming of the closures and identification media takes place by simply "coming off”.
  • an assignment of access rights with regard to the data media to the locks can be made using the Admin-App on the Smartphone.
  • this assignment of access rights by means of a locks ident media matrix, which is visualized on the display of the smartphone.
  • these access rights and their assignment are stored locally on the smartphone.
  • data required for managing the locking system is transmitted to the cloud.
  • these data contain the assignment of the access rights, data relating to the locks of the locking system and / or data relating to the ident media of the locking system, possibly even user data.
  • a new data record is generated in the cloud, which preferably comprises encrypted programming data or unencrypted programming data, which is used to program the shutters.
  • this newly generated record preferably contains key data that can be stored on ident media and used to operate the locks.
  • the newly generated data record preferably contains encrypted or unencrypted programming data and / or encrypted or unencrypted key data, which are transmitted from the cloud to the smartphone.
  • a closure can be, for example, a device from the group: electronic lock cylinder, electronic lock and electronic fitting.
  • an identification medium can be, for example, a device from the group: RFID card, key card, smartphone with RFID functionality and transponder.
  • An RFID functionality of a smartphone can be achieved, for example, with the aid of an adapter.
  • the assignment of access rights of Idenmedien to corresponding closures can be made according to the invention preferably very easily by means of a locks ident media matrix, which is shown on the display of the smartphone.
  • the cloud includes at least two services, a record service and a cloud LSM service.
  • the smartphone preferably communicates with the cloud LSM service wherein this cloud LSM service preferably communicates with the record service.
  • the data record service is preferably used for generating key data and / or programming data that are preferably part of a data record that is generated by the data record service.
  • user data is also stored or generated on the basis of the allocations on the cloud LSM service.
  • the cloud may include a mobile key server.
  • this mobile-key server is realized as an OverTheAir mobile-key server, so that the key data can be sent wirelessly, preferably via the mobile network to a smartphone with appropriate software (mobile key app).
  • the method according to the invention makes it possible to already inventorize existing locking systems and also to add further locks and / or identification media to the locking system by means of an inventory.
  • Lock plan data may include, for example, locker password, unique hardware identifiers of the locks along with the user-assigned names, unique IDs of the cards / adapters along with user-assigned usernames, lock permissions, who closes where, and may have time constraints.
  • a subordinate service then generates programming logs for all affected devices (locks, cards, adapters / iCartes) and sends them back to the user's smartphone. There they are first cached (in a place without special Safety requirements). If the user then subsequently taps the individual devices in any order a second time, the programming protocols prepared for the respective device are run. This process can be so fast that even a single session (from the user's point of view) is sufficient. The device data is recorded and sent together with the locking plan data to the SOHO cloud server, where it is processed and resulting programming protocols are sent back to the smartphone and immediately programmed into the respective device (lock / card / ICarte adapter).
  • the communication to the cloud servers is preferably secured https.
  • the admin phone is preferably safe. It is operated by the person who has the sovereignty over the locking system anyway.
  • Programming data records are digitally signed by the SOHO Cloud Service and the signature is verified by the respective closure so that no manipulation is possible on the way between server and closure.
  • the communication between record service via Mobile-Key Server to the adapters is preferably encrypted end-to-end (adapters (iCartes) / microSDs are initialized once by the admin with a key-data-key, then they can with the OTA servers communicate without the help of the admins.
  • FIG. 1 shows as a first embodiment of the invention a schematic overview of the basic structures of a system according to the invention.
  • An advantage of the invention is that the locking system - preferably comprising a plurality of electronic locks - preferably installed and / or managed by using an admin app 1, which can be preferably carried out on a mobile phone, a smartphone, a tablet computer and / or a computer can be.
  • the admin app may be considered as an implementation of a system component according to the invention that represents a user interface.
  • the admin app preferably provides at least one of the following features:
  • authentication of an administrator by the admin app is initially preferred in order to prevent manipulation.
  • an administrator can authenticate himself in a login window with input field for user name and password (login password), whereby the password can also be the locking system password.
  • the login password and the locking system password may be different passwords / passwords. For example, when you log in for the first time, an entry field appears for creating a new user name plus password including password repetition.
  • a secure item is available on the smartphone, for example a secure element for NFC running the admin app, the password can be stored in the secure element, so that for subsequent logins, for example, a short PIN is considered sufficient for authentication can.
  • the thus authenticated user can now, for example, identify media (for example key card 11 in FIG Fig. 1 ), locks (for example, lock 10 in Fig. 1 ) invest.
  • the locks of the locking system are registered with the corresponding identification media.
  • the administrator can specify with which ID media which locks can be opened, ie, an assignment of access rights of the ID media to the locks can take place, which are visualized, for example, in a lock ID media matrix.
  • a closure identifier matrix is shown generally, and more particularly in FIG Fig. 3 shown.
  • the assignment of closure to identification medium is cached locally only in the smartphone.
  • the inventive method allows in addition to the creation of closures "Success" pop-up and then gets the locks ident media matrix and identification media and the inventory of locks and ID media.
  • you get a short display of the smartphone see Figures 2 and 3 .
  • the lock identification media matrix can then be changed by adding new locks (Add Lock) or new identifiers (Add Key).
  • each successful login may / must first be checked on the SOHO cloud server whether there is already locking system data for this account. If so, they are downloaded and visualized in the matrix. A successful download is therefore in this case preferably a prerequisite for a subsequent work on the locking plan.
  • Fig. 4 If you tap on one of the "Add" symbols (Add Key, Add Lock), an additional empty column or row is created in the matrix and the lower half of the display shows a keyboard so that you now have a name for the closure to be added / Ident medium can assign (see Fig. 4 ).
  • the name should preferably be entered at the right place in the matrix when typing.
  • the matrix is preferably automatically scrolled so that the name field to be described is visible.
  • the keyboard disappears and you are back in the view of Fig. 3 ,
  • the newly created closure is highlighted (eg blue background) and the font is eg italic (this is the indication that the closure is not yet inventoried).
  • the user / administrator has the choice to immediately tap this marked closure with the smartphone or touch one of the "Add" icons again.
  • a closure is tapped, ie, wireless communication between the smartphone and the closure is established, the closure is inventoried by name and UID / PHI and then preferably appears in normal font in the matrix, symbolizing a completed process. If, on the other hand, it has not been tapped, the typeface remains italic, so that the closure is not yet inventoried.
  • the inventory can preferably be made up at any time by marking the name of the closure to be inventoried by tapping on the smartphone (eg causes a blue deposit).
  • Such a locking system can be easily visualized on the display of the smartphone by means of the closures ident media matrix according to the invention (see Fig. 5 ).
  • the lock facility name (“Peter's Lockplan”); the locks / locks ("Main Entrance”, Door lock No 1, 7), the identification media ("Master Key”, Peter Martens, 7), the authorization structure (see below), markings (eg deposit), Programming requirements (lightning symbol), possible time restrictions for ident media (clock symbol).
  • this matrix is scrollable by "touch and drag”.
  • the matrix can be wound up so that the input fields can be enlarged in such a way that it is easy to set or remove authorization crosses using a fingertip.
  • the assignment of access authorizations is preferably done by tapping authorization fields in the matrix.
  • the withdrawal of access authorizations is preferably carried out by tapping again. This usually creates programming needs, which after a "Save to Cloud” (see Fig. 3 ) and automatic download of the programming data (see below) is visualized with programming demand flashes. Programming requirements are preferably displayed both in the affected locks and in the affected ident media.
  • the matrix according to the invention also allows a clear visualization of programming target and actual states.
  • authorization state There are preferably four possibilities for the authorization state, which can be visualized as follows: (i) no cross displayed, ID medium should not be authorized and is not authorized (no programming requirement); (ii) cross in italics or shown in a thin line, identification medium should be authorized if closed, but not yet authorized (program requirement); (iii) cross bold (bold) shown thin, ident medium authorized and is also eligible (no programming needs); (iv) Cross displayed in reverse, identification medium should not be authorized, but is still eligible (programming requirement).
  • Device specific properties are assigned, for example, by tapping Devices (locks or ID media) twice in the matrix (alternative: long tap). After tapping the name of a device for the first time, this will be e.g. deposited (In this state, which is reached after a single tap, one could inventorize a device that has not yet been inventoried by means of an appendage, see above). If you tap the name of the just-selected device a second time, the following specific properties can preferably be assigned.
  • a dialog window with editable input fields can be opened in which the name of the closure and / or how long the closure should remain open after opening can be entered. If the closure is already inventoried and a "save to cloud" has already taken place, then in addition e.g. a question mark symbol that releases a transparent information field with closing data after clicking.
  • Similar dialog boxes can be edited for an ident medium, ie, for example, the name of the key ("Name of Key”) and / or periods at which the identification medium has access to the key ("Key shall be valid from", “Key shall expire”). ). If the identification medium has already been completely inventoried and the system has determined that it is a smartphone, further input fields may appear which determine how long the identification medium is valid after a download ("Key shall be valid for hours after download of key data ").
  • the storage of locking system data in the cloud, as well as the passage of key data received from the cloud for smartphones to the OTA key server is preferably carried out after tapping the button "Save to Cloud" in the matrix base view.
  • a dialog box will be displayed showing the process progress with progress bar.
  • web service-based functionalities can store all administrator-generated locking system data in the SV locker database of the SOHO cloud server. These functionalities form the so-called SIK (Software Integration Kit) interface to already managed locking system data.
  • SIK Software Integration Kit
  • all data can be downloaded from the cloud for a visualization in the matrix after successful login of the admin.
  • a service is available, which can determine all programming needs.
  • programming data records for all locks and identification media are determined or calculated by a central service (record service 102) and then sent back to the admin smartphone and stored there.
  • key data data for the identification media
  • smartphones can also be sent to the OTA key server 103, from where they can always be fetched by the MobileKey users (MobileKey App). This is in the Fig. 1
  • the key data may also be sent from the SOHO cloud LSM service 101 directly to the OTA key server 103 (not directly shown in FIG Fig. 1 ).
  • a central service of the system according to the invention is the SOHO cloud LSM service.
  • This service allows the storage and administration of user data and profiles (admin access data, authorization matrix, etc.) of the SOHO users on a central database server.
  • the central storage of data "in the cloud” makes it easy to manage a SOHO locking system from different devices. Security relevant data such. However, the locking system password, for example, is not stored in the cloud.
  • the SOHO Cloud LSM service is addressed by the Admin app and communicates with the record service.
  • the invention also includes the exact or exact terms, features, numerical values or ranges, etc. when, above or below, these terms, features, numerical values or ranges are used in conjunction with terms such as, for example. "about, about, essentially, in general, at least, at least”, etc., were called (ie, “about 3” should also “3” or “substantially radially” should also include “radial”).
  • the expression “or” means moreover “and / or”.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Description

Die Erfindung betrifft ein Verfahren sowie ein System zur Konfiguration elektronischer Kleinschließanlagen mit elektronischen Schlössern, vorzugsweise elektronischen Schließzylindern, die vorzugsweise mit passiven RFID Karten kommunizieren können. Insbesondere betrifft die vorliegende Erfindung ein Verfahren und System mit dem nicht nur die Schlösser / Schließzylinder, sondern auch entsprechende elektronische Identmedien zum Entriegeln der Schlösser / Schließzylinder einfach konfiguriert werden können, vorzugsweise unter Verwendung eines Smartphones.The invention relates to a method and a system for configuring electronic small locking systems with electronic locks, preferably electronic locking cylinders, which can preferably communicate with passive RFID cards. In particular, the present invention relates to a method and system with which not only the locks / lock cylinders but also corresponding electronic identification media for unlocking the locks / lock cylinders can be easily configured, preferably using a smartphone.

HINTERGRUND DER ERFINDUNGBACKGROUND OF THE INVENTION

Elektronische Schließanlagen haben gegenüber mechanischen Schließanlagen den Vorteil, dass jedes Schloss bzw. jeder zutrittsberechtigende Schlüssel, beispielsweise in Form eines Transponders bzw. als RFID Karte, individuell konfigurierbar ist. Um Manipulationen zu verhindern, ist jedoch ein komplexes System für die Vergabe und Verwaltung von Zutrittsrechten, sowie zur Generierung von Schlüsseldaten notwendig, bestehend aus Datenbankservern und User-Interface Clients, sowie einer Programmierinfrasturktur mit Programmiergeräten und/oder Netzwerkinfrastruktur. Es ist sicherzustellen, dass entsprechende Computersysteme sicher aufgebaut werden und mit geeigneter Software ausgestattet sind. Da die Kosten für diese Infrastruktur nicht zu vernachlässigen sind, werden elektronische Schließanlagen typischerweise erst ab einer bestimmten Anzahl von Schließzylinder/Schlössern/Beschlägen (im Folgenden als Schließung bezeichnet) eingesetzt. Die durchschnittliche Schließanlagengröße liegt bei ca. 100 Zylindern/Beschlägen und ca. 250 Schließmedien (Transpondern). Derartige Systeme unterstützten sehr gut mittlere Anlagen und Großanlagen. Kleinschließanlagen in der Größenordnung von typischerweise unter 100, beispielsweise ca. 10 Schließungen wurden dagegen selten mit den technisch vorteilhaften elektronischen Schließungen ausgerüstet. Gründe dafür sind unter anderem die relativ hohen Investitionen in Programmierumgebungen (Hardware und Software), aber auch der relativ hohe Schulungsaufwand für eine Software, die eigentlich für größere Anwendungen vorgesehen ist. Zudem wird der Aufwand für kleinere Schließanlagen, beispielsweise für kleinere Büros mit wenigen Schlössern und wenigen Zutrittsberechtigenden Personen, als abschreckend empfunden.Electronic locking systems have the advantage over mechanical locking systems that each lock or each access-authorized key, for example in the form of a transponder or RFID card, is individually configurable. To prevent manipulation, however, a complex system for the allocation and management of access rights, as well as for the generation of key data is necessary, consisting of database servers and user interface clients, as well as a Programmierinfrasturktur with programming devices and / or network infrastructure. It must be ensured that appropriate computer systems are set up safely and equipped with suitable software. Since the costs of this infrastructure are not negligible, electronic locking systems are typically used only from a certain number of lock cylinder / locks / fittings (hereinafter referred to as closure). The average locking system size is approx. 100 cylinders / fittings and approx. 250 locking media (transponders). Such systems very well support medium sized plants and large plants. Small locking systems in the order of typically less than 100, for example, about 10 locks were, however, rarely equipped with the technically advantageous electronic locks. Reasons for this include the relatively high investment in programming environments (hardware and software), but also the relatively high training costs for a software that is actually intended for larger applications. In addition, the effort for smaller locking systems, for example, for smaller offices with a few locks and few people entitled to access, perceived as a deterrent.

Die US2012/0213362A1 zeigt ein Verfahren zur Konfiguration eines Schlüssel-/Schloss Systems mittels eines Smartphones, welches über Funk mit einem zentralen Server kommuniziert.The US2012 / 0213362A1 shows a method for configuring a key / lock system by means of a smartphone, which communicates via radio with a central server.

Aufgabe der Erfindung ist es daher ein vereinfachtes Verfahren bzw. System bereitzustellen, mit dem vorzugsweise schnell, zuverlässig und benutzerfreundlich elektronische Kleinschließanlagen konfiguriert werden können.The object of the invention is therefore to provide a simplified method or system with which preferably fast, reliable and user-friendly electronic small locking systems can be configured.

ZUSAMMENFASSUNG DER ERFINDUNGSUMMARY OF THE INVENTION

Diese Aufgabe wird mit dem Verfahren des unabhängigen Anspruchs 1 gelöst. Weitere bevorzugte Ausführungen der Erfindung sind in den abhängigen Ansprüchen beansprucht.This object is achieved by the method of independent claim 1. Further preferred embodiments of the invention are claimed in the dependent claims.

Insbesondere wird mit der vorliegenden Erfindung eine Komplettlösung für kleinere Schließanlagen bereitgestellt, mit der vorzugsweise auf eine komplexe Installation entsprechender Software im eigenen Unternehmen überflüssig wird. Erfindungsgemäß kann das Schließsystem, das vorzugsweise elektronische Schlösser und RFID Karten zum Betätigen der Schlösser umfasst, mittels eines Smartphones konfiguriert werden.In particular, with the present invention, a complete solution for smaller locking systems is provided with the preferably on a complex installation of appropriate software in their own company is unnecessary. According to the invention, the locking system, which preferably comprises electronic locks and RFID cards for actuating the locks, can be configured by means of a smartphone.

Als Smartphone wird üblicherweise ein Mobiltelefon bezeichnet, das mehr Computerfunktionalität und -konnektivität als ein herkömmliches fortschrittliches Mobiltelefon zur Verfügung stellt. Aktuelle Smartphones lassen sich meist über zusätzliche Programme (sogenannte "Apps") vom Anwender individuell mit neuen Funktionen aufrüsten. Ein Smartphone kann auch als ein kleiner transportabler Computer (PDA bzw. Tablet-Computer) verstanden werden, vorzugsweise ein kleiner transportabler Computer mit zusätzlicher Funktionalität eines Mobiltelefons. Das Smartphone, das mit einer entsprechenden Software ausgestattet ist (einer App), dient erfindungsgemäß als Bindeglied zwischen den Schlössern und dem Komplexen System zur Verwaltung und Generierung entsprechender Datensätze zur Betätigung der Schlösser. Im Folgenden werden einzelne Systemkomponenten, die Teil des erfindungsgemäßen Systems/Verfahrens bilden können, genauer beschrieben.As a smart phone is commonly referred to a mobile phone that provides more computer functionality and connectivity than a conventional advanced mobile phone. Current smartphones can usually be upgraded with additional functions by the user via additional programs (so-called "apps"). A smartphone can also be understood as a small portable computer (PDA or tablet computer), preferably a small portable computer with additional functionality of a mobile phone. The smartphone, which is equipped with appropriate software (an app), is used according to the invention as a link between the locks and the complex system for managing and generating corresponding data sets for operating the locks. In the following, individual system components which can form part of the system / method according to the invention are described in more detail.

Admin-App auf Mobiltelefon des AdministratorsAdmin app on mobile phone of the administrator

Vorzugsweise können sämtliche Konfigurationsaufgaben für eine erfindungsgemäße Schließanlage bzw. Kleinschließanlage (im Folgenden auch SOHO-Schließanlage genannt; SmallOfficeHomeOffice-Schließanlage) von einem Administrator über eine "Admin-App" durchgeführt werden, die vorzugsweise auf einem Smartphone und/oder einem kleinen transportablen Computer ausführbar ist. Zu den erfindungsgemäßen administrativen Aufgaben kann beispielsweise mindestens eine der folgenden Aufgaben gezählt werden:

  1. (i) Die Registrierung und Erstellung einer neuen Schließanlage, vorzugsweise inklusiv Anlegen von Admin-Accounts auf einem SOHO-Cloud-Server und einem OTA-Key Server (OverTheAir-Schlüssel Server).
  2. (ii) Die Inventarisierung einer Schließanlage, bei der die zugehörigen Schließungen (z.B. Schlösser/SchließzylinderBeschläge) und Identmedien (elektronische Schlüssel; z.B. RFID Karten, Smartphones, Transponder) erfasst und/oder verwaltet werden.
  3. (iii) Das Visualisieren der Schließanlage in Form einer per "Touch-and-Drag", vorzugsweise scrollbaren sowie optional aufziehbaren Schließungen-Identmedien-Matrix, wobei diese Matrix vorzugsweise im Rahmen eines Inventarisierungsprozesses entsteht und/oder durch manuelles Hinzufügen von noch nicht inventarisierten Schließungen, bzw. Identmedien erfolgt.
  4. (iv) Das Handling und die Visualisierung von Programmier-Soll/Ist-Zuständen, wobei zur Ermittlung von Programmierbedürfnissen vorzugsweise auf einen Cloud-Service zurückgegriffen werden kann.
  5. (v) Das Vergeben von Zugangsberechtigungen, vorzugsweise per Antippen von Berechtigungsfeldern in der Schließungen-Identmedien-Matrix.
  6. (vi) Die Vergabe Identmedien spezifischer zeitlicher Beschränkungen (z.B.: gültig von ... bis ...; gültig am ...), vorzugsweise nach Antippen von Identmedien in der Schließungen-Identmedien-Matrix.
  7. (vii) Das Ablegen so erstellter Schließanlagendaten in der Cloud (SOHO Cloud Server und/oder OTA MobileKey Server).
  8. (viii) Das Herunterladen von Schließanlagendaten für die Matrixvisualisierung sowie von Programmierprotokollen für die Programmierung von Schlössern und optional auch von nicht-OTA-fähigen Identmedien (z. B. Schlüsselkarten).
  9. (ix) Die Programmierung von Schlössern und/oder Identmedien über Programmierprotokolle, beispielsweise über eine drahtlose Schnittstelle (z.B. NFC-Schnittstelle, Bluetooth-Schnittstelle) oder eine kabelgebundene Schnittstelle.
Preferably, all configuration tasks for a locking system according to the invention or small locking system (hereinafter also referred to as SOHO locking system; SmallOfficeHomeOffice locking system) can be performed by an administrator via an "Admin App", which can preferably be executed on a smartphone and / or a small portable computer is. For example, at least one of the following tasks can be counted for the administrative tasks according to the invention:
  1. (i) The registration and creation of a new locking system, preferably including the creation of admin accounts on a SOHO cloud server and an OTA key server (OverTheAir key server).
  2. (ii) The inventory of a locking system in which the associated locks (eg locks / lock cylinder fittings) and identification media (electronic keys, eg RFID cards, smartphones, transponders) are recorded and / or managed.
  3. (iii) The visualization of the locking system in the form of a "touch-and-drag", preferably scrollable and optionally windable locks identification media matrix, this matrix preferably arises as part of an inventory process and / or by manually adding not yet inventoried locks , or ident media takes place.
  4. (iv) The handling and visualization of programming target / actual states, wherein for the determination of programming needs preferably on a cloud service can be used.
  5. (v) Assigning access permissions, preferably by tapping authorization fields in the lock identity media matrix.
  6. (vi) The assignment of identification media of specific time restrictions (eg: valid from ... to ..., valid on ...), preferably after tapping on ident media in the lock identification media matrix.
  7. (vii) The storage of such created locking system data in the cloud (SOHO Cloud Server and / or OTA MobileKey Server).
  8. (viii) Download lock data for matrix visualization and programming protocols for the programming of locks and, optionally, non-OTA enabled identifiers (eg key cards).
  9. (ix) The programming of locks and / or identification media via programming protocols, for example via a wireless interface (eg NFC interface, Bluetooth interface) or a wired interface.

Erfindungsgemäß werden sensible Daten der Schließanlage außerhalb des Smartphones und vorzugsweise auch außerhalb des Unternehmens, welches die Schließanlage verwenden möchte, gespeichert. Dies wird beispielsweise dadurch erreicht, dass diese Daten zentral gespeichert werden, vorzugsweise zentral in eigens dafür eingerichteten Einrichtungen die vom Anbieter/Hersteller der Schließanlage bereitgestellt werden. Diese zentrale Einrichtung sei hier alsCloud" (100) bezeichnet. Ein Teil dieser Cloud stellt einen sogenannten SOHO-Cloud-LSM-Service bereit, der weiter unten noch genauer erklärt wird. Vorzugsweise greift die Admin-App auf diesen SOHO-Cloud-LSM-Service zu, um Schließanlagendaten zentral "in der Cloud" zu speichern und Schlüssel- und Programmierdaten anzufordern.According to the invention, sensitive data of the locking system are stored outside of the smartphone and preferably also outside the company that wishes to use the locking system. This is achieved, for example, in that these data are stored centrally, preferably centrally in specially equipped facilities that are provided by the provider / manufacturer of the locking system. This central facility Part of this cloud provides a so-called SOHO cloud LSM service, which will be explained in more detail below: Preferably, the admin app accesses this SOHO cloud LSM service, to save locking system data centrally "in the cloud" and to request key and programming data.

Zum Verteilen von Schlüsseldaten kann beispielsweise ein Key-Server dienen, vorzugsweise ein Mobile-Key-Server der Schlüsseldaten an Mobiltelefone/Smartphones verteilen kann. Vorzugsweise erfolgt die Verteilung von Schlüsseldaten an Mobiltelefone / Smartphones drahtlos, sodass ein einsprechender Mobile-Key-Server auch als OTA-Mobile-Key-Server bezeichnet wird. Gemäß einer bevorzugten Ausführungsform kann die Admin-App direkt auf den (OTA)Mobile-Key-Server zugreifen. Alternativ oder zusätzlich kann der (OTA)Mobile-Key-Server auch über die Cloud angesprochen werden.For example, a key server can be used to distribute key data, preferably a mobile-key server that can distribute key data to mobile phones / smartphones. The distribution of key data to mobile phones / smartphones preferably takes place wirelessly, so that an appealing mobile key server is also referred to as an OTA mobile key server. According to a preferred embodiment, the admin app can directly access the (OTA) mobile key server. Alternatively or additionally, the (OTA) mobile key server can also be addressed via the cloud.

SOHO-Cloud-LSM-ServiceSOHO cloud LSM Service

Vorzugsweise dient ein "SOHO-Cloud-LSM-Service", der vorzugsweise ein Teil der Cloud ist, als zentraler Dienst der SOHO-Infrastruktur. Hier werden die Benutzerdaten und/oder Benutzerprofile (Admin-Zugangsdaten, Berechtigungsmatrix etc.) der Benutzer abgelegt und/oder verwaltet. Durch die bevorzugte zentrale Speicherung der Daten "in der Cloud" wird das bequeme Verwalten einer SOHO-Schließanlage von unterschiedlichen Geräten aus möglich. Sicherheitsrelevante Daten wie z.B. das Schließanlagenpasswort werden vorzugsweise nicht in der Cloud gespeichert, was jedoch auch denkbar ist. Der SOHO-Cloud-LSM-Service wird vorzugsweise von der Admin-App aus angesprochen und kommuniziert mit einem Datensatz-Service (siehe beispielsweise Fig. 1). Programmierbedarfsberechnung sowie Schlüsseldatensätze und Programmierprotokolle können vom Datensatz-Service bereitgestellt werden.Preferably, a "SOHO cloud LSM service", which is preferably part of the cloud, serves as the central service of the SOHO infrastructure. Here, the user data and / or user profiles (admin access data, authorization matrix, etc.) of the user are stored and / or managed. The preferred central storage of the data "in the cloud" makes it possible to conveniently manage a SOHO locking system from different devices. Security-relevant data such as the locking system password are preferably not stored in the cloud, but this is also conceivable. The SOHO cloud LSM service is preferably addressed by the admin app and communicates with a record service (see for example Fig. 1 ). Programming requirement calculation as well as key data records and programming protocols can be provided by the record service.

Datensatz-ServiceRecord Service

Der erfindungsgemäße Datensatz-Service ist ein vorzugsweise vom SOHO-Cloud-LSM-Server verwendeter Dienst, der für die Schließungen (z.B. Schlösser/Schließzylinder) der Schließanlage Schlüssel- und/oder Programmierdatensätze generieren kann. Die generierten Datensätze gehen vorzugsweise vom Datensatz-Service zurück an den SOHO-Cloud-LSM-Dienst und können von dort aus an die Admin-App auf dem Smartphone des Administrators ausgeliefert werden (Schlossprogrammierung, Erstellung herkömmlicher Schlüsselkarten) und/oder auf dem oben beschriebenen Mobile-Key-Server, vorzugsweise auf dem OTA-Mobile-Key-Server hinterlegt werden. Vorzugsweise wird der Datensatz-Service direkt vom SOHO-Cloud-LSM-Service angesprochen.The record service according to the invention is a service preferably used by the SOHO cloud LSM server, which can generate key and / or programming data sets for the locks (eg locks / lock cylinders) of the locking system. The generated data records preferably go back to the SOHO Cloud LSM service from the record service and can be delivered from there to the Admin app on the administrator's smartphone (lock programming, creation of conventional key cards) and / or on the one described above Mobile key server, preferably on deposited with the OTA Mobile Key Server. Preferably, the record service is addressed directly by the SOHO cloud LSM service.

(OTA)Mobile-Key-Server(OTA) Mobile-key server

Ein erfindungsgemäßer Mobile-Key-Server dient vorzugsweise zur Verteilung von Schlüsseldaten an geeignete Medien, d.h., Mobiltelefone, die als Schlüssel dienen, Transponder, die als elektronische Schlüssel dienen, oder RFID-Karten, die als elektronische Schlüssel dienen können. Vorzugsweise erfolgt die Verteilung von Schlüsseldaten vom Mobile Key Server drahtlos, d.h., Over The Air (OTA). Im Folgenden wird dies auch als OTA-Verteilung von Schlüsseln bzw. OTA-Ausrollung von Schlüssel bezeichnet. Vorzugsweise wird der OTA Mobile-Key-Server von der Admin-App zum Ausrollen/Verteilen der Schlüsseldaten angesprochen. Beispielsweise können von der Admin-App Schlüsseldaten auf dem OTA Mobile-Key-Server hinterlegt werden. Zusätzlich oder alternativ können auch vom dem SOHO-Cloud-LSM-Service Schlüsseldaten auf dem OTA Mobile-Key-Server hinterlegt werden.A mobile-key server according to the invention is preferably used for distributing key data to suitable media, i.e., mobile phones that serve as keys, transponders that serve as electronic keys, or RFID cards that can serve as electronic keys. Preferably, the distribution of key data from the Mobile Key Server is wireless, i.e., Over The Air (OTA). Hereinafter, this is also referred to as keys OTA distribution or OTA key rollout. Preferably, the OTA mobile key server is addressed by the admin app for rolling out / distributing the key data. For example, the Admin App stores key data on the OTA Mobile Key Server. In addition or as an alternative, key data can also be stored on the OTA Mobile Key Server by the SOHO Cloud LSM Service.

Schließungclosure

Das erfindungsgemäße Schließsystem kann eine Vielzahl unterschiedlicher elektronisch-mechanische Schließmechanismen (Schließungen) verwalten, beispielsweise spezielle elektronische Schlösser, elektronische Schließzylinder, elektronische Beschläge usw. Da der Geist der Erfindung nicht in der Art der verwendeten elektronisch-mechanischen Schließmechanismen liegt, soll allgemein verwendete Begriff Schließung all diese Schließmechanismen umfassen.The locking system according to the invention can manage a variety of different electronic-mechanical locking mechanisms (locks), such as special electronic locks, electronic lock cylinders, electronic fittings, etc. Since the spirit of the invention is not in the nature of the electronic-mechanical locking mechanisms used, commonly used term is closure include all these locking mechanisms.

Die vorzugsweise drahtlose Kommunikation mit der Schließung erfolgt vorzugsweise über ein APDU-basiertes Protokoll. Mit APDU (Application Protocol Data Unit) wird üblicherweise eine Kommunikationseinheit zwischen einer Chipkarte und einer Chipkartenanwendung nach dem ISO 7816-Standard bezeichnet. Die APDU ist typischerweise eine Kommunikationseinheit auf Anwendungsebene (im OSI-Schichtenmodel entspricht das der Schicht 7). Die APDU wird beispielsweise unterschieden in command APDUs, welche Kommandos an die Chipkarte übermitteln und response APDUs, die die Antwort der Karte auf ein Kommando übermittelt. Diese Kommunikation findet nach Etablierung der Kommunikation mittels Answer to Reset und optionaler Protocol Type Selection statt. Die Struktur von command APDU und response APDU sind in der Norm ISO 7816-4 festgelegt. Entsprechend ist es vorteilhaft, wenn die Schließung folgende beiden Betriebsmodi unterstützt:

  1. (a) Bei der Programmierung verhält sich die Schließung wie eine passive Karte, die über APDU-Kommandos ausgelesen und mit Programmierprotokollen beschrieben wird.
  2. (b) Zum Auslesen von Schlüsseldaten verhält sich die Schließung wie ein Leser, der über APDU-Kommandos Schlüsseldatensätze aus einem Identmedium (iCarte, Schlüsselkarte, ...) liest.
The preferably wireless communication with the closure preferably takes place via an APDU-based protocol. APDU (Application Protocol Data Unit) usually refers to a communication unit between a chip card and an chip card application according to the ISO 7816 standard. The APDU is typically a communication unit at the application level (in the OSI layer model, this corresponds to layer 7). The APDU is differentiated, for example, from command APDUs, which transmit commands to the chip card, and response APDUs, which transmit the card's response to a command. This communication takes place after establishment of the communication by means of Answer to Reset and optional Protocol Type Selection. The structure of command APDU and response APDU are in the ISO standard 7816-4 set. Accordingly, it is advantageous if the closure supports the following two modes of operation:
  1. (a) During programming, the closure behaves like a passive card, which is read out via APDU commands and described with programming protocols.
  2. (b) To read out key data, the closure behaves like a reader that uses APDU commands to read key data records from an ID medium (iCarte, key card, ...).

Erfindungsgemäß ist das Folgende Verhalten der Schließung bevorzugt (das ggf. auch bei bestehenden Schlössern nachträglich geändert werden kann, beispielsweise durch ändern der Firmware): Nach dem Aufwachen sucht die Schließung nach einem von einem Leser kommenden Feld. Ist ein Feld vorhanden, so schaltet die Schließung in den Kartenemulationsmodus und kann über externe Kommandos entsprechend ausgelesen und mit Programmierprotokollen programmiert werden. Ist kein Feld vorhanden, so versucht die Schließung nun als Leser aktiv einen Schlüssel (Schlüsseldaten) von einem Identmedium (Schlüsselkarte, iCarte-Adapter etc.) zu lesen.According to the invention, the following behavior of the closure is preferred (which may be changed subsequently also with existing locks, for example by changing the firmware): After waking up, the closure searches for a field coming from a reader. If a field is present, the closure switches to card emulation mode and can be read out accordingly via external commands and programmed with programming protocols. If no field is present, the closure will now actively attempt as a reader to read a key (key data) from an ID medium (key card, iCarte adapter, etc.).

Das erfindungsgemäße Verfahren ermöglicht eine einfache, sichere und effiziente Konfiguration einer Schließanlage die mindestens eine elektronische Schließung und mindestens ein Identmedium zum Betätigen der Schließung umfasst. Vorzugsweise umfasst eine erfindungsgemäße Schließanlage mehrere Schließungen und mehrere Identmedien, wobei eine Konfiguration einerseits zur Inventarisierung der Schließungen und Identmedien dient, d.h. es wird bestimmt welche Schließungen und welche Identmedien zur Schließanlage gehören. Zudem dient die Konfiguration der Schließanlage zur Zuordnung von Zugriffsrechten, d.h. es wird festgelegt welche Identmedium zum Öffnen welcher Schließungen dienen. Die Konfiguration weist vorzugsweise die folgenden Schritte auf. Zunächst sollte ein Smartphone mit einer Software (Admin-App) zur Konfiguration bereitgestellt werden, wobei das Smartphone mit den Schließungen und den Identmedium über Funk kommunizieren kann. Dies dient einerseits zur eindeutigen Identifizierung der Schließungen und der Identmedium und andererseits zur Programmierung der Schließungen und Identmedien. Erfindungsgemäß findet ein Identifizieren und Programmieren der Schließungen und Identmedien durch einfaches "antappen" statt. Anschließend, d.h., für bereits Identifizierte Schließungen und Identmedien kann eine Zuordnen von Zugriffsrechten bezüglich der Idenmedien auf die Schließungen unter Verwendung der Admin-App auf dem Smartphone erfolgen. Vorzugsweise erfolgt diese Zuordnung von Zugriffsrechten mittels einer Schließungen-Identmedien-Matrix, die auf dem Display des Smartphones visualisiert ist. Zunächst werden diese Zugriffsrechte und deren Zuordnung auf dem Smartphone lokal gespeichert. Anschließend werden Daten, die zur Verwaltung der Schließanlage nötig sind, an die Cloud übermittelt. Vorzugsweise enthalten diese Daten die Zuordnung der Zugriffsrechte, Daten bezüglich der Schließungen der Schließanlage und/oder Daten bezüglich der Identmedien der Schließanlage, ggf. auch noch Benutzerdaten. Basierend auf diesen Daten wird in der Cloud ein neuer Datensatz generiert, der vorzugsweise verschlüsselte Programmierdaten oder unverschlüsselte Programmierdaten umfasst, die zur Programmierung der Schließungen dient. Zudem enthält dieser neu generierte Datensatz vorzugsweise Schlüsseldaten, die auf Identmedien gespeichert werden können und zur Betätigung der Schließungen dienen. Der neu generierte Datensatz enthält vorzugsweise verschlüsselte oder unverschlüsselte Programmierdaten und/oder verschlüsselte bzw. unverschlüsselte Schlüsseldaten, die von der Cloud an das Smartphone übermittelt werden. Dadurch wird das Smartphone in die Lage versetzt, die Schlüsseldaten an Identmedien zu Übertragen und/oder die Programmierdaten an die Schließungen zu übertragen, sodass die Identmedien nun zum Betätigen der Schließungen entsprechend der bestimmten Zuordnung verwendet werden können. Erfindungsgemäß kann eine Schließung beispielsweise eine Vorrichtungen sein aus der Gruppe: elektronischer Schließzylinder, elektronisches Schloss und elektronischer Beschlag. Erfindungsgemäß kann ein Identmedium beispielsweise eine Vorrichtung sein kann aus der Gruppe: RFID-Karte, Schlüsselkarte, Smartphone mit RFID Funktionalität und Transponder. Eine RFID Funktionalität eines Smartphone kann beispielsweise mit Hilfe eines Adapters erreicht werden. Somit ist es möglich mit einem Smartphone, das die Admin-App enthält, die Schließanlage zu Konfigurieren. Wenn auf dem Smartphone zudem oder alternativ die "Mobile-Key-App" installiert ist, dann ist es möglich, die (verschlüsselten) Schlüsseldaten zum Empfangen bzw. herunterzuladen und dann die Schließungen der Schließanlage zu Öffnen, für die Zugriffsrechte als berechtigt gesetzt sind.The inventive method enables a simple, safe and efficient configuration of a locking system comprising at least one electronic closure and at least one identification medium for actuating the closure. Preferably, a locking system according to the invention comprises a plurality of locks and a plurality of identification media, wherein a configuration on the one hand serves for the inventory of the locks and ident media, ie it is determined which locks and which ident media belong to the locking system. In addition, the configuration of the locking system is used to assign access rights, ie it is determined which ident medium to open which closures are used. The configuration preferably includes the following steps. First, a smartphone with a software (admin app) should be provided for configuration, the smartphone can communicate with the locks and the identification medium via radio. On the one hand, this serves to uniquely identify the locks and the ID medium and, on the other hand, to program the locks and identification media. According to the invention, an identification and programming of the closures and identification media takes place by simply "coming off". Subsequently, ie, for already-identified locks and identification media, an assignment of access rights with regard to the data media to the locks can be made using the Admin-App on the Smartphone. Preferably, this assignment of access rights by means of a locks ident media matrix, which is visualized on the display of the smartphone. First, these access rights and their assignment are stored locally on the smartphone. Subsequently, data required for managing the locking system is transmitted to the cloud. Preferably, these data contain the assignment of the access rights, data relating to the locks of the locking system and / or data relating to the ident media of the locking system, possibly even user data. Based on this data, a new data record is generated in the cloud, which preferably comprises encrypted programming data or unencrypted programming data, which is used to program the shutters. In addition, this newly generated record preferably contains key data that can be stored on ident media and used to operate the locks. The newly generated data record preferably contains encrypted or unencrypted programming data and / or encrypted or unencrypted key data, which are transmitted from the cloud to the smartphone. This enables the smartphone to transmit the key data to ident media and / or transmit the programming data to the locks so that the ident media can now be used to operate the locks according to the particular assignment. According to the invention, a closure can be, for example, a device from the group: electronic lock cylinder, electronic lock and electronic fitting. According to the invention, an identification medium can be, for example, a device from the group: RFID card, key card, smartphone with RFID functionality and transponder. An RFID functionality of a smartphone can be achieved, for example, with the aid of an adapter. Thus, it is possible with a smartphone that contains the Admin App to configure the locking system. If the smartphone also or alternatively the "Mobile-Key-App" is installed, then it is possible, the (encrypted) key data for receiving or download and then to open the locks of the locking system for which access rights are set as authorized.

Die Zuordnung von Zugriffsrechten von Idenmedien auf entspreche Schließungen kann erfindungsgemäß vorzugsweise sehr einfach mittels einer Schließungen-Identmedien-Matrix, die auf dem Display des Smartphones dargestellt ist, erfolgen.The assignment of access rights of Idenmedien to corresponding closures can be made according to the invention preferably very easily by means of a locks ident media matrix, which is shown on the display of the smartphone.

Die Cloud umfasst zumindest zwei Service, einen Datensatz-Service und einen Cloud-LSM-Service. Das Smartphone kommuniziert vorzugsweise mit dem Cloud-LSM-Service wobei dieser Cloud-LSM-Service vorzugsweise mit dem Datensatz-Service kommuniziert. Der Datensatz-Service dient vorzugsweise zur Generierung von Schlüsseldaten und/oder Programmierdaten die vorzugsweise Teil eines Datensatzes sind, die vom Datensatz-Service generiert werden. Insbesondere werden auf dem Cloud-LSM-Service auch Benutzerdaten auf der Grundlage der Zuordnungen gespeichert bzw. generiert.The cloud includes at least two services, a record service and a cloud LSM service. The smartphone preferably communicates with the cloud LSM service wherein this cloud LSM service preferably communicates with the record service. The data record service is preferably used for generating key data and / or programming data that are preferably part of a data record that is generated by the data record service. In particular, user data is also stored or generated on the basis of the allocations on the cloud LSM service.

Um die in der Cloud generierten Schlüsseldaten an Smartphones zu übertragen, kann die Cloud einen Mobile-Key-Server aufweisen. Vorzugsweise ist dieser Mobile-Key-Server als ein OverTheAir Mobile-Key-Server realisiert, sodass die Schlüsseldaten drahtlos, vorzugsweise über das Mobilfunknetz an ein Smartphone mit einer entsprechenden Software (Mobile-Key-App) gesendet werden können.To transfer the key data generated in the cloud to smartphones, the cloud may include a mobile key server. Preferably, this mobile-key server is realized as an OverTheAir mobile-key server, so that the key data can be sent wirelessly, preferably via the mobile network to a smartphone with appropriate software (mobile key app).

Das erfindungsgemäße Verfahren ermöglicht es bereits inventarisiert bestehende Schließanlagen zu konfigurieren und auch weitere Schließungen und/oder Identmedien zur Schließanlage durch Inventarisierung hinzuzufügen. Zudem ist es erfindungsgemäß auch möglich, eine neue Schließanlage von Anfang an neu zu konfigurieren. Hierzu ist es nötig, zunächst die Schließungen und/oder Identmedien zu Inventarisieren.The method according to the invention makes it possible to already inventorize existing locking systems and also to add further locks and / or identification media to the locking system by means of an inventory. In addition, it is also possible according to the invention to reconfigure a new locking system from the beginning. For this it is necessary to first inventory the locks and / or ident media.

Im Folgenden soll kurz ein Vorgang einer Konfiguration der Schließanlage beschrieben werden. Der Benutzer/Admin bestellt und bekommt geliefert: i Schließzylinder mit RFID/NFC Interface; j Karten Mifare Classic (leer) oder Mifare DESFire (vorformatiert); Adapter Attachements / microSDs für Mifare Classic/DESFire Emulation. Der Benutzer startet AdminApp auf dem Smartphone und vergibt ein Passwort für seine neu anzulegende Schließanlage. Anschließend tappt der Benutzer Schließzylinder an und vergibt Namen für diese Schließungen. Anschließend tappt er die Karten/iCartes an und vergibt Usernamen. Dabei entsteht eine Matrix, in der er anschließend Berechtigungen vergibt. Bei Antippen von "Save to Cloud" werden die gerade generierten Schließplandaten via https in die "cloud", bzw. zum "SOHO-Cloud-Service" geschickt. Schließplandaten können beispielsweise Schließanlagenpasswort, eindeutige Hardware Identifier der Schließungen zusammen mit den vom Benutzer zugeordneten Namen, Unique-IDs der Karten/Adapter zusammen mit den vom Benutzer zugeordneten Usernamen, Schließberechtigungen, wer wo schließt, eventuell noch zeitliche Einschränkungen aufweisen.In the following, a process of a configuration of the locking system will be briefly described. The user / admin orders and gets delivered: i Lock cylinder with RFID / NFC interface; j Cards Mifare Classic (blank) or Mifare DESFire (pre-formatted); Adapter Attachments / microSDs for Mifare Classic / DESFire Emulation. The user starts AdminApp on the smartphone and assigns a password for his newly created locking system. Subsequently, the user taps lock cylinder and assigns names for these closures. Then he tapes the cards / iCartes and assigns usernames. This creates a matrix in which he then assigns authorizations. If you tap on "Save to Cloud", the currently generated locking plan data is sent via https to the "cloud" or to the "SOHO cloud service". Lock plan data may include, for example, locker password, unique hardware identifiers of the locks along with the user-assigned names, unique IDs of the cards / adapters along with user-assigned usernames, lock permissions, who closes where, and may have time constraints.

Ein nachgeordneter Dienst generiert dann Progammierprotokolle für alle betroffenen Vorrichtungen (Schlösser, Karten, Adapter/iCartes) und schickt sie zurück zum Smartphone des Benutzers. Dort werden sie zunächst zwischengespeichert (an einem Ort ohne besondere Sicherheitsanforderungen). Wenn der Benutzer dann anschließend die einzelnen Vorrichtungen in beliebiger Reihenfolge ein zweites mal antappt, werden die für das jeweilige Vorrichtung vorbereiteten Programmierprotokolle abgefahren. Dieser Vorgang kann so schnell sein, dass auch ein einmaliges Antappen (aus Anwendersicht) ausreichend ist. Dabei werden die Gerätedaten erfasst und zusammen mit den Schließplandaten zum SOHO Cloud-Server gesendet, dort bearbeitet und resultierende Programmierprotokolle zum Smartphone zurückgesendet und gleich in das jeweilige Gerät (Schließung/ Karte / ICarte-Adapter) einprogrammiert.A subordinate service then generates programming logs for all affected devices (locks, cards, adapters / iCartes) and sends them back to the user's smartphone. There they are first cached (in a place without special Safety requirements). If the user then subsequently taps the individual devices in any order a second time, the programming protocols prepared for the respective device are run. This process can be so fast that even a single session (from the user's point of view) is sufficient. The device data is recorded and sent together with the locking plan data to the SOHO cloud server, where it is processed and resulting programming protocols are sent back to the smartphone and immediately programmed into the respective device (lock / card / ICarte adapter).

Die Kommunikation zu den Cloud Servern ist vorzugsweise https gesichert. Das Admin Phone gilt vorzugsweise als sicher. Es wird von der Person bedient, die sowieso die Hoheit über die Schließanlage hat. Programmierdatensätze werden vom SOHO Cloud Service digital signiert und die Signatur wird von der jeweiligen Schließung verifiziert, so dass auf dem Weg zwischen Server und Schließung keine Manipulation möglich ist. Außerdem gilt: Die Kommunikation zwischen Datensatz-Service via Mobile-Key Server zu den Adaptern ist vorzugsweise end-to-end verschlüsselt (Adapter (iCartes)/microSDs werden vom Admin einmalig mit einem key-data-key initialisiert, danach können sie mit dem OTA-Server ohne Zutun des Admins kommunizieren.The communication to the cloud servers is preferably secured https. The admin phone is preferably safe. It is operated by the person who has the sovereignty over the locking system anyway. Programming data records are digitally signed by the SOHO Cloud Service and the signature is verified by the respective closure so that no manipulation is possible on the way between server and closure. In addition: The communication between record service via Mobile-Key Server to the adapters is preferably encrypted end-to-end (adapters (iCartes) / microSDs are initialized once by the admin with a key-data-key, then they can with the OTA servers communicate without the help of the admins.

KURZE BESCHREIBUNG DER ZEICHNUNGENBRIEF DESCRIPTION OF THE DRAWINGS

Im Folgenden werden bevorzugte Ausführungsformen der vorliegenden Erfindung unter Bezugnahme auf die Figuren ausführlich beschrieben. Es zeigen:

Fig. 1
einen schematischen Überblick der Grundstrukturen des erfindungsgemäßen Schließsystems;
Fig. 2
eine Schließungen-Identmedien-Matrix wie sie auf einem Display eines Smartphones dargestellt wird;
Fig. 3, 4und 5
ein bevorzugtes Design einer Schließungen-Identmedien-Matrix wie sie auf einem Display eines Smartphones dargestellt wird;
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the drawings. Show it:
Fig. 1
a schematic overview of the basic structures of the locking system according to the invention;
Fig. 2
a lock identity media matrix as displayed on a display of a smartphone;
3, 4 and 5
a preferred design of a lock ID media matrix as displayed on a display of a smartphone;

DETAILLIERTE BESCHREIBUNG BEVORZUGTER AUSFÜHRUNGSFORMENDETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Figur 1 zeigt als erste erfindungsgemäße Ausführungsform einen schematischen Überblick der Grundstrukturen eines erfindungsgemäßen Systems. Ein Vorteil der Erfindung
besteht darin, dass die Schließanlage - die vorzugsweise mehrere elektronische Schließungen umfasst - vorzugsweise durch Verwendung einer Admin-App 1, die vorzugsweise auf einem Mobiltelefon, einem Smartphone, einem Tablet-Computer und/oder einem Computer ausgeführt werden kann, installiert und/oder verwaltet werden kann. Insbesondere kann die Admin-App als eine Realisierung einer erfindungsgemäßen Systemkomponente angesehen werden, die eine Benutzerschnittstelle darstellt. Die Admin-App stellt vorzugsweise mindestens eine der folgenden Funktionalitäten bereit:
FIG. 1 shows as a first embodiment of the invention a schematic overview of the basic structures of a system according to the invention. An advantage of the invention
is that the locking system - preferably comprising a plurality of electronic locks - preferably installed and / or managed by using an admin app 1, which can be preferably carried out on a mobile phone, a smartphone, a tablet computer and / or a computer can be. In particular, the admin app may be considered as an implementation of a system component according to the invention that represents a user interface. The admin app preferably provides at least one of the following features:

Login bzw. RegistrierungLogin or registration

Vorzugsweise ist zunächst eine Authentifizierung eines Administrators durch die Admin-App bevorzugt, um Manipulationen zu verhindern. Beispielsweise kann sich ein Administrator in einem Loginfenster mit Eingabefeld für Username und Kennwort (Login-Kennwort) authentifizieren, wobei das Kennwort gleichzeitig das Schließanlagenpasswort sein kann. Alternativ können das Login-Kennwort und das Schließanlagenpasswort verschiedene Passwörter/Kennwörter sein. Bei erstmaliger Anmeldung erscheint beispielsweise ein Eingabefeld für das Neuanlegen eines Usernamen plus Passwort incl. Passwortwiederholung. Falls ein Secure Element auf dem Smartphone verfügbar ist, beispielsweise ein Secure Element für NFC, auf dem die Admin-App ausgeführt wird, kann das Passwort in dem Secure Element abgelegt werden, so dass bei Folgelogins beispielsweise eine kurze PIN zur Authentifizierung als ausreichend erachtet werden kann.Preferably, authentication of an administrator by the admin app is initially preferred in order to prevent manipulation. For example, an administrator can authenticate himself in a login window with input field for user name and password (login password), whereby the password can also be the locking system password. Alternatively, the login password and the locking system password may be different passwords / passwords. For example, when you log in for the first time, an entry field appears for creating a new user name plus password including password repetition. If a secure item is available on the smartphone, for example a secure element for NFC running the admin app, the password can be stored in the secure element, so that for subsequent logins, for example, a short PIN is considered sufficient for authentication can.

Der so authentifizierte Benutzer (Administrator) kann nun beispielsweise Identmedien (beispielsweise Schlüsselkarte 11 in Fig. 1) anlegen, Schließungen (beispielsweise Schloss 10 in Fig. 1) anlegen. Mit anderen Worten, es werden zunächst die Schließungen der Schließanlage mit den entsprechenden Identmedien registriert. Zudem kann der Administrator festlegen, mit welchen Identmedien welche Schließungen geöffnet werden können, d.h., es kann eine Zuordnung von Zugriffsrechten der Identmedien auf die Schließungen erfolgen, die beispielsweise in einer Schließungen-Identmedien-Matrix visualisert sind. Beispielsweise ist in Fig. 2 eine Schließungen-Identmedien-Matrix allgemein dargestellt, und spezieller in Fig. 3 dargestellt. Vorzugsweise wird die Zuordnung von Schließung zu Identmedium (zunächst) nur im Smartphone lokal zwischengespeichert.The thus authenticated user (administrator) can now, for example, identify media (for example key card 11 in FIG Fig. 1 ), locks (for example, lock 10 in Fig. 1 ) invest. In other words, first the locks of the locking system are registered with the corresponding identification media. In addition, the administrator can specify with which ID media which locks can be opened, ie, an assignment of access rights of the ID media to the locks can take place, which are visualized, for example, in a lock ID media matrix. For example, in Fig. 2 a closure identifier matrix is shown generally, and more particularly in FIG Fig. 3 shown. Preferably, the assignment of closure to identification medium (initially) is cached locally only in the smartphone.

Wenn später ein "Save to Cloud" Kommando (beispielsweise im Matrix-Fenster, siehe Fig. 3) ausgeführt wird, werden neue "Accounts" entsprechend der Zuordnungen in der Cloud, vorzugsweise auf einem SOHO-Cloud-Server 101 angelegt.If later, a "Save to Cloud" command (for example, in the matrix window, see Fig. 3 ) is executed, new "accounts" are created according to the allocations in the cloud, preferably on a SOHO cloud server 101.

Das erfindungsgemäße Verfahren ermöglicht neben dem Anlegen von Schließungen "Success" Pop-up und bekommt anschließend die Schließungen-Identmedien-Matrix auf und Identmedien auch die Inventarisieren von Schlössern und Identmedien. Nach erfolgreichem Login auf der Admin-App bekommt man beispielsweise einen kurzen einem Display des Smartphones dargestellt (siehe Figuren 2 und 3). Hier können zudem zwei Symbole dargestellt werden, "Add Lock" und "Add Key". Die Schließungen-Identmedien-Matrix kann anschließend durch Hinzufügen neuer Schließungen (Add Lock) oder neuer Identmedien (Add Key) verändert werden.The inventive method allows in addition to the creation of closures "Success" pop-up and then gets the locks ident media matrix and identification media and the inventory of locks and ID media. After a successful login on the admin app, for example, you get a short display of the smartphone (see Figures 2 and 3 ). Here you can also display two icons, "Add Lock" and "Add Key". The lock identification media matrix can then be changed by adding new locks (Add Lock) or new identifiers (Add Key).

Gemäß einer bevorzugten Ausführungsform kann/muss nach jedem erfolgreichem Login zunächst am SOHO Cloud Server gecheckt werden, ob es für diesen Account bereits Schließanlagendaten gibt. Falls ja, werden sie heruntergeladen und in der Matrix visualisiert. Ein erfolgreicher Download ist also in diesem Fall vorzugsweise Voraussetzung für ein anschließendes Arbeiten am Schließplan.According to a preferred embodiment, after each successful login, it may / must first be checked on the SOHO cloud server whether there is already locking system data for this account. If so, they are downloaded and visualized in the matrix. A successful download is therefore in this case preferably a prerequisite for a subsequent work on the locking plan.

Tippt man auf eines der "Add" Symbole (Add Key, Add Lock), so wird in der Matrix zunächst eine zusätzliche leere Spalte, bzw. Zeile angelegt und die untere Displayhälfte zeigt eine Tastatur, so dass man jetzt einen Namen für das hinzuzufügende Schließung/Identmedium vergeben kann (siehe Fig. 4). Der Name sollte beim Tippen vorzugsweise gleich an der richtigen Stelle in der Matrix eingetragen werden. Dazu wird die Matrix vorzugsweise automatisch so gescrollt, dass das zu beschreibende Namensfeld sichtbar ist. Nach Eingabe des Namens drückt man "Return" (oder "Fertig"), die Tastatur verschwindet und man ist wieder in der Ansicht der Fig. 3. Vorzugsweise ist die gerade neu angelegte Schließung markiert (z.B. blau hinterlegt) und die Schrift ist z.B. kursiv (das ist der Hinweis, dass die Schließung noch nicht inventarisiert ist). Jetzt hat der Benutzer/Administrator die Wahl, unmittelbar anschließend diese markierte Schließung mit dem Smartphone anzutappen oder erneut eines der "Add" Symbole anzutippen. Wird ein Schließung angetappt, d.h., wird eine drahtlose Kommunikation zwischen dem Smartphone und der Schließung hergestellt, so wird die Schließung mit Namen und UID/PHI inventarisiert und erscheint dann vorzugsweise in Normalschrift in der Matrix, wodurch ein abgeschlossener Vorgang symbolisiert wird. Wurde dagegen nicht getappt, so bleibt das Schriftbild kursiv, wodurch die Schließung als noch nicht inventarisiert dargestellt ist. Die Inventarisierung kann vorzugsweise jederzeit nachgeholt werden, indem man den Namen der zu inventarisierenden Schließung durch Antippen auf dem Smartphone markiert (was z.B. eine blaue Hinterlegung bewirkt). Anschließend tappt man die betreffende Schließung an; dadurch wird sein Hardware-Identifier (UID bei Karten, PHI bei Schließungen) eindeutig dem vom Admin gewählten Namen zugeordnet. Die eben dargestellte Inventarisierung von Schließungen kann entsprechend für Identmedien erfolgen, d.h., das Verfahren im oben Beschriebenen Abschnitt ist ebenso anwendbar, wenn der Begriff Schließung in Identmedium ersetzt wird. Vorzugsweise wird der Prozess des Anlegens und Inventarisierens so lange wiederholt, bis die komplette Schließanlage erfasst ist.If you tap on one of the "Add" symbols (Add Key, Add Lock), an additional empty column or row is created in the matrix and the lower half of the display shows a keyboard so that you now have a name for the closure to be added / Ident medium can assign (see Fig. 4 ). The name should preferably be entered at the right place in the matrix when typing. For this purpose, the matrix is preferably automatically scrolled so that the name field to be described is visible. After entering the name you press "Return" (or "Done"), the keyboard disappears and you are back in the view of Fig. 3 , Preferably, the newly created closure is highlighted (eg blue background) and the font is eg italic (this is the indication that the closure is not yet inventoried). Now the user / administrator has the choice to immediately tap this marked closure with the smartphone or touch one of the "Add" icons again. If a closure is tapped, ie, wireless communication between the smartphone and the closure is established, the closure is inventoried by name and UID / PHI and then preferably appears in normal font in the matrix, symbolizing a completed process. If, on the other hand, it has not been tapped, the typeface remains italic, so that the closure is not yet inventoried. The inventory can preferably be made up at any time by marking the name of the closure to be inventoried by tapping on the smartphone (eg causes a blue deposit). Then you tap the closure in question; As a result, its hardware identifier (UID for cards, PHI for closures) is clearly assigned to the name chosen by the administrator. The just illustrated inventory of closures can be done accordingly for ident media, ie, the method in the above-described section is also applicable if the term closure is replaced in ident medium. Preferably, the process of creating and inventorying is repeated until the complete locking system is detected.

Eine derart angelegte Schließanlage kann mittels der erfindungsgemäßen Schließungen-Identmedien-Matrix einfach auf dem Display des Smartphones visualisiert werden (siehe Fig. 5). Beispielsweise wird in Fig. 5 folgendes dargestellt: der Schließanlagennamen ("Peter's Lockplan"); die Schließungen/Schlösser ("Main Entrance", Door lock No 1, ... ), die Identmedien ("Master Key", Peter Martens, ...), die Berechtigungsstruktur (siehe weiter unten), Markierungen (z.B. Hinterlegung), Programmierbedarf (Blitzsymbol), eventuelle zeitliche Einschränkungen für Identmedien (Uhrensymbol). Vorzugsweise ist diese Matrix per "Touch and Drag" scrollbar. Wird beispielsweise nach rechts oder links gescrollt, bleiben die Namen der Schließanlage (im Beispiel oben "Peter's Lockplan"), sowie die Namen der Schließungen stehen, während die Namen der Keys (Identmedien) der Verschiebungsbewegung des Matrix-Fensters folgen. Wird beispielsweise nach oben oder unten gescrollt, so folgen entsprechend die Namen der Schlösser der Bewegung des Matrix-Fensters, während der Schließanlagenname und die Namen der Keys stehen bleiben. Vorzugsweise kann die Matrix aufgezogen werden, so dass die Eingabefelder so vergrößerbar sind, dass man bequem per Fingertip Berechtigungskreuze setzen, bzw. entfernen kann.Such a locking system can be easily visualized on the display of the smartphone by means of the closures ident media matrix according to the invention (see Fig. 5 ). For example, in Fig. 5 the following is shown: the lock facility name ("Peter's Lockplan"); the locks / locks ("Main Entrance", Door lock No 1, ...), the identification media ("Master Key", Peter Martens, ...), the authorization structure (see below), markings (eg deposit), Programming requirements (lightning symbol), possible time restrictions for ident media (clock symbol). Preferably, this matrix is scrollable by "touch and drag". For example, scrolling to the right or left leaves the locks (in the example above "Peter's Lockplan") and the names of the locks, while the names of the keys follow the movement of the matrix window. For example, scrolling up or down will cause the names of the locks to follow the movement of the matrix window while the lock facility name and the keys' names remain idle. Preferably, the matrix can be wound up so that the input fields can be enlarged in such a way that it is easy to set or remove authorization crosses using a fingertip.

Die Vergabe von Zutrittsberechtigungen erfolgt vorzugsweise durch Antippen von Berechtigungsfeldern in der Matrix. Der Entzug der Zutrittsberechtigungen erfolgt vorzugsweise durch nochmaliges Antippen. Dadurch entsteht in der Regel Programmierbedarf, der nach einem "Save to Cloud" (siehe Fig. 3) und automatischem Download der Programmierdaten (siehe weiter unten) mit Programmierbedarfsblitzen visualisiert wird. Programmierbedarf wird vorzugsweise sowohl bei den betroffenen Schließungen als auch bei den betroffenen Identmedien angezeigt.The assignment of access authorizations is preferably done by tapping authorization fields in the matrix. The withdrawal of access authorizations is preferably carried out by tapping again. This usually creates programming needs, which after a "Save to Cloud" (see Fig. 3 ) and automatic download of the programming data (see below) is visualized with programming demand flashes. Programming requirements are preferably displayed both in the affected locks and in the affected ident media.

Die erfindungsgemäße Matrix ermöglicht auch eine anschauliche Visualisierung von Programmier-Soll- und Ist-Zuständen. Vorzugsweise gibt es für den Berechtigungszustand vier Möglichkeiten, die wie folgt visualisiert werden können: (i) kein Kreuz dargestellt, Identmedium soll nicht berechtigt sein und ist auch nicht berechtigt (kein Programmierbedarf); (ii) Kreuz kursiv bzw. dünn dargestellt, Identmedium soll bei entsprechender Schließung berechtigt sein, ist aber noch nicht berechtigt (Programmiebedarf); (iii) Kreuz fett (bold) dünn dargestellt, Identmedium berechtigt sein und ist auch berechtigt (kein Programmierbedarf); (iv) Kreuz invers dargestellt, Identmedium soll nicht berechtigt sein, ist aber noch berechtigt (Programmierbedarf).The matrix according to the invention also allows a clear visualization of programming target and actual states. There are preferably four possibilities for the authorization state, which can be visualized as follows: (i) no cross displayed, ID medium should not be authorized and is not authorized (no programming requirement); (ii) cross in italics or shown in a thin line, identification medium should be authorized if closed, but not yet authorized (program requirement); (iii) cross bold (bold) shown thin, ident medium authorized and is also eligible (no programming needs); (iv) Cross displayed in reverse, identification medium should not be authorized, but is still eligible (programming requirement).

Ein weiterer Vorteil des erfindungsgemäßen Schließsystems liegt in der Vergabe Device spezifischer Eigenschaften, d.h. in der Vergabe spezifischer Eigenschaften für individuelle Schließung(en) und/oder individuelle Identmedium/Identmedien. Die Vergabe Device spezifischer Eigenschaften erfolgt beispielsweise nach 2-maligem Antippen von Devices (Schließungen oder Identmedien) in der Matrix (Alternativ: Langes Antippen). Nach erstmaligem Antippen des Namens eines Devices wird dieses z.B. hinterlegt (In diesem Zustand, der nach einmaligem Antippen erreicht wird, könnte man ein noch nicht inventarisiertes Device durch Antappen inventarisieren, siehe weiter vorne). Tippt man den Namen des soeben markierten Devices ein zweites Mal an, so können vorzugsweise folgende spezifischen Eigenschaften vergeben werden.Another advantage of the locking system according to the invention lies in the allocation of device specific properties, i. in the assignment of specific properties for individual closure (s) and / or individual Identmedium / Identmedien. Device specific properties are assigned, for example, by tapping Devices (locks or ID media) twice in the matrix (alternative: long tap). After tapping the name of a device for the first time, this will be e.g. deposited (In this state, which is reached after a single tap, one could inventorize a device that has not yet been inventoried by means of an appendage, see above). If you tap the name of the just-selected device a second time, the following specific properties can preferably be assigned.

Für eine Schließung kann ein Dialogfenster mit editierbaren Eingabefeldern geöffnet werden, in dem der Name der Schließung und/oder wie lange die Schließung nach Öffnung geöffnet bleiben soll, eingegeben werden kann. Falls die Schließung bereits inventarisiert ist und ein "Save to Cloud" bereits stattgefunden hat, so erscheint zusätzlich z.B. ein Fragezeichensymbol, das nach Anklicken ein transparentes Infofeld mit Schließungsdaten freigibt.For a closure, a dialog window with editable input fields can be opened in which the name of the closure and / or how long the closure should remain open after opening can be entered. If the closure is already inventoried and a "save to cloud" has already taken place, then in addition e.g. a question mark symbol that releases a transparent information field with closing data after clicking.

Für ein Identmedium können ähnliche Dialogfelder editiert werden, d.h., beispielsweise der Name der Schließung ("Name of Key") und/oder Zeiträume zu denen das Identmedium Zugriff auf die Schließung hat ("Key shall be valid from", "Key shall expire"). Falls das Identmedium bereits vollständig inventarisiert ist und das System dabei festgestellt hat, dass es sich um ein Smartphone handelt, so können weitere Eingabefelder auftauchen, die bestimmen wie lange das Identmedium gültig ist nach einem download ("Key shall be valid for hours after download of key data").Similar dialog boxes can be edited for an ident medium, ie, for example, the name of the key ("Name of Key") and / or periods at which the identification medium has access to the key ("Key shall be valid from", "Key shall expire"). ). If the identification medium has already been completely inventoried and the system has determined that it is a smartphone, further input fields may appear which determine how long the identification medium is valid after a download ("Key shall be valid for hours after download of key data ").

Das Ablegen von Schließanlagendaten in der Cloud, sowie das Durchreichen von aus der Cloud empfangenen Schlüsseldatensätzen für Smartphones hin zum OTA-Key-Server erfolgt vorzugsweise nach Antippen des Buttons "Save to Cloud" in der Matrix-Basis-View. Nach Antippen von "Save to Cloud" in der Matrix-Basis-View wird beispielsweise ein Dialogfenster gezeigt, das den Prozessfortschritt mit Fortschrittsbalken anzeigt. Bei diesem Prozess können beispielsweise web-Sevices-baisierte Funktionalitäten alle vom Admin generierten Schließanlagendaten in der SV-Schließanlagendatenbank des SOHO cloud Servers abgelegt werden. Diese Funktionalitäten bilden das sogenannte SIK (Software Integration Kit) Interface zu bereits verwalteten Schließanlagendaten. Umgekehrt können alle Daten nach erfolgreichem Login des Admins aus der für eine Visualisierung in der Matrix aus der Cloud heruntergeladen werden. Zusätzlich steht vorzugsweise auch ein Service zur Verfügung, der sämtliche Programmierbedüfnisse ermittlen kann.The storage of locking system data in the cloud, as well as the passage of key data received from the cloud for smartphones to the OTA key server is preferably carried out after tapping the button "Save to Cloud" in the matrix base view. For example, after tapping "Save to Cloud" in the matrix base view, a dialog box will be displayed showing the process progress with progress bar. In this process, for example, web service-based functionalities can store all administrator-generated locking system data in the SV locker database of the SOHO cloud server. These functionalities form the so-called SIK (Software Integration Kit) interface to already managed locking system data. Conversely, all data can be downloaded from the cloud for a visualization in the matrix after successful login of the admin. In addition, preferably also a service is available, which can determine all programming needs.

Nach einem erfolgreichem Upload der Schließanlagendaten ("Save to Cloud") werden wiederum von einem zentralen Service (Datensatz-Service 102) Programmierdatensätze für alle Schließungen und Identmedien ermittelt bzw. berechnet, und danach zurück zum Admin-Smartphone gesendet und dort abgelegt. Beispielsweise können auch Schlüsseldaten (Daten für die Identmedien) für Smartphones zum OTA-Key-Server 103 gesendet werden, von wo sie jederzeit von den MobileKey-Usern abgeholt werden können (MobileKey App). Dies ist in der Fig. 1 beispielsweise mit dem Pfeil "Schlüsseldaten hinterlegen" gezeigt. Alternativ oder zusätzlich können die Schlüsseldaten auch von dem SOHO-Cloud-LSM-Service 101 direkt an den OTA-Key-Server 103 gesendet werden (nicht direkt dargestellt in Fig. 1).After a successful upload of the locking system data ("Save to Cloud"), in turn, programming data records for all locks and identification media are determined or calculated by a central service (record service 102) and then sent back to the admin smartphone and stored there. For example, key data (data for the identification media) for smartphones can also be sent to the OTA key server 103, from where they can always be fetched by the MobileKey users (MobileKey App). This is in the Fig. 1 For example, with the arrow "deposit key data" shown. Alternatively or additionally, the key data may also be sent from the SOHO cloud LSM service 101 directly to the OTA key server 103 (not directly shown in FIG Fig. 1 ).

Einen zentralen Dienst des erfindungsgemäßen Systems bildet der SOHO-Cloud-LSM-Service. Dieser Dienst erlaubt das Ablegen und Verwalten von Benutzerdaten und -profilen (Admin-Zugangsdaten, Berechtigungsmatrix etc.) der SOHO-Benutzer auf einem zentralen Datenbankserver. Durch die zentrale Speicherung der Daten "in der Cloud" wird das bequeme Verwalten einer SOHO-Schließanlage von unterschiedlichen Geräten aus möglich. Sicherheitsrelevante Daten wie z. B. das Schließanlagenpasswort werden allerdings nicht in der Cloud gespeichert. Der SOHO-Cloud-LSM-Service wird von der Admin-App aus angesprochen und kommuniziert mit dem Datensatz-Service.A central service of the system according to the invention is the SOHO cloud LSM service. This service allows the storage and administration of user data and profiles (admin access data, authorization matrix, etc.) of the SOHO users on a central database server. The central storage of data "in the cloud" makes it easy to manage a SOHO locking system from different devices. Security relevant data such. However, the locking system password, for example, is not stored in the cloud. The SOHO Cloud LSM service is addressed by the Admin app and communicates with the record service.

Die Erfindung umfasst ebenfalls die genauen oder exakten Ausdrücke, Merkmale, numerischen Werte oder Bereiche usw., wenn vorstehend oder nachfolgend diese Ausdrücke, Merkmale, numerischen Werte oder Bereiche im Zusammenhang mit Ausdrücken wie z.B. "etwa, ca., um, im Wesentlichen, im Allgemeinen, zumindest, mindestens" usw. genannt wurden (also "etwa 3" soll ebenfalls "3" oder "im Wesentlichen radial" soll auch "radial" umfassen). Der Ausdruck "bzw." bedeutet überdies "und/oder".The invention also includes the exact or exact terms, features, numerical values or ranges, etc. when, above or below, these terms, features, numerical values or ranges are used in conjunction with terms such as, for example. "about, about, essentially, in general, at least, at least", etc., were called (ie, "about 3" should also "3" or "substantially radially" should also include "radial"). The expression "or" means moreover "and / or".

Claims (11)

  1. A method for the configuration of a locking system comprising at least one electronic locking (10) and at least one identification medium (11) for operating the locking, wherein the method comprises the following steps:
    a) Providing a smartphone (1) with a software (admin-app) for the configuration of the at least one locking (10) and the at least one identification medium (11) wherein the smartphone may communicate with the locking and the identification medium via wireless (F1, F2);
    b) allocating access rights of the identification medium (11) to the locking (10) via the software of the smartphone (1) and locally storing said allocation of access authorisations in the smartphone;
    c) reading out the identification data which are specific for the locking/identification medium and transmitting said data as well as the access authorisation data from b) to a cloud (100),
    d) generating programming data, preferably encoded programming data, and/or key data in the cloud (100) on the basis of the transmitted allocations;
    e) transmitting the programming data or the encoded programming data and/or key data from the cloud to the smartphone (1); and
    f) transmitting (F1) the key data from the smartphone to the at least one identification medium (11) and/or transmitting (F2) the programming data from the smartphone to the locking.
  2. The method according to claim 1, wherein the locking system comprises a plurality of electronic lockings (10) and a plurality of identification media (11).
  3. The method according to anyone of claims 1 or 2, wherein
    i) a locking may be a device from the group of: electronic locking cylinder, electronic lock and electronic fitting; and/or
    ii) an identification medium may be a device from the group of: RFID card, key card, smartphone (1) with RFID functionality and transponder.
  4. The method according to any one of the preceding claims, wherein the smartphone (1) communicates with the locking (10) and/or the identification medium (11) by means of an adapter (3).
  5. The method according to any one of the preceding claims, wherein the allocation of access authorisations from identification media to corresponding lockings may be visualized and configured by means of a locking-identification-media-matrix on the display of the smartphone.
  6. The method according to any one of the preceding claims, wherein the cloud (100) provides a dataset service (102) and a cloud-LSM-service (101) wherein the smartphone (1) communicates with the cloud-LSM-service and the cloud-LSM-service communicates with the dataset service, wherein the key data and programming data preferably form part of a dataset which is generated by the dataset service.
  7. The method according to any one of the preceding claims, wherein user data are stored or generated on the basis of the allocations by means of the cloud-LSM-service (101).
  8. The method according to any one of the preceding claims, wherein the cloud (100) additionally comprises a mobile key server (103) for storing and distributing the key data,
    wherein the key data are used by an identification medium (11, 2) for opening a locking (10), and the mobile key server (103) transmits the key data to a smartphone (2) with a corresponding software (mobile key app).
  9. The method according to claim 6, wherein the mobile key server (103) is an OverTheAir mobile key server (103) and the key data are sent wirelessly, preferably via the mobile communications network to a smartphone (2) having a corresponding software (mobile key app).
  10. The method according to any one of the preceding claims, wherein between step a) and b) the step
    a1) for inventorying the at least one locking and/or the at least one identification medium is carried out, in which the at least one locking and/or the at least one identification medium is recorded and unambiguously identified and
    in step c) data regarding the recorded lockings and/or identification media are additionally transmitted to the cloud.
  11. A locking system comprising:
    a plurality of electronic lockings (10),
    a plurality of identification media (11) for operating the lockings (10);
    a smartphone (1) with a software (admin-app) for the configuration of the lockings (10) and/or the identification media (11), wherein the smartphone is configured, by means of the software, such that access authorisations of the identification media (11) may be allocated to corresponding lockings (10) and said allocations are transmitted to a cloud (100),
    wherein programming data or encoded programming data and/or key data which are generated in the cloud (100) may be received by the smartphone and said encoded data may be transmitted from the smartphone to the lockings and/or identification media.
EP13776980.8A 2012-09-21 2013-09-20 Method and system for the configuration of small locking systems Active EP2898483B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP13776980.8A EP2898483B1 (en) 2012-09-21 2013-09-20 Method and system for the configuration of small locking systems

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP12185551 2012-09-21
PCT/EP2013/069645 WO2014044832A1 (en) 2012-09-21 2013-09-20 Method and system for the configuration of small locking systems
EP13776980.8A EP2898483B1 (en) 2012-09-21 2013-09-20 Method and system for the configuration of small locking systems

Publications (2)

Publication Number Publication Date
EP2898483A1 EP2898483A1 (en) 2015-07-29
EP2898483B1 true EP2898483B1 (en) 2018-04-18

Family

ID=47262978

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13776980.8A Active EP2898483B1 (en) 2012-09-21 2013-09-20 Method and system for the configuration of small locking systems

Country Status (3)

Country Link
US (1) US9811960B2 (en)
EP (1) EP2898483B1 (en)
WO (1) WO2014044832A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102019100878A1 (en) * 2019-01-15 2020-07-16 Insys Microelectronics Gmbh Method and system for managing an open state of a safe

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DK2821970T4 (en) 2013-07-05 2019-09-16 Assa Abloy Ab Communication device for access control, method, computer program and computer program product
EP2821972B1 (en) 2013-07-05 2020-04-08 Assa Abloy Ab Key device and associated method, computer program and computer program product
US9710987B2 (en) * 2014-01-15 2017-07-18 HLT Domestic IP, LLC Systems and methods for use in acquiring credentials from a portable user device in unlocking door lock systems
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
WO2016089846A1 (en) 2014-12-02 2016-06-09 Carrier Corporation Remote programming for access control system with virtual card data
BE1022614B1 (en) * 2014-12-10 2016-06-16 Viadact Nv Key management system
DE102014119003A1 (en) * 2014-12-18 2016-06-23 Skidata Ag Method for configuring access control devices of an access control system
DE202015003163U1 (en) * 2015-04-29 2016-08-01 Bks Gmbh Electronic locking device and locking system with such a closing device
AT517780A1 (en) * 2015-10-08 2017-04-15 Evva Sicherheitstechnologie Method for programming identification media of an access control system
CN106600755B (en) * 2015-10-16 2019-01-08 巍世科技有限公司 A kind of the general-purpose key system and its operating method of light wave encryption and decryption
CH712541A1 (en) * 2016-06-14 2017-12-15 Kaba Ag Methods and apparatus for configuring access control devices at an installation site.
US10257190B2 (en) 2016-09-23 2019-04-09 Schlage Lock Company Llc Wi-fi enabled credential enrollment reader and credential management system for access control
AU2017345308B2 (en) 2016-10-19 2023-06-29 Dormakaba Usa Inc. Electro-mechanical lock core
US10424142B2 (en) * 2016-11-10 2019-09-24 Scott C. Denton Access control system bypass for audit and electronic safe locks
CN111094676B (en) 2017-09-08 2022-04-08 多玛卡巴美国公司 Electromechanical lock core
CN108447147A (en) * 2017-12-13 2018-08-24 云南电网有限责任公司昆明供电局 It is a kind of that Network Communication cell equipment safety management system is matched based on passive smart lock
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
BR112020020946A2 (en) 2018-04-13 2021-03-02 Dormakaba Usa Inc. electromechanical lock core
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
FR3110749B3 (en) * 2020-05-20 2022-07-01 D Home Smaart Personalization of access badges to premises.
DE102021108263A1 (en) * 2021-03-31 2022-10-06 Abus Security-Center Gmbh & Co. Kg Procedure for configuring an access control system
WO2022260861A1 (en) 2021-06-06 2022-12-15 Apple Inc. User interfaces for managing locks
TW202337170A (en) * 2021-06-16 2023-09-16 美商品譜公司 Multifamily electronic lock credential management
DE102022127174A1 (en) * 2022-10-18 2024-04-18 Dormakaba Schweiz Ag Procedure for commissioning an electro-mechanical locking device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7880584B2 (en) 2006-06-07 2011-02-01 Utc Fire & Security Americas Corporation, Inc. Lockbox key with callback feature
AT506344B1 (en) * 2008-01-30 2015-06-15 Evva Sicherheitstechnologie METHOD AND DEVICE FOR CONTROLLING THE ACCESS CONTROL
ES2390797T3 (en) 2008-08-20 2012-11-16 Iloq Oy Electromechanical lock
SE534135C2 (en) * 2009-09-17 2011-05-10 Phoniro Ab Distribution of lock access data for electromechanical locks in an access control system
SE534520C2 (en) 2009-11-27 2011-09-20 Phoniro Ab Access control method and associated locking device and administration server
US8334765B2 (en) * 2010-05-24 2012-12-18 Keylockit Ltd. Wireless network apparatus and method for lock indication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102019100878A1 (en) * 2019-01-15 2020-07-16 Insys Microelectronics Gmbh Method and system for managing an open state of a safe

Also Published As

Publication number Publication date
EP2898483A1 (en) 2015-07-29
US9811960B2 (en) 2017-11-07
WO2014044832A1 (en) 2014-03-27
US20150235497A1 (en) 2015-08-20

Similar Documents

Publication Publication Date Title
EP2898483B1 (en) Method and system for the configuration of small locking systems
DE102014101495B4 (en) Method of access to a physically secure rack and computer network infrastructure
EP1679665B1 (en) Method and System for getting access to an object or service
EP2781058A1 (en) Smart home appliance, smart home control unit, smart home system and method for incorporating a smart home appliance into a smart home system
EP3215974B1 (en) Method for providing an access code in a portable device, and portable device
EP3130167B1 (en) Method for the secure access to a field device
EP1883867A1 (en) Method for adjusting an electric field device
CH705781A1 (en) User rights management and access control system with a time limit.
EP3582033A1 (en) Device and method for securely operating a field device
DE112014004322T5 (en) System and method for initializing and controlling locks
EP3009992B1 (en) Method and device for managing access rights
EP3647887A1 (en) Method and apparatus for the transmission of an access token for access to a field device used in the processing industry
EP3254432B1 (en) Method for authorization management in an arrangement having multiple computer systems
EP2996299B1 (en) Method and assembly for authorising an action on a self-service system
EP2282281B1 (en) Method and device assembly for authentication purposes on a service portal of a consumer service provider
DE102012204064A1 (en) An automatic access control system for controlling access to a physical object or access to a physical object and method
WO2013110407A1 (en) Access control
EP1821262A2 (en) System for checking the authorisation of persons to carry out activities requiring authorisation
DE112020007276T5 (en) On-line construction site monitoring device and its control unit, on-line construction site monitoring method
WO2014124765A1 (en) Device and method for the secure management of access codes
DE102011004849A1 (en) System for granting and/or withdrawing access rights for user to closing system i.e. passage, of commercial building, has central unit transmitting access rights for closing system to control unit over wireless connection using instructions
EP2958085A1 (en) Method for operating an electronic access system
EP1953997B1 (en) System for configuring a participant identification module
DE102022105680A1 (en) User/account management for identification systems
DE102022109134A1 (en) Access method to a field device in process automation technology

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20150421

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20170925

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTC Intention to grant announced (deleted)
GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

INTG Intention to grant announced

Effective date: 20180301

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502013009966

Country of ref document: DE

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 991251

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180515

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20180418

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180718

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180719

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180820

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502013009966

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

26N No opposition filed

Effective date: 20190121

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20180930

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180920

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180920

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180930

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180930

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180930

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 991251

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180920

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180920

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20130920

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180418

Ref country code: MK

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20180418

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180818

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230927

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20230915

Year of fee payment: 11

Ref country code: FR

Payment date: 20230912

Year of fee payment: 11

Ref country code: DE

Payment date: 20230929

Year of fee payment: 11