EP3132425A1 - Système de verrouillage activé par code et procédés fonctionnant conjointement avec ce dernier - Google Patents

Système de verrouillage activé par code et procédés fonctionnant conjointement avec ce dernier

Info

Publication number
EP3132425A1
EP3132425A1 EP15779534.5A EP15779534A EP3132425A1 EP 3132425 A1 EP3132425 A1 EP 3132425A1 EP 15779534 A EP15779534 A EP 15779534A EP 3132425 A1 EP3132425 A1 EP 3132425A1
Authority
EP
European Patent Office
Prior art keywords
code
lock
access
counter
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15779534.5A
Other languages
German (de)
English (en)
Other versions
EP3132425A4 (fr
Inventor
Ilan Goldman
Boaz Harel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Knock NLock Ltd
Original Assignee
Knock NLock Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Knock NLock Ltd filed Critical Knock NLock Ltd
Publication of EP3132425A1 publication Critical patent/EP3132425A1/fr
Publication of EP3132425A4 publication Critical patent/EP3132425A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/0023Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks with encription of the transmittted data signal
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • G07C2009/00246Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed periodically, e.g. after a time period
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • G07C2009/00253Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed dynamically, e.g. variable code - rolling code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00428Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period
    • G07C2009/00452Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period by the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/00492Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a rolling code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C2009/00746Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys by knocking on a surface for inputting the code, e.g. detecting a series of taps on a surface
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/06Involving synchronization or resynchronization between transmitter and receiver; reordering of codes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C9/00674Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
    • G07C9/0069Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in a predetermined sequence

Definitions

  • the field includes locks and more specifically code-activated locks having an electronic access control system.
  • Security units used as solutions for this type of situation may transfer encrypted data by mechanical pulses to open a lock.
  • Locks may lack conventional keys, keyholes or external parts.
  • the user may enter a code using a suitable device, against a corresponding locking unit or adjacent hard surface.
  • Bluetooth, RF or any other suitable implementation may be employed.
  • a fully-customizable access control system may be programmed into the lock to support offline user validation, onetime access codes, and other options.
  • PCT publication WO14006615 describes off-line encoding in an access control system comprising one or more locks, each comprising a receiver for receiving a first signal and a processor module for decoding same signal and for controlling operation of the lock accordingly.
  • Portable access control unit/s are operative for delivering the first signal to one of the receiving modules when in proximity to a respective lock.
  • a central system controller delivers at least one second signal to the control unit and the first signal is generated by the portable access control unit based on the second signal.
  • AES Advanced Encryption Standard
  • RSa public -key cryptography RSa public -key cryptography
  • a synced counter (synchronized between centrally located SW and lock/s) that is computed and incremented e.g. as part of lock operation algorithm logic.
  • the counter may be incremented based on the previous counter and may be a part of the code structure e.g. may be an input to code generation.
  • Each service code may be generated based on inputs e.g. a serial number of the lock and/or a previous - e.g. the most recently computed— counter that in turn may be computed based on a previous - e.g. the most recently computed— previous counter.
  • Each service code may be limited for use in a specific time window and/or may be used only once within a (e.g.
  • All service codes' time windows may be uniform i.e. all service codes generated within a particular time window such as midnight till 4 AM, expire together at the end of that time window i.e. at 4 AM.
  • the lock may receive a code e.g. service code or access code from the key and then compute a certain number of codes ahead (or some other parameter determining the number of codes e.g. length of the segment within a sequence of expected codes). The lock may then check if the received code matches one of a predetermined segment of expected codes including, say, 10 (or any other parameter value) computed codes. 10 (say) codes may be computed because a code might have been generated by the software but not used on the lock so the lock may look for each of an entire segment of codes within a sequence of codes which the lock may compute based on an incremented counter e.g. as described herein.
  • a code e.g. service code or access code from the key and then compute a certain number of codes ahead (or some other parameter determining the number of codes e.g. length of the segment within a sequence of expected codes).
  • the lock may then check if the received code matches one of a predetermined segment of expected codes including, say, 10 (or any other parameter value)
  • Certain embodiments of the present invention seek to provide a method and system for generating a time limited access code (e.g. service code) for several offline locking units that may all be clustered at one site and/or may all be clustered functionally or administratively as the responsibility of a single administrative or maintenance person, crew or group.
  • a time limited access code e.g. service code
  • references to opening or unlocking are merely exemplary in this disclosure and alternatively any "controlling operation of the lock” may be substituted including but not limited to include locking or unlocking or imparting any other functionality to a lock such as but not limited to programming the processor module of the lock in such a manner so as to affect future operation of the lock (e.g. automatically unlocking at a specific time and under specific circumstances, programming the lock or the processor module in a lock to be primed for unlocking by a defined emergency code, etc.); for example, defining a subsequent first coded signal for opening the lock, (e.g. the first coded signal to which the lock may be responsive to in a subsequent operation).
  • a subsequent first coded signal for opening the lock e.g. the first coded signal to which the lock may be responsive to in a subsequent operation.
  • Certain embodiments seek to provide an access-code-activated locking system for at least one asset/s, the system comprising for each asset, a pre-programmed apparatus which uses at least one processor to trigger imposed advancement at predefined intervals, to predetermined imposed positions in a sequence of expected access codes wherein each of said codes, when recognized, unlocks access to the asset; and a lock which provides access to the asset responsive to recognition of an access code, which is presented by an access seeker and which falls within a currently expected segment of access codes lying along said sequence.
  • Embodiment 1 An access-code-activated locking system for at least one asset/s, the system comprising:
  • a pre-programmed apparatus which uses at least one processor to trigger imposed advancement at predefined intervals, to predetermined imposed positions in a sequence of expected access codes;
  • a lock which unlocks and provides access to at least one asset responsive to recognition of an access code presented by an access seeker if said code falls within a currently expected segment of access codes lying along said sequence wherein each currently expected segment is defined relative to a current imposed position from among said predetermined imposed positions.
  • the at least one processor may be co-located with the lock e.g. wired thereto or may, in certain applications, be remotely located relative to the lock.
  • a currently expected segment may be defined in any suitable manner relative to the current imposed position in the code sequence.
  • the currently expected segment may begin at the current imposed position.
  • Embodiment 2 A system according to any of the preceding Embodiments wherein multiple assets are provided each having said pre-programmed apparatus thereby to define multiple pre-programmed apparatus units and wherein all of said multiple pre-programmed apparatus units are pre-programmed to simultaneously trigger periodic advancement to identical imposed positions.
  • Embodiment 3 A system according to any of the preceding Embodiments wherein said imposed positions are selected enough positions ahead, along said sequence, such that each imposed position is always further along than each asset's preprogrammed apparatus's currently expected position absent said imposed advancement in said expected access code sequence, notwithstanding variance between number of times assets are accessed during said intervals.
  • Embodiment 4 A system according to any of the preceding Embodiments wherein said imposed advancement is periodic and said predefined intervals are equal.
  • Embodiment 5 A system according to any of the preceding Embodiments wherein length of said predefined intervals is a system configurable parameter defined according to a system user profile.
  • Embodiment 6 A system according to any of the preceding Embodiments wherein identity of said imposed positions is a system configurable parameter defined according to a system user profile.
  • Embodiment 7 A locking method comprising:
  • Embodiment 8 A method according to any of the preceding Embodiments wherein said sequence of codes known to all locks is generated by each of said locks.
  • Embodiment 9 A method according to any of the preceding Embodiments wherein at least one code in said sequence of codes is generated by each of said locks by applying a predetermined cryptographic procedure known to all locks, to a previous code in said sequence of codes.
  • Embodiment 10 A method according to any of the preceding Embodiments wherein counter generation requires less power than code generation.
  • Embodiment 11 A method according to any of the preceding Embodiments wherein functionality in at least one lock generates codes as a cryptographic function of at least a counter which is a cryptographic function of a previous counter defined for said sequence.
  • Embodiment 12 A method according to any of the preceding Embodiments wherein functionality in at least one lock generates at least one code using SHA-1 functionality.
  • Embodiment 13 A method according to any of the preceding Embodiments wherein functionality in at least one lock generates at least one counter using LCG functionality.
  • Embodiment 14 A method according to any of the preceding Embodiments wherein functionality in at least one lock generates at least one counter as a cryptographic function of at least a current index of a position defined with reference to said sequence.
  • Embodiment 15 A method according to any of the preceding Embodiments wherein functionality in at least one individual lock generates at least one counter as a cryptographic function of a pre-synced parameter uniquely identifying said individual lock.
  • Embodiment 16 A method according to any of the preceding Embodiments wherein said set of at least one code-operated lock comprises a plurality of code- operated locks.
  • Embodiment 17 A method according to any of the preceding Embodiments or any of the preceding Embodiments 10 and wherein the lock is operative at least once to generate a next counter from a previous counter without generating a code from the previous counter.
  • Embodiment 18 A system according to any of the preceding Embodiments wherein the lock comprises an off-line lock which, during normal operation, does not communicate with any remote apparatus.
  • Embodiment 19 A method according to any of the preceding Embodiments wherein each of said locks is pre-programmed to unlock responsive to presentation of any code within a segment of at least one codes within said sequence wherein said segment is pre-defined relative to a current one of said predetermined new positions.
  • Embodiment 20 A computer program product, comprising a non-transitory tangible computer readable medium having computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a locking method comprising advancing to a predetermined new position in a sequence of codes known to all locks in a set of code-operated locks, at predetermined times known to each lock in said set.
  • a computer program comprising computer program code means for performing any of the methods shown and described herein when said program is run on a computer; and a computer program product, comprising a typically non-transitory computer-usable or -readable medium e.g. non-transitory computer -usable or -readable storage medium, typically tangible, having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement any or all of the methods shown and described herein. It is appreciated that any or all of the computational steps shown and described herein may be computer-implemented.
  • non-transitory is used herein to exclude transitory, propagating signals or waves, but to otherwise include any volatile or non-volatile computer memory technology suitable to the application.
  • Any suitable processor, display and input means may be used to process, display e.g. on a computer screen or other computer output device, store, and accept information such as information used by or generated by any of the methods and apparatus shown and described herein; the above processor, display and input means including computer programs, in accordance with some or all of the embodiments of the present invention.
  • any or all functionalities of the invention shown and described herein, such as but not limited to steps of flowcharts, may be performed by a conventional personal computer processor, workstation or other programmable device or computer or electronic computing device or processor, either general-purpose or specifically constructed, used for processing; a computer display screen and/or printer and/or speaker for displaying; machine-readable memory such as optical disks, CDROMs, DVDs, BluRays, magnetic-optical discs or other discs; RAMs, ROMs, EPROMs, EEPROMs, magnetic or optical or other cards, for storing, and keyboard or mouse for accepting.
  • the term "process” as used above is intended to include any type of computation or manipulation or transformation of data represented as physical, e.g. electronic, phenomena which may occur or reside e.g. within registers and /or memories of a computer or processor.
  • the term processor includes a single processing unit or a plurality of distributed or remote such units.
  • the above devices may communicate via any conventional wired or wireless digital communication means, e.g. via a wired or cellular telephone network or a computer network such as the Internet.
  • the apparatus of the present invention may include, according to certain embodiments of the invention, machine readable memory containing or otherwise storing a program of instructions which, when executed by the machine, implements some or all of the apparatus, methods, features and functionalities of the invention shown and described herein.
  • the apparatus of the present invention may include, according to certain embodiments of the invention, a program as above which may be written in any conventional programming language, and optionally a machine for executing the program such as but not limited to a general purpose computer which may optionally be configured or activated in accordance with the teachings of the present invention. Any of the teachings incorporated herein may wherever suitable operate on signals representative of physical objects or substances.
  • the term "computer” should be broadly construed to cover any kind of electronic device with data processing capabilities, including, by way of non-limiting example, personal computers, servers, computing system, communication devices, processors (e.g. digital signal processor (DSP), microcontrollers, field programmable gate array (FPGA), application specific integrated circuit (ASIC), etc.) and other electronic computing devices.
  • processors e.g. digital signal processor (DSP), microcontrollers, field programmable gate array (FPGA), application specific integrated circuit (ASIC), etc.
  • DSP digital signal processor
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • Any suitable input device such as but not limited to a sensor, may be used to generate or otherwise provide information received by the apparatus and methods shown and described herein.
  • Any suitable output device or display may be used to display or output information generated by the apparatus and methods shown and described herein.
  • Any suitable processor may be employed to compute or generate information as described herein e.g. by providing one or more modules in the processor to perform functionalities described herein.
  • Any suitable computerized data storage e.g. computer memory may be used to store information received by or generated by the systems shown and described herein.
  • Functionalities shown and described herein may be divided between a server computer and a plurality of client computers. These or any other computerized components shown and described herein may communicate between themselves via a suitable computer network.
  • FIG. 1 is a simplified flowchart illustration of a method for operating an access- code-activated locking system according to certain embodiments.
  • Fig. 2 is a simplified flowchart illustration of a first time synchronization method according to certain embodiments.
  • Fig. 3 is a simplified flowchart illustration of a service code generation method according to certain embodiments.
  • Figs. 4-8 are simplified flowchart illustrations of locking unit cluster functionality provided according to certain embodiments; in particular Fig. 4 is a method for new cluster generation; Fig. 5 for generation of a new locking unit in a cluster; Fig. 6 for generation of a new Access Definition in a cluster; and Fig. 7 for generating a code for a cluster.
  • the method may include some or all of the illustrated steps, suitably ordered e.g. as illustrated.
  • Computational components described and illustrated herein can be implemented in various forms, for example, as hardware circuits such as but not limited to custom VLSI circuits or gate arrays or programmable hardware devices such as but not limited to FPGAs, or as software program code stored on at least one tangible or intangible computer readable medium and executable by at least one processor, or any suitable combination thereof.
  • a specific functional component may be formed by one particular sequence of software code, or by a plurality of such, which collectively act or behave or act as described herein with reference to the functional component in question.
  • the component may be distributed over several code sequences such as but not limited to objects, procedures, functions, routines and programs and may originate from several computer files which typically operate synergistically.
  • Data can be stored on one or more tangible or intangible computer readable media stored at one or more different locations, different network nodes or different storage devices at a single node or location.
  • Suitable computer data storage or information retention apparatus may include apparatus which is primary, secondary, tertiary or off-line; which is of any type or level or amount or category of volatility, differentiation, mutability, accessibility, addressability, capacity, performance and energy use; and which is based on any suitable technologies such as semiconductor, magnetic, optical, paper and others.
  • a counter is divided or partitioned into groups (e.g. subsequences) of steps, e.g. access code positions, which may be identified by suitable indices, within a sequence of such codes may be divided or partitioned into, say, groups with e.g. 50 steps per group. Every predefined time interval (e.g. once a day) the lock is pre-programmed to increment its counter to an imposed position at the beginning of the next counter group; this is also known as "advancing" or “pushing forward” of the counter to its new imposed position.
  • a 20-counter gap (say) may develop, but the next day the gap may be eliminated and initially, on that day, both locks are again synchronized to the same counter.
  • Each day the locks may become unsynchronized again by day's end, but they start each day synchronized.
  • Each service code may be computed using a suitable cryptographic hash function such as but not limited to SHA-1 function.
  • One of the input parameters to SHA-1 may be an AC counter. This process consumes time hence power,
  • the AC counter may be generated using a suitable pseudorandom number generator e.g. linear congruential generator (LCG) function.
  • LCG linear congruential generator
  • SHA-1 is one of several cryptographic hash functions ("secure hash algorithms") designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States National Institute of Standards and Technology.
  • Codes for presentation to a lock can be distributed to access seekers by any suitable method e.g. orally by telephone, by text messages, smart phone app and so forth.
  • an access-code-activated locking system for securing at least one asset/s, the system comprising, for each asset, preprogrammed apparatus which triggers imposed advancement at predefined intervals, to predetermined imposed positions in a sequence of expected access codes which, when recognized, unlock access to the asset. Also, a lock provides access to the asset responsive to recognition of an access code, which is presented by an access seeker and which falls within a currently expected segment of access codes lying along said sequence.
  • Fig. 1 A method according to a certain embodiment of the invention, which is a suitable method of operation for the access-code-activated locking system described above, is presented in Fig. 1.
  • the lock is operative at least once to generate a previous counter and then generate a next counter therefrom without generating a code from the previous counter. This is advantageous when, as is often the case, counter generation is more rapid and requires less computation resources (hence less power) than code generation.
  • the method of Fig. 1 may include some or all of the following steps, suitably ordered e.g. as shown: Step 10: imposed advancement each 2400 o'clock (say), to next of predetermined imposed positions in sequence of access codes to be generated at lock; typically lock (e.g. software functionality thereof) generates codes as cryptographic function (e.g. SHA-1) of counter which is a cryptographic function (e.g. LCG) of previous counter
  • cryptographic function e.g. SHA-1
  • LCG cryptographic function
  • Step 20 access seeker presents code to lock
  • Step 30 lock (e.g. software functionality thereof) generates a next code, typically depending on e.g. starting. From the current imposed position.
  • step 30 is performed more than once, e.g. as described below with reference to step 40, typically yielding a segment of the computer code sequence, starting from or otherwise defined relative to predetermined imposed position.
  • Generating each next code may comprise: (a) using LCG or other cryptographic function to generate a next counter based e.g. on previous counter and/or on current index/position in code sequence and/or on serial number of lock, then (b) using SHA-1 or other cryptographic function to generate next code based inter alia on the next (i.e. current) counter.
  • Step 40 after computing each code in step 30, the lock checks whether the presented code equals the code just computed in step 30; if so the lock unlocks; if not revert to step 30 to compute the next code (typically unless N (parameter) codes have already been computed and none have been found equal to the presented code).
  • a Service Code Auto-Sync function may be used in conjunction with Log n' Lock Intranet (LNLi) and Locking Unit logic and keys, as distributed by Knock n' Lock, however these devices are referred to merely by way of example.
  • Any suitable service-code activated lock ('locking unit") and service-code providing key/s may be employed.
  • the lock's software may comprise any suitable "service code generator” functionality which generates, typically in a predetermined fashion, a suitable sequence of service codes, each code typically being based inter alia on the previous code e.g. by hashing or applying any other suitable cryptographic function to, a previous code inter alia e.g. as described herein.
  • the Log n' Lock Intranet may be replaced by any suitable apparatus for initializing, e.g. via cable, parameters defining the methods of operation of the lock's software which may include any or all of the methods illustrated and described herein.
  • the Service Code Auto-Sync function may prevent Service Codes in the Log n' Lock Intranet (e.g.) from getting out of sync from Service Codes in the Locking Unit so as to avoid situations in which a generated Service Code fails to unlock the Locking Unit and/or in which the Locking Unit needs to be re-synced before the Service Code can be used again in the Locking Unit.
  • This functionality may for example be employed in conjunction with any suitable code-based key such as but not limited to Knock n' Lock's Personal KnocKeys (PK174) and Shared KnocKeys (MK204 and KK254).
  • a Service Code may be generated by providing some or all of the following several parameters to the Service Code generator: A Service Code_Counter which is unique to the specific KnocKey and Locking Unit.
  • the Service Code_Counter typically advances in Log n' Lock Intranet (e.g.) whenever a new code is generated.
  • the Service Code_Counter typically advances only when a valid code is detected.
  • the Locking Unit is typically offline e.g.
  • continuous time axes are "sliced" into predetermined, equal time periods or “intervals” whose starting point/s may coincide with the starting point/s of at least one predefined service code window ("Service Shift").
  • Service Shift service code window
  • each service code is applicable only for a given time period from among predetermined time periods into which a 12 hour period (say) is divided or partitioned, such as one of the following: 8-12 o'clock, 12-4 o'clock, 4-8 o'clock; then codes may if desired for simplicity, be advanced at precisely 8 or 12 or 4 o'clock.
  • the Time Slice is typically measured in days, or alternatively in hours, weeks, minutes, months, etc.
  • a Time Slice Point is a point in a day (say) where one Time Slice ends and another begins. Time Slice Point is typically the beginning of a first "Service Shift" in a day.
  • a suitable formula for computing the Time Slice Point (TSP) is:
  • a Service Counter Group is the number of Service Code_Counters that are pre-allocated for each Time Slice, e.g. a rate of Service Code_Counters per Time Slice.
  • Each Time Slice typically receives a zero based index called a TSI or Time Slice Index which may be used, e.g. by Log n' Lock Intranet and a Locking Unit, to determine the Time Slice difference between the last used Service Code Group (SCG) and the current Service Code Group (SCG).
  • a TSI Time Slice Index
  • SCG Service Code Group
  • SCG Service Code Group
  • a Service Code Counter counts the number of Service Code_Counter increments in each Time Slice. Whenever the Service Code_Counter advances to the next value, the Service Code Counter (SCI) increments.
  • Service Counter Auto-Rotation In the physical Locking Unit, there may be either or both of two types of Time Slice Index (TSI). One is the Locking Unit Time Slice Index (TSI) which is tied to the real-time-clock. Another is per Access Definition Time Slice Index (TSI). Whenever a Time Slice ends (e.g.
  • the Locking Unit enters an Auto-Rotation mode in which all Service Access Definitions are fetched from the internal memory and each Time Slice Index (TSI) is tested against the Locking Unit Time Slice Index (TSI).
  • TSI Time Slice Index
  • TSI Time Slice Index
  • SCG Service Code Group
  • TTI Time Slice Index
  • Service Counter Rotation-On-Demand In Log n' Lock Intranet, for example, the Service Codes are requested based on user demand and therefore the Service Code_Counter rotation is done on demand, whenever a code is requested.
  • the logic for rotating the Service Code_Counter may be the same as in "Auto-Rotation”.
  • the system level Time Slice Index (TSI) may be updated before "rotating" the Access Definition Service Code_Counter.
  • TSI Time Slice Index
  • TSI LNLi FLOOR[(CurrentDateTime - Re / _ TSP) days I TS ]
  • FLOOR is the floor operator
  • CurrentDateTime is the date and time of the Service Code request, the result of the subtraction is given in days
  • Ref_TSP is reference Time Slice Point (TSP) computed in Log n' Lock Intranet (e.g.) upon first Locking Unit sync, described below.
  • Fig. 3 illustrates a suitable Service Code Generation process.
  • Log n' Lock Intranet e.g.
  • Log n' Lock Intranet typically performs some or all of the following operations, suitably ordered e.g. as follows or as shown in Fig. 3:
  • Fig. 2 illustrates a suitable First time Locking Unit sync process.
  • Log n' Lock Intranet e.g.
  • Log n' Lock Intranet typically computes a Ref_TSP to be used from that point on both in Log n' Lock Intranet (e.g.) and in the Locking Unit, for computing the next Time Slice Point (TSP).
  • Ref_TSP includes date and time of the last Time Slice Point (TSP).
  • a suitable formula for computing Ref_TSP is:
  • the cluster function may be incorporated into the Log n' Lock Intranet (LNLi), or in conjunction with alternative functionality e.g. service code generation functionality.
  • the clustering may allow grouping several Locking Units together such that they share common properties.
  • the cluster function may make it possible to generate a Service Code for a key (e.g. Knock N' Lock Personal KnocKey) for all of, or a plurality of, Locking Units in a cluster, by a single request.
  • the resulting Service Code may be used to unlock all Locking Units in the cluster.
  • a “cluster” may include a group of Locking Units linked together (e.g. in LNLi).
  • a cluster may for example be similar in some ways to the LNLi Groups function. But the Locking Units in the cluster may be partially autonomous since they may share some of their properties with other Locking Units in the same cluster.
  • the Locking Units' properties in the cluster may be either shared and personal, where shared properties are identical in all Locking Units, and personal properties include an individual Locking Unit's unique behavior and definition properties such as but not limited to Locking Unit type and Auto-Relock-Delay.
  • shared properties include properties related to Service Code generation and handling, such as but not limited to Time Zone and Time Window Length.
  • LNLi when creating a new cluster, LNLi may automatically generate, typically, "behind the scenes" or in background, Service Code specific properties to be shared among Locking Units in the cluster. Additionally, user- presentable properties may be shown on a screen to enable a human user to change these properties. Once a first Locking Unit's sync has been effected, all these properties are typically locked for changes. As shown in Fig. 5, when a new Locking Unit in a cluster is created, the Locking Unit inherits all the shared properties and a user may be left the option of changing personal Locking Unit properties on the screen. In addition, typically, all "Cluster Service Access Definitions" are copied to the new Locking Unit.
  • a cluster may be considered “synced" when all Locking Units in the cluster are synced e.g. using a Knock n'Lock CC170 providing PC (personal computer) to Locking Unit communication for Log N'Lock programming, or other suitable communication cable.
  • a Knock n'Lock CC170 providing PC (personal computer) to Locking Unit communication for Log N'Lock programming, or other suitable communication cable.
  • Cluster Service Access Definitions are updated before the actual sync is effected.
  • the synced "Cluster Service Access Definitions" may be fetched from all Locking Units and the most progressed (most advanced) Cluster Service Access Definition in terms of Time Slice Index (TSI) may be employed.
  • TSI Time Slice Index
  • Time Slice Index (TSI) and Service Code Counter (SCI) may then be updated in all Locking Unit's "Cluster Service Access Definitions" to ensure that all the Cluster Locking Unit's "Cluster Service Access Definitions" are synced between LNLi and the physical Locking Units and between the Locking Units themselves.
  • Regular and Fixed Access Definitions may be added to a single Locking Unit in a cluster or all Locking Units. When added to all Locking Units, the user can choose whether to have the same unlock code for all Locking Units in the cluster.
  • An Access Definition can be created for a Shared KnocKey (MK204, KK204) or a Personal KnocKey (PK174).
  • a Service Access Definition for a Shared KnocKey may for example be created as is conventional in commercially available Knock n' Lock technology.
  • a Knock n' Lock Service Access Definition may be created e.g. conventionally, and the user refrains from requesting the "Same Service Code for all" option.
  • a service code may be generated and then "shared" with all locks (and typically keys) associated with a particular cluster.
  • the "generate service code” block may use any of the code generation method variations shown and described herein.
  • the "cluster AD” block typically asks: “is the current access definition a cluster access definition e.g. does the current AD point to a cluster?"
  • Any suitable scheme may be employed to define access definitions which link locks with keys.
  • Knock n'Lock products support generation of suitable access definitions.
  • a Service Code is desired for a non-Cluster Service Access Definition
  • a suitable code may be generated.
  • the SC_Counter, Time Slice Index (TSI) and Service Code Counter (SCI) may be updated in all Locking Units in the Cluster and Service Code so generated may be shown in all Locking Units.
  • the embodiments shown and described herein may serve security systems in which an encrypted sequence of mechanical pulses may be used to communicate between the lock and the key.
  • the user may enter a code, which passes straight through a solid material to the lock.
  • the system may perform access verification offline - within the locking unit - eliminating the need for network communications. Timing intervals between pulses may contain the lock's encrypted opening code. If the lock identifies the correct code, the lock may open.
  • the technology embedded in the lock may validate the user and/or the code.
  • Access requirements include but are not limited to one -time access codes (impossible to imitate the key— even by recording the code; single -use codes may be uniquely identified with the user, key and locking unit), two-code opening (locks open only after two different valid codes have been entered), time-limited access, delayed access (Configurable delays between initial transmission of code and opening of lock), and scheduling (authorization for specific users to open locking units only during scheduled intervals).
  • An advantage of certain embodiments is that off-line management of programmed locks, which is facilitated by certain embodiments described herein, is not merely a necessity in certain applications, it also provides better security since online communications can fail or be hacked. Also, facilities which are used to provide on-line communication may fail and terminate the on-line communication. The facilities may now need repair but paradoxically, access thereto may become impossible if access thereto is dependent upon functioning of a system which depends on the very on-line communication whose failure caused the repairperson's visit in the first place. To date, synchronization of expected codes (e.g. as per a counter) could only be provided by using on-line management.
  • Some or all of the embodiments shown and described herein may be advantageous in (a) providing a single time limited access code (e.g. service code) for several offline locking units; and/or (b) preventing out-of-sync problems which might otherwise occur if an administrative or maintenance person, crew or group request many codes and then, for whatever reason, fail to use same.
  • a single time limited access code e.g. service code
  • Variation 1 An access control system, comprising:
  • one or more locks each comprises a receiver for receiving a first signal and a processor module for decoding the first signal and for controlling operation of the lock;
  • one or more portable access control units for delivering said first signal to one of said receiving modules when in proximity to a respective lock
  • Variation 2 A system according to Variation 1, wherein the processor module of the lock is pre-programmed for recognition of a first signal with defined attributes and operating the lock based thereon.
  • Variation 3 A system according to Variation 1 or 2, wherein each first signal is a one-time code and after its use the lock's processor is rendered receptive to a different first signal.
  • Variation 4 A system according to Variation 3, wherein the central system controller keeps track of first signals used for controlling operation of a lock and issuing a subsequent second signal for inducing the portable access control unit to output a defined first signal to which a lock is receptive.
  • Variation 5 A system according to any one of Variations 1 to 4, wherein each lock or a group of locks is operated by a unique first signal.
  • Variation 6 A system according to any one of Variations 1 to 5, wherein said portable access control unit is adapted to output a unique, lock-specific first signal, corresponding to its geographical location.
  • Variation 7 A system according to any one of Variations 1 to 6, wherein one or both of the first or second signals are encrypted.
  • Variation 8 A system according to any one of Variations 1 to 7, wherein said central system controller transmits the second signal to said portable access control unit via wired or wireless communication.
  • Variation 9 A system according to any one of Variations 1 to 8, wherein said portable access control unit comprises a user interface for inputting the second signal.
  • Variation 10 A system according to any one of Variations 1 to 9, wherein the first signal is decoded into instructions that define operational parameters of the lock processor module.
  • Variation 11 A system according to Variation 10, wherein the operational parameter is at least one of subsequent opening of the lock, change of operational parameters of the lock, change of functions of the lock, or a new series of access control permissions.
  • Variation 12 A system according to any one of Variations 1 to 11, wherein the portable access control unit is an application or a functionality of a mobile communication device.
  • Variation 13 A system according to any one of Variations 1 to 12, wherein the portable access control unit is a mobile communication device.
  • Variation 14 A system according to Variation 13, wherein the communication between the mobile communication device and the central system controller is through encrypted SMS messages.
  • Variation 15 A system according to any one of Variations 1 to 14, wherein the first coded signal is transmitted from the portable access control unit to the electronic control module of the lock via RF communication, Bluetooth communication protocol, cellular communication, near field communication (NFC), an acoustic or mechanical signal.
  • Variation 16 A system according to Variation 15, wherein said signal is a series of knocks.
  • Variation 17 A system according to any one of Variations 1 to 16, wherein the processor module of the lock comprises an emergency code, activated by receipt of an activation code from the portable access control unit.
  • Variation 18 A system according to any one of Variations 1 to 17, wherein said one or more locks are on-line locks.
  • Variation 19 A system according to Variation 18, wherein the processor module of the lock comprises an emergency code operative once on-line communication fails to be established between the controller and the one or more locks, said emergency code being activated by receipt of an activation code from the portable access control unit.
  • Variation 20 A lock comprising a receiver for receiving a signal and a processor module for decoding the signal and controlling operation of the lock based thereon, the processor module storing one or more sets of lock-operating instructions functionalized by a system controller through a portable access control unit.
  • Variation 21 A lock according to Variation 20, wherein said lock processor module stores an emergency code, activated by receipt of an activation code from the portable access control unit.
  • Variation 22 A lock according to Variation 20 or 21, wherein said lock receiving module is adapted to receive a first signal from the portable access control unit via RF communication, Bluetooth communication protocol, cellular communication, near field communication (NFC), or an acoustic or mechanical signal.
  • Variation 23 A lock according to Variation 22, wherein said signal is a series of knocks.
  • Variation 24 A lock according to any one of Variations 20 to 23, wherein the processor module is pre-programmed for recognition of a first signal with defined attributes and operating the lock based thereon.
  • Variation 25 A lock according to any one of Variations 20 to 24, wherein said processor is adapted to decode the first signal into instructions that define operational parameters of the lock processor module.
  • Variation 26 A lock according to any one of Variations 20 to 25, wherein said processor module and said receiver are positioned at the inner side of a door onto which the lock is installed.
  • Variation 27 A lock according to any one of Variations 20 to 25, being an online lock.
  • Variation 28 A system according to Variation 27, wherein the processor module of the lock comprises an emergency code operative once on-line communication fails to be established between the controller and the one or more locks, said emergency code being activated by receipt of an activation code from the portable access control unit.
  • Variation 29 A portable access control unit for use in the system of Variation 1.
  • Variation 30 A portable access control unit operating in an access control system comprising one or more locks and a central system control, said unit being adapted for receiving a second signal from said central system controller and outputting a first signal based on said second signal for controlling operation of the one or more locks.
  • Variation 31 A portable access control unit according to Variation 30, adapted for encrypting the second signal into the first signal.
  • Variation 32 A portable access control unit according to Variation 30 or 31, adapted for communicating with the central system controller via wired or wireless communication.
  • Variation 33 A portable access control unit according to any one of Variations 30 to 32, adapted for communicating with said one or more locks via wired or wireless communication.
  • Variation 34 A portable access control unit according to any one of Variations 30 to 33, comprising a user interface for inputting the second signal.
  • Variation 35 A portable access control unit according to any one of Variations 30 to 34, being an application or a functionality of a mobile communication device.
  • Variation 36 A portable access control unit according to Variation 35, wherein the communication between the mobile communication device and the central system controller is through encrypted SMS messages.
  • Variation 37 A portable access control unit according to any one of Variations 30 to 36, being adapted for transmitting said first signal as a series of knocks.
  • Assets which may be protected include but are not limited to containers and delivery vans, wired and wireless/cellular communications (towers or communication cabinets, and connection boxes e.g.), cable (cable TV cabinets e.g.), industrial sites, shelters, utility equipment e.g. Electricity cabinets, gas and oil reservoirs and gauges, underground control boxes, water reservoirs and gauges, and self-service stations such as automatic Teller Machines (ATMs).
  • ATMs automatic Teller Machines
  • Certain embodiments enjoy at least some of the following advantages: ease and low cost of installation, use and maintenance; no risk or cost of lost or stolen keys (intelligence is in the lock, rather than the key; stolen or lost key is useless without correct access codes but these can be reset at any time); no risk of identity theft; adaptable to future business needs; Resistance to vandalism (invisibility from the outside) and weather (no keyhole), locking units to reduce vandalism, fraud-proof access control which works offline without computer networks or electricity, retrofitting to existing assets e.g.
  • Any computer-readable or machine -readable media described herein is intended to include non-transitory computer- or machine-readable media.
  • Any computations or other forms of analysis described herein may be performed by a suitable computerized method. Any step described herein may be computer- implemented.
  • the invention shown and described herein may include (a) using a computerized method to identify a solution to any of the problems or for any of the objectives described herein, the solution optionally include at least one of a decision, an action, a product, a service or any other information described herein that impacts, in a positive manner, a problem or objectives described herein; and (b) outputting the solution.
  • the system may if desired be implemented as a web-based system employing software, computers, routers and telecommunications equipment as appropriate.
  • a server may store certain applications, for download to clients, which are executed at the client side, the server side serving only as a storehouse.
  • Some or all functionalities e.g. software functionalities shown and described herein may be deployed in a cloud environment.
  • Clients e.g. mobile communication devices such as smartphones may be operatively associated with but external to the cloud.
  • the scope of the present invention is not limited to structures and functions specifically described herein and is also intended to include devices which have the capacity to yield a structure, or perform a function, described herein, such that even though users of the device may not use the capacity, they are if they so desire able to modify the device to obtain the structure or function.
  • a system embodiment is intended to include a corresponding process embodiment.
  • each system embodiment is intended to include a server-centered "view” or client centered “view”, or “view” from any other node of the system, of the entire functionality of the system, computer-readable medium, apparatus, including only those functionalities performed at that server or client or node.
  • Features may also be combined with features known in the art and particularly although not limited to those described in the Background section or in publications mentioned therein.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

La présente invention porte sur un système de verrouillage activé par code pour au moins un bien comprenant, pour chaque bien, un appareil pré-programmé qui utilise au moins un processeur pour déclencher un avancement imposé à des intervalles prédéfinis, à des positions imposées prédéterminées dans une séquence de codes d'accès prévus et un verrouillage qui déverrouille et fournit un accès à au moins un bien en réponse à une reconnaissance d'un code d'accès présenté par un demandeur d'accès. La présente invention porte en outre sur un procédé de verrouillage et un produit de programme d'ordinateur.
EP15779534.5A 2014-04-13 2015-04-12 Système de verrouillage activé par code et procédés fonctionnant conjointement avec ce dernier Withdrawn EP3132425A4 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL232091A IL232091A0 (en) 2014-04-13 2014-04-13 Code activated locking system and methods to use
PCT/IL2015/050384 WO2015159281A1 (fr) 2014-04-13 2015-04-12 Système de verrouillage activé par code et procédés fonctionnant conjointement avec ce dernier

Publications (2)

Publication Number Publication Date
EP3132425A1 true EP3132425A1 (fr) 2017-02-22
EP3132425A4 EP3132425A4 (fr) 2017-12-13

Family

ID=51418188

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15779534.5A Withdrawn EP3132425A4 (fr) 2014-04-13 2015-04-12 Système de verrouillage activé par code et procédés fonctionnant conjointement avec ce dernier

Country Status (3)

Country Link
EP (1) EP3132425A4 (fr)
IL (1) IL232091A0 (fr)
WO (1) WO2015159281A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3090269C (fr) * 2019-05-24 2021-07-20 1Valet Corp. Procede et systeme pour acceder a un batiment securise

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4609780A (en) * 1983-09-29 1986-09-02 Azcorp Technology Electronic secure entry system, apparatus and method
US5089692A (en) * 1988-07-29 1992-02-18 Trioving A.S. Electronic lock
GB2295911B (en) * 1993-02-25 1996-08-14 Rover Group A vehicle security system
US5397884A (en) * 1993-10-12 1995-03-14 Saliga; Thomas V. Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-line locks
US6300873B1 (en) * 1999-09-16 2001-10-09 Atlantes Services, Inc. Locking mechanism for use with one-time access code
GB2368437A (en) * 2000-07-06 2002-05-01 Thomas Bernard Jarman Locking system
US7086258B2 (en) * 2004-03-19 2006-08-08 Sentrilock, Inc. Electronic lock box with single linear actuator operating two different latching mechanisms
US8902042B2 (en) * 2006-05-16 2014-12-02 Lpd, L.L.C. Methods of controlling access to real estate properties

Also Published As

Publication number Publication date
EP3132425A4 (fr) 2017-12-13
WO2015159281A1 (fr) 2015-10-22
IL232091A0 (en) 2014-08-31

Similar Documents

Publication Publication Date Title
US11120656B2 (en) Methods and systems for offline verification code generation based on smart door lock system
US9501881B2 (en) Access management and resource sharing system based on biometric identity
US8902040B2 (en) Electronic lock and method
AU2015287628B2 (en) Networked access control system
CN114898482B (zh) 针对利用虚拟卡数据的进入控制系统的远程编程
EP3704610A1 (fr) Systèmes et procédés de fourniture et de validation de billets numériques
US20190197806A1 (en) Location tracking for locking device
US11212105B2 (en) Systems and methods of providing and validating digital tickets
CN107771343B (zh) 信息处理装置、信息处理方法和程序
US10251059B2 (en) Authentication device and method
US20180270232A1 (en) Wireless firmware updates
JP2019061672A (ja) 期限付セキュアアクセス
US20170180539A1 (en) Back Channel Authentication Using Smartphones
CN110430055A (zh) 离线密码生成方法、离线密码验证方法和门锁管理服务器
US10839626B2 (en) Dynamic key access control systems, methods, and apparatus
US10964145B2 (en) Access control system using blockchain ledger
US11394720B2 (en) Time synchronization using trust aggregation
US11115819B2 (en) Local authentication of communications device
WO2013090211A2 (fr) Accès de dispositif de sécurité
WO2012073265A1 (fr) Procédé de contrôle et de gestion de clés d'accès à des espaces délimités par des serrures électroniques et éléments analogues, et dispositif pouvant être activé en tant que clé conformément audit procédé
US20160203315A1 (en) System and method for granting access to secured environments
CN103294938A (zh) 访问请求验证方法及系统、授权信息生成方法、硬件设备
US12052268B2 (en) Man-in-the-middle extender defense in data communications
CN107958513A (zh) 一种电子锁的离线授权方法及系统
CN112037383B (zh) 一种智能门锁及其权限判定方法和应用系统

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20161108

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20171114

RIC1 Information provided on ipc code assigned before grant

Ipc: E05B 49/00 20060101ALI20171108BHEP

Ipc: G07C 9/00 20060101AFI20171108BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20180612