EP3271902A1 - Zentralisiertes zugangssystem und -verfahren - Google Patents

Zentralisiertes zugangssystem und -verfahren

Info

Publication number
EP3271902A1
EP3271902A1 EP16723660.3A EP16723660A EP3271902A1 EP 3271902 A1 EP3271902 A1 EP 3271902A1 EP 16723660 A EP16723660 A EP 16723660A EP 3271902 A1 EP3271902 A1 EP 3271902A1
Authority
EP
European Patent Office
Prior art keywords
access
user
facilities
database
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP16723660.3A
Other languages
English (en)
French (fr)
Inventor
Olivier ELAMINE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alstria Office REIT AG
Original Assignee
Alstria Office REIT AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alstria Office REIT AG filed Critical Alstria Office REIT AG
Publication of EP3271902A1 publication Critical patent/EP3271902A1/de
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • the present invention generally relates to a centralized access system and method, in particular, to a centralized system for controlling user access to a plurality of distributed facilities, for example, office spaces, residential buildings and the like, and the user's authorization to use specific services within these facilities, for example, a WiFi network, printing services, a gym, a swimming pool or the like.
  • the system In order to be financially profitable, the system must provide solutions for controlling usage of space and services. In addition, the system should be easy to set up, disassemble and store, without reducing the quality of service.
  • a centralized access system for controlling user access to a plurality of distributed facilities comprises a plurality of electronic locks respectively associated with the plurality of distributed facilities, and at least one equipment provided in the plurality of distributed facilities.
  • a central data processing device is in communication with the plurality of electronic locks and the least one equipment.
  • An access device includes a unique ID associated with a user, and a database is configured to store information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities and the at least one equipment.
  • the data processing device is configured to control the plurality of electronic locks to selectively allow or deny access by the access device based on the information stored in the database. Further, the data processing device is configured to selectively allow or deny access to the at least one equipment by the user based on the information stored in the database, for example, simultaneously to allowing or denying access by the access device based on the information stored in the database.
  • a method of controlling user access to a plurality of distributed facilities comprises providing an access device with a unique ID associated with a user, storing information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities in a database, controlling a plurality of electronic locks respectively associated with the plurality of facilities to selectively allow or deny access by the access device based on the information stored in the database, and providing at least one service to the user at the plurality of facilities based on the information stored in the database.
  • a process for providing access and services to building occupants, for example, workers at office spaces is provided.
  • This process could also be used in other areas of real estate, for example, residential buildings or hotels.
  • it is possible to centralize information concerning a specific user, and to allow the user to access multiple spaces, which can be located in multiple geographical regions, and to offer the user several on site services that are the same in all the different locations.
  • This allows a user having a single access device to be able to access different facilities, for example, different office buildings, connect to a wireless network and use office equipment such as printers and the like. This is because each space will recognize the user and the access rights of the user.
  • These access rights, and the corresponding services are controlled both in space (the accessible spaces at different locations) and time (the period of time during which the user has access to a given space).
  • the disclosed system and method could provide for the ability to book a room online, immediately receive the room number, and be able to access the room at the booked date with an access device that has been provided to the user in advance and can be used to access the room without any further need to register upon arrival at the hotel, and get automatic access to the WiFi network of the hotel, or to the minibar in the room.
  • a computer program comprises computer- executable instructions that, when executed on a computer, cause the computer to execute the steps of storing information indicating a period of time during which a user has access to at least part of one or more of a plurality of distributed facilities and to at least one equipment provided in the plurality of distributed facilities in a database, the information including a unique ID associated with the user, and controlling a plurality of electronic locks respectively associated with the plurality of facilities to selectively allow or deny access by an access device including the unique ID associated with the user, and selectively allowing or denying access to the at least one equipment by the user based on the information stored in the database.
  • FIG. 1 shows an exemplary floor plan of a shared office space in accordance with an embodiment of the present invention
  • FIG. 2 shows a schematic overview of a centralized access system in accordance with an embodiment of the present invention.
  • FIG. 3 shows a system architecture in accordance with an
  • FIG. 1 shows a floor plan of a shared office space provided in a building 10 as an example of one of a plurality of distributed facilities that can be accessed using the system and method disclosed herein. It will be appreciated that, in the present example, a plurality of buildings 10 may be provided at different locations distributed around a city, or even in different countries.
  • the term "facilities” as used herein is not intended to only designate different buildings, but may also designate different spaces, for example, floors, apartments or rooms within a building, or other spaces or equipment within an office space that may be accessed using a single access device, preferably at a plurality of different locations (herein referred to as “distributed facilities").
  • building 10 includes a main entrance 41.
  • Main entrance 41 may comprise one or more doors configured to be opened by using an access device to unlock an electronic or smart lock 42, which will be described in more detail below, or by inputting a code via electronic lock 42, which may also function as a code input device.
  • a separate code input device may be provided.
  • the shared office space includes a lobby or waiting room 54, a kitchen or recreational area 58, an open office space 60 including a plurality of workplaces ("open desks") 50, meeting rooms 52, 66, and one or more private offices 22.
  • the shared office space may include one or more flexible meeting rooms 32 being provided with, for example, a telephone or another communication device.
  • a printer room 62 may include a printer 64 and any other office equipment such as a fax machine and the like, which may be used by the user having the appropriate access rights.
  • a separate room may include technical equipment such as, for example, a wireless or wired communication device 26, for example, a router providing access to the internet.
  • a plurality of wireless or wired access points 28 in communication with communication device 26 may be provided.
  • Waiting room 54 may be openly accessible to any person having entered through main entrance 41.
  • an electronic lock (not shown) that may be opened, for example, by inputting an access code or using an access device may be provided in front of waiting room 54.
  • a reception terminal 56 for example, a tablet, may be provided inside waiting room 54.
  • Reception terminal 56 may be configured to be used by a user to, for example, check the availability of one of meeting rooms 52, 66, book one of the meeting rooms 52, 66, reserve private office 22, reserve a seat at one of workplaces 50, and the like. This will be described in more detail below.
  • Waiting room 54 may also include an entrance 20 for access to the main area of the shared office space, i.e., open office space 60, the various meeting rooms 52, 66 and the other facilities provided in the shared office space. Entrance 20 is secured by an electronic (door) lock 21. Access via entrance 20 will be described in more detail below.
  • Each meeting room or private office may be secured by a further electronic lock, for example, a lock 12 in front of private office 22 and a lock 68 in front of meeting room 66.
  • Each meeting room or private office may include a printer 24, a computer 30, a TV, a conference phone, and the like.
  • FIG. 2 shows an overview of the general architecture of the access system of the present disclosure.
  • a centralized access system 100 in accordance with the present disclosure includes data processing device 14, which is in communication with the plurality of electronic locks provided at a plurality of distributed facilities, for example, a plurality of buildings 10, each including the above-described shared office space.
  • FIG. 2 shows data processing device 14 being in communication with (connected to) a plurality of electronic locks (smart locks) 21 provided at the entrance 20 to the main area in each shared office space.
  • Access system 100 also includes an administration interface 70, for example, a known computer having a display and an input device, and a database 18.
  • access system 100 includes an access device 16 including an electronic ID that may be uniquely associated with a user of access system 100. Via administration interface 70, an administrator can manage access of the user carrying access device 16 to the respective office spaces.
  • a user may subscribe to a membership program allowing the user access to all open office spaces 50 in the different facilities.
  • database 18 stores the information that access device 16 may unlock each electronic lock 21 (and, if necessary, electronic lock 42 and any other locks that allow access to entrance 20) at the respective facilities. Therefore, the user travelling, for example, to different cities, each city having a building 10 configured in the above-described manner, may simply enter each building via main entrance 41, for example, by using access device 16, enter open office space 60 via entrance 20 using access device 16 to unlock electronic lock 21, and occupy any available seat at one of open desks 50.
  • the user's access to the different services (WiFi, printers, and the like) provided in each building 10 may also be managed via administration interface 70 and controlled by central data processing device 14. It should be appreciated, however, that this is merely one example for the access rights that may be given to a user. Further details of the system architecture shown in Fig. 2 will be described in the following.
  • FIG. 3 shows the system architecture of centralized access system 100 in more detail.
  • access system 100 includes administration interface 70 and database 18 associated (in communication) with central data processing device 14.
  • data processing device 14 may include a back web application 72 running, for example, on a central server of the entity operating distributed access system 100.
  • Back web application 72 is configured to read from and write to database 18, expose administration interface 70, which is used for managing data related to the plurality of distributed facilities, e.g., shared office spaces, expose an API consumed by a front web application 76 and, for example, a native application running on a mobile device 44 carried by a user, and manage external services such as a locks management solution 77 for controlling the respective electronic locks, a WiFi access management solution controlling WiFi access at the respective facilities, a presence management solution 38 configured for detecting a user presence at each of the plurality of distributed facilities, a payment management solution 80 and an SMS/push management solution 82.
  • expose administration interface 70 which is used for managing data related to the plurality of distributed facilities, e.g., shared office spaces
  • Administration interface 70 may be configured as a website displayed on a computer system used by an administrator to manage data related to the plurality of distributed facilities (for example, creating a space or adding a lock).
  • Administration interface 70 may, for example, be powered by the Rails gem Active Admin, and may offer the following features: administrator authentication, base actions such as create, edit, delete, browsing of records with the help of different filters, and extraction of records into CSV files.
  • API 74 for example, a JSON API
  • a JSON API is the channel through which front web application 76 and the native application running on mobile device 44 get, update, create or delete data.
  • This authentication may be powered, for example, by the gem Devise and its plug-in DeviseTokenAuth.
  • Front web application 76 may provide a user interface 36 including a website that may be displayed on a display of, for example, a personal computer 40 of a user. Using said user interface 36, the user may book access to one or more of the plurality of distributed facilities for a specified period of time.
  • Back web application 72 central data processing device 14
  • Back web application 72 will then correspondingly update database 18 and store the booked access time therein, together with any associated services to which the user has access.
  • back web application 72 leverages external services for tasks requiring specific know-how. These tasks are the control of smart locks, the management of access to a WiFi network, the measurement of an occupancy of a given space, the distribution of SMS and push messages, and the processing of payments. All these interactions are performed through HTTP requests on APIs exposed by each of these services.
  • the plurality of electronic locks may be controlled in the following manner.
  • the electronic locks may be BRIVO smart locks, and the back web application 72 may interact with the RESTful BRIVO API.
  • the BRIVO system is built around three classes: groups, users and locks. A space such as a particular shared office space will correspond to a group, and users and locks correspond to an entry in the BRIVO system.
  • the back-end central data processing device 14, i.e. back web application 72) keeps the BRIVO system updated.
  • Each guest invitation creates a user with a daily subscription, with the guest's ID being set to the ID of the user that is sending the invitation.
  • This host ID indicates to the back-end that it needs to add the guest BRIVO user to the guest-dedicated group.
  • Booking of, for example, a meeting room is performed as follows. At the start of a booking, the meeting room corresponding to the BRIVO group is added to the BRIVO users attending the meeting. At the end of the booking, the meeting room is removed from the BRIVO users attending.
  • back web application 72 manages access to the wireless network, for example, an AEROHIVE WiFi network, through an API such as the ID manager REST API. Through the ID manager, private pre-shared keys (PPSK) unique to each user are created. Each key may be valid for the whole WiFi network.
  • the back-end central data processing device 14 creates a new PPS when a user registers to a space and disables the same when the
  • a service such as, for example, access to a WiFi network may be provided based on the user's registration.
  • Access to such services may be based on access device 16 (for example, a printer or the like may include a contactless reader for reading the ID included in the access device), or it may be based on a code or password generated based on the user's registration (for example, to access a WiFi network or computer, or to be input into a code input device associated with office equipment, doors to specific areas within the facilities, a coffee machine, a video game or other entertainment machine etc.).
  • data may be gathered using a user detection device 28, for example, chair presence detectors (see Fig. 1), cameras provided at the entrance to each facility, and the like.
  • the back-end may be configured to request information on the detection by the user detection device 28 at regular intervals, for example, every five minutes.
  • the information gathered in this manner may also be displayed to a user, for example, on the display of the user's computer 40. This may assist the user in selecting available facilities and/or available workspaces, meeting rooms or private offices.
  • the back-end may further be configured to store device tokens collected by the native application running on a user's portable smart device 44, and may send a push to the smart device 44 when a guest invited by the user has arrived in the waiting room 54, a booking for a meeting room or private office starts, a booking for a meeting room or private office ends, or send a reminder for a booking via SMS/push management solution 82.
  • the back-end may use the phone number collected during user
  • Payment transactions may be performed using any known electronic billing system, for example, STRIPE or any other appropriate payment management solution.
  • STRIPE electronic billing system
  • the mobile and web applications create a customer in the STRIPE system, and send back its ID to the back-end.
  • the mobile and web applications issue a charge corresponding to the duration of the subscription. Once this charge is accepted by the user, the mobile and web applications update the database 18 associated with back web application 72.
  • the back-end verifies with the STRIPE service that the charge ID is genuine and the charge is paid. In this manner, no financial information is transmitted through the back-end. All financial transactions are handled by STRIPE. However, invoices can be generated by the back-end, for example, in PDF format.
  • Database 18 is the part of the back-end that is responsible for storing persistent data.
  • the database system may be powered by an SQL database such as PostgreSQL.
  • SQL database such as PostgreSQL.
  • collaboration with external services may imply using third party databases. In order to keep data integrity intact, as little data as possible is duplicated to external databases.
  • access device 16 is described in more detail. Access and security play an important role in the centralized access system of the present disclosure. To offer a seamless experience to all members, regardless of their level of technological adoption, access passes in the form of an access device are used as the main access control method in accordance with the present disclosure. Said access passes may use wireless technology to communicate with, e.g., contactless readers (the above-mentioned electronic or connected locks, tablets, smartphones, vending machines, etc.). The access passes can take various forms. For example, access device 16 may be an access card, a sticker, a key chain, and the like. In particular, access device 16 may be a conventional smart card having a standard form, which is relatively cheap and easy to personalize and store.
  • Access passes are only available for members and visitors, as will be described in more detail below.
  • the access passes may be used to unlock main entrance 41 of building 10, entrance 21 to the main area of the office space, unlock and lock meeting rooms, for example, meeting rooms 66, 52, unlock and lock private offices such as private office 22, and use additional services, for example, coffee machines, vending machines, and the like.
  • a unique access pass (ID) is assigned for each member and
  • the access pass is stored on access device 16. If a member loses access device 16, a new access device can be configured, for example, in any one of waiting rooms 54. To do so, the user must log in via terminal 56 with his login/password, follow a "I lost my access card" process during which the old access card is disabled and can no longer be used, pick up a new access card, which may be stocked inside waiting room 54, bring the new access card into contact with a contactless reader provided, for example, in or at terminal 56 to synchronize the same with the user account, and use the newly configured access card to unlock entrance 20. Access information is stored in central database 18 and not in a local database for security reasons.
  • the access pass can take various forms, for example, stickers, cards, and the like.
  • NFC near field communication
  • an NFC-enabled mobile phone can be used by a member as an access device.
  • Contactless access control has the advantage that is does not require a complex hardware installation and is very user-friendly.
  • a member can autonomously program a new access device by using terminal 56 having contactless features.
  • a contactless access control can be set up in a large or small space, and also in a plurality of locations (for example, it is easy to enable/disable access across sites).
  • access cards are cost-effective, and hardware costs are minimal as the data management is performed on a central server.
  • door locks play an important role. These door locks only allow access for members, registered visitors and guests. Generally, there can be four types of doors inside the system that require access control. Each door can be unlocked using a valid access pass.
  • Main entrance 41 can be entered using an access device or an access code.
  • electronic lock 42 may perform both of these functions.
  • entrance 20 controls access to the main area of the office space. From the outside, this door can only be opened with a valid access pass (access device). Guests are not allowed to enter via entrance 20 without being accompanied by their host.
  • Meeting room doors can only be locked and unlocked using the access pass of the member who booked it.
  • lock 68 can only be unlocked during the booking period by the user having booked the same.
  • users To check out from a meeting room, users must lock the door to the meeting room from the outside.
  • Private office doors can only be locked and unlocked using the access pass of the member or members who booked it. It can only be unlocked during the booking period, and checkout must be performed by locking the door.
  • the above-mentioned locks are electronic locks that can be unlocked using a contactless access device.
  • electronic locks typically work on a battery. Therefore, power shortage must be identified, and batteries need to be replaced periodically.
  • battery control devices may be provided for each lock and generate an alarm that is sent to back web application 72 to alert an administrator that the battery needs to be replaced.
  • the above- described access control system must be fully integrated with other systems such as access pass creation, the booking system, security systems, invoicing, etc.
  • a separate building door access control exists for building 10 it must also be integrated into the same.
  • the plurality of connected locks of the present disclosure allow for a precise access control for each room, giving different rights for different users at different times. Therefore, with no reception and no staff inside the facilities, the strict but flexible access control using access device 16 and, for example, electronic locks 12, 21, 68 is key to managing spaces and making sure that services are provided to the right users at the right time. In addition, to allow for billing for the provided services, for example, with hourly rates, it is necessary to detect when people check in and check out from each facility and the respective rooms provided therein. Using the plurality of connected locks, the exact moment when a user enters an office space, enters and leaves a meeting room or a private office, and the like, can be registered by access system 100. Further, WiFi access logs can be combined with these data, and it can be estimated who is in a space, as well as the total occupancy of each space. This information can again be displayed to other users intending to book a space or reserve a room.
  • a mobile application can be used to ensure a high level of services while providing mobility, as well as for controlling the overall experience inside the respective facilities.
  • the mobile application offers different services when logged in and logged out. For example, when logged out, users can use the application to consult a location and an availability of the distributed facilities, for example, the office spaces and their associated open desks, meeting rooms, private offices, and the like. Further, the application can be used for sign up and log in, as well as for getting general information on the services provided by centralized access system 100, such as a user guide, contact information, prices.
  • members When logged in, members can use the application to consult/modify their account information, book a desk, a meeting room or a private office, as well as extend/cancel a booking, consult invoices, access additional services such as a taxi service, food delivery, etc., lock/unlock connected doors in case the associated portable device is NFC-enabled, report issues (loss of access device 16, security issues, etc.), and log out.
  • the application is also used to push notifications to users. For example, for a meeting room, a booking start, a booking info, a booking end, a booking update, and the like can be notified. The same applies to private offices. Further, as previously mentioned, arrival of guests can be notified, booking start and booking end for an open desk can be notified, arrival of a delivery can be notified, and the like.
  • a helpline in form of an interactive voice server.
  • This communication channel may provide a solution for users without internet access and a direct link with facility managers for issues and urgent matters.
  • the voice server provides access for users to sign up for the service, manage their account, manage their booking, get an access code for members who forgot their access device, report an issue, and the like.
  • Voice response can be configured in different languages to meet users' preferences. Further, with an interactive voice server, no phone calls are lost, and statistics about most frequent questions and issues can be collected.
  • the website accessed by the user is the first contact point for all types of users. It provides general information about the service, as well as complete control over member accounts.
  • users can use the website to consult the location and availability of office spaces, sign up and log in, and get general information about the offered services.
  • members can use the platform to consult/modify their account information, book a desk, meeting room or private office, and the like, consult invoices, access other services, report issues, and the like.
  • users are automatically redirected to a login page where they can log in (members: login/password, guests: access code sent by their contact), sign up, consult availability, get general information, and the like.
  • members can use the platform to consult/modify their account information, book a desk and the like, consult invoices, access all services offered by system 100, i.e., printers, taxi services, any other type of office equipment, etc., report issues, log out, access a collaborative platform that may be provided to chat and share files with other members and guests, and access the internet.
  • Guests and visitors can use the platform to access the available services at the facility, report issues, log out, access the collaborative platform, access the internet and subscribe to a membership.
  • system 100 may be configured to store user profiles in database 18 that may, for example, be used to appropriately configure any computers, printers and other equipment in the respective office spaces in an automatic manner when they are used by a particular user.
  • the web platform is web based and accessible on any operating system and hardware. Further, being hosted on a central server, the web platform does not require any complex IT infrastructure and is easy to scale if the number of members or facilities grows. Finally, the web platform provides a solution for controlling access to the available services such as printers and the like.
  • Waiting room terminal 56 is a lightweight tool that can mainly be used for automatically configuring new access passes for members. It includes contactless features that allow for reading and programming an access device 16. Terminal 56 is provided in waiting room 54 to give information to users and allow users to automatically sign up and configure a unique access pass. A member may create a new access pass. A guest can use terminal 56 to notify a host of its arrival, enter the access code that was received with the invitation, consult general information about the service, or sign up. A visitor can consult general information about the service, complete a subscription and create an access pass and sign up with the service.
  • a computer and/or tablet 30 is provided for displaying booking information and configuration of a booking.
  • members may use the tablet to control their booking period and be notified if they exceed their time limit, extend the booking, consult and order services, checkout and control room automation if available (light, air conditioning, etc.).
  • an ID validation may be necessary (for booking extension, ordering services, etc.). This may be performed using access device 16 containing the unique access pass of a user.
  • each meeting room may display visual information about its availability. When a member is already inside the office space and immediately needs a meeting room, he or she can simply walk toward a meeting room to unlock it. To make the booking process as seamless as possible, the availability information for the different rooms may also be displayed, for example, at the entrance of waiting room 54 or at any other appropriate location inside the office space by a suitable display device.
  • one or more detection devices 28 may be installed inside the office space to monitor usage of the same.
  • presence detectors may be included in each room, and motion detectors or seating detectors 28 may be provided for each open desk 50.
  • the gathered information will be used to estimate availability of spaces, and to also gather information on how people use the equipment and the respective spaces.
  • locks management solution 77 there are several possibilities for locks management solution 77.
  • smart locks may be used that are WiFi connected locks targeting mainly the home automation market.
  • a conventional hotel card lock system may be used that provides an access control solution for hotels, storing access rights inside an access card.
  • real time access control systems can be used, which use wireless updates from a central server.
  • a real time access control system is used that is resilient to power shortage, network shortage, and can be updated in real time.
  • the system should be easy to install or remove and compatible with standard door locks.
  • the respective locks may be opened by an access pass, a key, or a smartphone, for example, using NFC.
  • each lock should be connected to the central data processing device 14, i.e., the server running back web application 72, and allow for a web-based configuration and management.
  • the system should allow for a precise configuration inside a building, i.e., assigning different rights for different rooms for different access passes at different times.
  • the system should allow for the management of connected locks in different buildings within one system.
  • an exemplary system that may be used is the BRIVO system.
  • NFC communication system may be used, which has the advantage that it may be configured via, for example, smart devices such as a tablet.
  • NFC communication means are already included.
  • an NFC system may be used to ensure future compatibility with smartphones and other connected objects.
  • One solution may be a fully integrated system with custom software, while another solution may be use of a standard tablet with a custom app, perhaps together with a secured enclosure/stand.
  • Using a fully integrated system has the advantage of offering a visible and welcoming experience and a user- friendly interface.
  • the hardware will generally be very reliable.
  • using a secured enclosure/stand the hardware can be protected from stealing and damages.
  • the hardware is easy to configure for one facility and may be reconfigured when moving to another facility.
  • it can provide a user interface for displaying the web platform of the associated service provider.
  • some tablets already offer the possibility to read and configure access devices, using an NFC reader and writer.
  • Governmental contact point solutions e.g., wireless access point solutions
  • any secure platform that enables captive portal support with a simple web-based user interface, assigning different rights and roles for different users, automatically disconnecting at the end of the scheduled time, and compatibility with all platforms can be used.
  • Two types of solutions, which may be used are traditional enterprise class networks and cloud based wireless access solutions.
  • cloud based wireless access solutions are used, as they generally fulfil the above-listed requirements.
  • This system architecture may be composed of a router WiFi fiber modem connected to the internet, a WiFi access point with a POE injector, and cloud based network management software.
  • standard tablets can be used.
  • printer solutions any solution provided by one of the major printing companies may be used.
  • web-to-print solutions could also be used that allow for a seamless way of printing documents from a web interface.
  • a user generally has a particular user status associated with the user.
  • the user may have member status.
  • the user After registering as a member, the user will generally get access to one or more of the plurality of the distributed facilities, for example, one or more of buildings 10 including the shared office spaces. In other words, the member can enter any building 10 and the associated workspace therein using access device 16.
  • data processing device 14 updates database 18 accordingly, and controls locks 21 at each of the facilities to which the user has subscribed to allow access by access device 16 during the times covered by the membership. The same applies to lock 42 provided at main entrance 41 of each building 10.
  • the user may also have access to, for example, meeting room 52, private office 22 via lock 12, or meeting room 66 via lock 68. Further, the user may also book a specific open desk 50 in open office space 60.
  • the subscription may allow the user to access the WiFi network provided at each facility, as well as any other services covered by the subscription, for example, printers or the like.
  • billing for services such as printing and the like may be based on the actual usage of said services, which may be tracked due to the unique ID of access device 16 that is used for accessing the same.
  • a visitor status may be provided that allows users to get access to a space for a limited period of time, for example, one day.
  • a guest may be a user that is invited by a member.
  • a guest does not need to be registered, but gets access to the building by using an access code that is generated, for example, by a code generation device (e.g., the back-end) upon a request by a member.
  • the generated code may be sent to the guest, and the guest may enter the generated code into lock 42 serving as a code input device provided at main entrance 41 of a facility. After entering the facility, the guest may wait in waiting room 54 to be picked up by the member.
  • the guest may also be allowed to access the wireless network and other services during a limited period of time, for example, from 30 minutes before to 30 minutes after a meeting, using the received code.
  • a member that has subscribed to one or more office spaces may use its computer to check the availability of a given office space on the website.
  • the user may log in and book a seat in the open office space 60 of the desired facility, for example, for a few hours.
  • the member uses access device 16 to unlock main entrance 41.
  • the member may also receive a welcome notification on its mobile phone, as well as information on how to find the booked desk. Further, the member will also unlock entrance 20 after passing through waiting room 54 via lock 21, using access device 16. Then, the user may proceed to open office space 60 and sit at any available desk or the specific desk that has been booked.
  • the user may connect to the wireless network and access all services available at the facility.
  • inside open office space 60 may wish to organize a meeting in one of the meeting rooms, for example, meeting room 66.
  • the user may walk to the closest meeting room and see whether the room is available, for example, by checking a sign that is provided in front of each meeting room and displays whether the meeting room is available or not, or during which times it is not available.
  • the user simply uses access device 16 to unlock the meeting room, for example, by unlocking lock 68 provided at meeting room 66. This may result in the meeting room being booked for the member for the next hour in an automatic manner.
  • the booking can be confirmed/extended, for example, using a tablet (not shown) provided in the meeting room.
  • the user leaves meeting room 66 and locks the door using access device 16, thereby ending the booking of the same.
  • a member may set up a meeting with clients or colleagues.
  • the user may log in on the website and select a meeting room and the period of time for which it should be booked. After confirmation, an access code is generated for the clients or colleagues.
  • the member can send the access code to the clients or colleagues, together with additional information such as the address of the facility, the time of the meeting, and the like.
  • the user accesses the facility in the above-described manner.
  • the users may receive a notification, for example, on its mobile phone.
  • the visitors may use terminal 56 provided in waiting room 54 to notify the user. Then, the user picks up the visitors at the waiting room and unlocks the door to the booked meeting room using access device 16.
  • the user can perform various controls such as controlling the
  • a working group can be created on an associated online platform to share files and notes between participants of the meeting.
  • a code allowing access to a facility may be received via email or SMS, together with the address and the time of the meeting.
  • the visitor may enter the code via lock 42 and access building 10. Then, the visitor may proceed to waiting room 54, if necessary, by following signs provided inside building 10. Inside waiting room 54, the visitor may notify the user that has sent the invitation, for example, using terminal 56, and wait until being picked up by the user.
  • the visitor may use the generated access code to access the provided online platform via the wireless network.
  • the visitor may exit building 10 via main entrance 41.
  • a user may register for a free limited time pass, for example, a one day pass using the user's email or telephone number.
  • the user receives a confirmation and a generated access code via SMS or email.
  • the code is valid for, for example, one day.
  • the visitor enters the building 10 and receives a SMS with a welcome message and advice on how to use the facility.
  • the visitor may use terminal 56 to complete registration of a profile (name, surname, password, payment details, etc.).
  • the visitor may pick an access device 16, which may be provided in waiting room 54 and synchronize the same with the visitor's account using terminal 56.
  • the visitor may use access device 16 to unlock entrance 20 via lock 21 and enter open office space 60.
  • the visitor may book a seat, a meeting room or a private office for the day.
  • a user may have a single access device (an access card) that allows access to different hotels, for example, of a hotel chain around the globe.
  • the user may book a room via the website for a specific date, and the system will then automatically program the respective electronic locks provided at the respective hotels to allow the user to access the booked room at the specified date. In this manner, the user does not need to register when arriving at the hotel. Further, checkout can also automatically be performed. In addition, payment may also be handled automatically, for example, as soon as the booking has been confirmed by the user.
  • additional services may also be included and/or booked by the user, for example, access to a wireless network at the hotel, a breakfast room, a gym, or other recreational areas and the like.
  • a tablet or other computer may be provided in each room, which may read in the unique ID stored on the access card or receive any other form of authorization (password, code, etc.) and may be used to order additional services, for example, taxi services, food services, and the like, and also handle electronic billing for the additional services.
  • the disclosed system and method can also be used for airport lounges and the like.
  • the system can configure the electronic locks associated with the respective lounges or lobbies such that the user having the corresponding access device may enter each lounge a predetermined time before its flight departs.
  • the occupancy of each lounge can be determined, and in case of several lounges at a given location, customers may be directed to specific lounges that are not fully occupied.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)
EP16723660.3A 2016-05-18 2016-05-18 Zentralisiertes zugangssystem und -verfahren Ceased EP3271902A1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2016/000828 WO2017198282A1 (en) 2016-05-18 2016-05-18 Centralized access system and method

Publications (1)

Publication Number Publication Date
EP3271902A1 true EP3271902A1 (de) 2018-01-24

Family

ID=56024225

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16723660.3A Ceased EP3271902A1 (de) 2016-05-18 2016-05-18 Zentralisiertes zugangssystem und -verfahren

Country Status (3)

Country Link
EP (1) EP3271902A1 (de)
DE (1) DE202017103011U1 (de)
WO (1) WO2017198282A1 (de)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
HUP1800009A2 (en) * 2018-01-15 2019-07-29 Csaba Kato Self-service hotel-management system
DE102018106145A1 (de) * 2018-03-16 2019-09-19 Steinel Gmbh Gebäude-Sensorsystem
CN109697517A (zh) * 2018-11-16 2019-04-30 杭州掌商电子商务有限公司 一种共享办公室管理平台
JP2021108052A (ja) * 2019-12-27 2021-07-29 富士フイルムビジネスイノベーション株式会社 情報処理システム、情報処理装置、および、プログラム
CN111583457A (zh) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 基于人脸识别的智能门锁系统
US11386731B2 (en) 2020-08-24 2022-07-12 Delphian Systems, LLC Bridge device for access control in a multi-tenant environment
CN112383582A (zh) * 2020-10-09 2021-02-19 爱普(福建)科技有限公司 一种边缘层实时数据的管理方法和系统
DE102021213695A1 (de) * 2021-12-02 2023-06-07 Sphinx Electronics Gmbh & Co Kg Verfahren und System zum Bereitstellen eines vermietbaren Raums für eine über den Tag verteilte Nutzung durch jeweils verschiedene Nutzer

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100201536A1 (en) * 2009-02-10 2010-08-12 William Benjamin Robertson System and method for accessing a structure using a mobile device
US20140002236A1 (en) * 2010-12-02 2014-01-02 Viscount Security Systems Inc. Door Lock, System and Method for Remotely Controlled Access
CN103548060B (zh) * 2011-02-28 2016-06-22 跃动有限公司 用于对电子锁的访问进行控制的系统和方法
US9363264B2 (en) * 2013-11-25 2016-06-07 At&T Intellectual Property I, L.P. Networked device access control
US9437063B2 (en) * 2014-01-04 2016-09-06 Latchable, Inc. Methods and systems for multi-unit real estate management

Also Published As

Publication number Publication date
WO2017198282A1 (en) 2017-11-23
DE202017103011U1 (de) 2017-06-29

Similar Documents

Publication Publication Date Title
WO2017198282A1 (en) Centralized access system and method
US10943420B1 (en) Facility and resource access system
CN104182798B (zh) 基于移动设备的自助订房方法及系统
AU2014218292B2 (en) Methods and systems for management of key exchanges
US20150179012A1 (en) Room access control system
US11800315B2 (en) Methods and devices for monitoring facilities
CN106570641A (zh) 一种基于万物互联的智慧酒店管理系统
CN102262801A (zh) 一种酒店自助入驻系统
WO2013061289A1 (en) Queue remote management system and method
CN110110997A (zh) 一种无人酒店管理系统
CN106845742A (zh) 旅馆一体化管理系统
WO2005062530A1 (en) System and method for providing services across a network
CN106845654A (zh) 基于云通信的旅馆管理与治安管理一体化系统
JP2004086582A (ja) レンタルブースならびにレンタルブースの群管理装置および群管理方法
EP2889812A1 (de) Raumzugangskontrollsystem
JP2017212588A (ja) 情報通知システム
WO2016015090A1 (en) Site attendance management system
JP2019105053A (ja) 設備機器作動システム
CN110992566A (zh) 一种无人酒店系统及自助入住、退房方法
EP3731193A1 (de) Belegungserkennungssystem und -verfahren
JP2003058922A (ja) テーマパーク施設内管理システム
KR102449396B1 (ko) 고객 모바일 앱을 이용한 비대면, 비접촉 및 범용성 기반의 호텔 자율서비스시스템
KR20180075895A (ko) 대규모 이벤트를 위한 숙박시설 연계 및 예약, 관리를 위한 방법
JP7165929B2 (ja) 認証情報出力システム、処理方法、及びプログラム
AU2021101120A4 (en) A method that ensures any person performing an asset service or visit is physically located at the asset when performing the task and provides real time information to the service provider and the asset owner. The method also includes ensuring a person visiting a location is present at that location at that time and this information is shared with interested parties.

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20170713

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20181002

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
APBK Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNE

APBN Date of receipt of notice of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA2E

APBR Date of receipt of statement of grounds of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA3E

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

APBT Appeal procedure closed

Free format text: ORIGINAL CODE: EPIDOSNNOA9E

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20230426