EP3271902A1 - Centralized access system and method - Google Patents

Centralized access system and method

Info

Publication number
EP3271902A1
EP3271902A1 EP16723660.3A EP16723660A EP3271902A1 EP 3271902 A1 EP3271902 A1 EP 3271902A1 EP 16723660 A EP16723660 A EP 16723660A EP 3271902 A1 EP3271902 A1 EP 3271902A1
Authority
EP
European Patent Office
Prior art keywords
access
user
facilities
database
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP16723660.3A
Other languages
German (de)
French (fr)
Inventor
Olivier ELAMINE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alstria Office REIT AG
Original Assignee
Alstria Office REIT AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alstria Office REIT AG filed Critical Alstria Office REIT AG
Publication of EP3271902A1 publication Critical patent/EP3271902A1/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • the present invention generally relates to a centralized access system and method, in particular, to a centralized system for controlling user access to a plurality of distributed facilities, for example, office spaces, residential buildings and the like, and the user's authorization to use specific services within these facilities, for example, a WiFi network, printing services, a gym, a swimming pool or the like.
  • the system In order to be financially profitable, the system must provide solutions for controlling usage of space and services. In addition, the system should be easy to set up, disassemble and store, without reducing the quality of service.
  • a centralized access system for controlling user access to a plurality of distributed facilities comprises a plurality of electronic locks respectively associated with the plurality of distributed facilities, and at least one equipment provided in the plurality of distributed facilities.
  • a central data processing device is in communication with the plurality of electronic locks and the least one equipment.
  • An access device includes a unique ID associated with a user, and a database is configured to store information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities and the at least one equipment.
  • the data processing device is configured to control the plurality of electronic locks to selectively allow or deny access by the access device based on the information stored in the database. Further, the data processing device is configured to selectively allow or deny access to the at least one equipment by the user based on the information stored in the database, for example, simultaneously to allowing or denying access by the access device based on the information stored in the database.
  • a method of controlling user access to a plurality of distributed facilities comprises providing an access device with a unique ID associated with a user, storing information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities in a database, controlling a plurality of electronic locks respectively associated with the plurality of facilities to selectively allow or deny access by the access device based on the information stored in the database, and providing at least one service to the user at the plurality of facilities based on the information stored in the database.
  • a process for providing access and services to building occupants, for example, workers at office spaces is provided.
  • This process could also be used in other areas of real estate, for example, residential buildings or hotels.
  • it is possible to centralize information concerning a specific user, and to allow the user to access multiple spaces, which can be located in multiple geographical regions, and to offer the user several on site services that are the same in all the different locations.
  • This allows a user having a single access device to be able to access different facilities, for example, different office buildings, connect to a wireless network and use office equipment such as printers and the like. This is because each space will recognize the user and the access rights of the user.
  • These access rights, and the corresponding services are controlled both in space (the accessible spaces at different locations) and time (the period of time during which the user has access to a given space).
  • the disclosed system and method could provide for the ability to book a room online, immediately receive the room number, and be able to access the room at the booked date with an access device that has been provided to the user in advance and can be used to access the room without any further need to register upon arrival at the hotel, and get automatic access to the WiFi network of the hotel, or to the minibar in the room.
  • a computer program comprises computer- executable instructions that, when executed on a computer, cause the computer to execute the steps of storing information indicating a period of time during which a user has access to at least part of one or more of a plurality of distributed facilities and to at least one equipment provided in the plurality of distributed facilities in a database, the information including a unique ID associated with the user, and controlling a plurality of electronic locks respectively associated with the plurality of facilities to selectively allow or deny access by an access device including the unique ID associated with the user, and selectively allowing or denying access to the at least one equipment by the user based on the information stored in the database.
  • FIG. 1 shows an exemplary floor plan of a shared office space in accordance with an embodiment of the present invention
  • FIG. 2 shows a schematic overview of a centralized access system in accordance with an embodiment of the present invention.
  • FIG. 3 shows a system architecture in accordance with an
  • FIG. 1 shows a floor plan of a shared office space provided in a building 10 as an example of one of a plurality of distributed facilities that can be accessed using the system and method disclosed herein. It will be appreciated that, in the present example, a plurality of buildings 10 may be provided at different locations distributed around a city, or even in different countries.
  • the term "facilities” as used herein is not intended to only designate different buildings, but may also designate different spaces, for example, floors, apartments or rooms within a building, or other spaces or equipment within an office space that may be accessed using a single access device, preferably at a plurality of different locations (herein referred to as “distributed facilities").
  • building 10 includes a main entrance 41.
  • Main entrance 41 may comprise one or more doors configured to be opened by using an access device to unlock an electronic or smart lock 42, which will be described in more detail below, or by inputting a code via electronic lock 42, which may also function as a code input device.
  • a separate code input device may be provided.
  • the shared office space includes a lobby or waiting room 54, a kitchen or recreational area 58, an open office space 60 including a plurality of workplaces ("open desks") 50, meeting rooms 52, 66, and one or more private offices 22.
  • the shared office space may include one or more flexible meeting rooms 32 being provided with, for example, a telephone or another communication device.
  • a printer room 62 may include a printer 64 and any other office equipment such as a fax machine and the like, which may be used by the user having the appropriate access rights.
  • a separate room may include technical equipment such as, for example, a wireless or wired communication device 26, for example, a router providing access to the internet.
  • a plurality of wireless or wired access points 28 in communication with communication device 26 may be provided.
  • Waiting room 54 may be openly accessible to any person having entered through main entrance 41.
  • an electronic lock (not shown) that may be opened, for example, by inputting an access code or using an access device may be provided in front of waiting room 54.
  • a reception terminal 56 for example, a tablet, may be provided inside waiting room 54.
  • Reception terminal 56 may be configured to be used by a user to, for example, check the availability of one of meeting rooms 52, 66, book one of the meeting rooms 52, 66, reserve private office 22, reserve a seat at one of workplaces 50, and the like. This will be described in more detail below.
  • Waiting room 54 may also include an entrance 20 for access to the main area of the shared office space, i.e., open office space 60, the various meeting rooms 52, 66 and the other facilities provided in the shared office space. Entrance 20 is secured by an electronic (door) lock 21. Access via entrance 20 will be described in more detail below.
  • Each meeting room or private office may be secured by a further electronic lock, for example, a lock 12 in front of private office 22 and a lock 68 in front of meeting room 66.
  • Each meeting room or private office may include a printer 24, a computer 30, a TV, a conference phone, and the like.
  • FIG. 2 shows an overview of the general architecture of the access system of the present disclosure.
  • a centralized access system 100 in accordance with the present disclosure includes data processing device 14, which is in communication with the plurality of electronic locks provided at a plurality of distributed facilities, for example, a plurality of buildings 10, each including the above-described shared office space.
  • FIG. 2 shows data processing device 14 being in communication with (connected to) a plurality of electronic locks (smart locks) 21 provided at the entrance 20 to the main area in each shared office space.
  • Access system 100 also includes an administration interface 70, for example, a known computer having a display and an input device, and a database 18.
  • access system 100 includes an access device 16 including an electronic ID that may be uniquely associated with a user of access system 100. Via administration interface 70, an administrator can manage access of the user carrying access device 16 to the respective office spaces.
  • a user may subscribe to a membership program allowing the user access to all open office spaces 50 in the different facilities.
  • database 18 stores the information that access device 16 may unlock each electronic lock 21 (and, if necessary, electronic lock 42 and any other locks that allow access to entrance 20) at the respective facilities. Therefore, the user travelling, for example, to different cities, each city having a building 10 configured in the above-described manner, may simply enter each building via main entrance 41, for example, by using access device 16, enter open office space 60 via entrance 20 using access device 16 to unlock electronic lock 21, and occupy any available seat at one of open desks 50.
  • the user's access to the different services (WiFi, printers, and the like) provided in each building 10 may also be managed via administration interface 70 and controlled by central data processing device 14. It should be appreciated, however, that this is merely one example for the access rights that may be given to a user. Further details of the system architecture shown in Fig. 2 will be described in the following.
  • FIG. 3 shows the system architecture of centralized access system 100 in more detail.
  • access system 100 includes administration interface 70 and database 18 associated (in communication) with central data processing device 14.
  • data processing device 14 may include a back web application 72 running, for example, on a central server of the entity operating distributed access system 100.
  • Back web application 72 is configured to read from and write to database 18, expose administration interface 70, which is used for managing data related to the plurality of distributed facilities, e.g., shared office spaces, expose an API consumed by a front web application 76 and, for example, a native application running on a mobile device 44 carried by a user, and manage external services such as a locks management solution 77 for controlling the respective electronic locks, a WiFi access management solution controlling WiFi access at the respective facilities, a presence management solution 38 configured for detecting a user presence at each of the plurality of distributed facilities, a payment management solution 80 and an SMS/push management solution 82.
  • expose administration interface 70 which is used for managing data related to the plurality of distributed facilities, e.g., shared office spaces
  • Administration interface 70 may be configured as a website displayed on a computer system used by an administrator to manage data related to the plurality of distributed facilities (for example, creating a space or adding a lock).
  • Administration interface 70 may, for example, be powered by the Rails gem Active Admin, and may offer the following features: administrator authentication, base actions such as create, edit, delete, browsing of records with the help of different filters, and extraction of records into CSV files.
  • API 74 for example, a JSON API
  • a JSON API is the channel through which front web application 76 and the native application running on mobile device 44 get, update, create or delete data.
  • This authentication may be powered, for example, by the gem Devise and its plug-in DeviseTokenAuth.
  • Front web application 76 may provide a user interface 36 including a website that may be displayed on a display of, for example, a personal computer 40 of a user. Using said user interface 36, the user may book access to one or more of the plurality of distributed facilities for a specified period of time.
  • Back web application 72 central data processing device 14
  • Back web application 72 will then correspondingly update database 18 and store the booked access time therein, together with any associated services to which the user has access.
  • back web application 72 leverages external services for tasks requiring specific know-how. These tasks are the control of smart locks, the management of access to a WiFi network, the measurement of an occupancy of a given space, the distribution of SMS and push messages, and the processing of payments. All these interactions are performed through HTTP requests on APIs exposed by each of these services.
  • the plurality of electronic locks may be controlled in the following manner.
  • the electronic locks may be BRIVO smart locks, and the back web application 72 may interact with the RESTful BRIVO API.
  • the BRIVO system is built around three classes: groups, users and locks. A space such as a particular shared office space will correspond to a group, and users and locks correspond to an entry in the BRIVO system.
  • the back-end central data processing device 14, i.e. back web application 72) keeps the BRIVO system updated.
  • Each guest invitation creates a user with a daily subscription, with the guest's ID being set to the ID of the user that is sending the invitation.
  • This host ID indicates to the back-end that it needs to add the guest BRIVO user to the guest-dedicated group.
  • Booking of, for example, a meeting room is performed as follows. At the start of a booking, the meeting room corresponding to the BRIVO group is added to the BRIVO users attending the meeting. At the end of the booking, the meeting room is removed from the BRIVO users attending.
  • back web application 72 manages access to the wireless network, for example, an AEROHIVE WiFi network, through an API such as the ID manager REST API. Through the ID manager, private pre-shared keys (PPSK) unique to each user are created. Each key may be valid for the whole WiFi network.
  • the back-end central data processing device 14 creates a new PPS when a user registers to a space and disables the same when the
  • a service such as, for example, access to a WiFi network may be provided based on the user's registration.
  • Access to such services may be based on access device 16 (for example, a printer or the like may include a contactless reader for reading the ID included in the access device), or it may be based on a code or password generated based on the user's registration (for example, to access a WiFi network or computer, or to be input into a code input device associated with office equipment, doors to specific areas within the facilities, a coffee machine, a video game or other entertainment machine etc.).
  • data may be gathered using a user detection device 28, for example, chair presence detectors (see Fig. 1), cameras provided at the entrance to each facility, and the like.
  • the back-end may be configured to request information on the detection by the user detection device 28 at regular intervals, for example, every five minutes.
  • the information gathered in this manner may also be displayed to a user, for example, on the display of the user's computer 40. This may assist the user in selecting available facilities and/or available workspaces, meeting rooms or private offices.
  • the back-end may further be configured to store device tokens collected by the native application running on a user's portable smart device 44, and may send a push to the smart device 44 when a guest invited by the user has arrived in the waiting room 54, a booking for a meeting room or private office starts, a booking for a meeting room or private office ends, or send a reminder for a booking via SMS/push management solution 82.
  • the back-end may use the phone number collected during user
  • Payment transactions may be performed using any known electronic billing system, for example, STRIPE or any other appropriate payment management solution.
  • STRIPE electronic billing system
  • the mobile and web applications create a customer in the STRIPE system, and send back its ID to the back-end.
  • the mobile and web applications issue a charge corresponding to the duration of the subscription. Once this charge is accepted by the user, the mobile and web applications update the database 18 associated with back web application 72.
  • the back-end verifies with the STRIPE service that the charge ID is genuine and the charge is paid. In this manner, no financial information is transmitted through the back-end. All financial transactions are handled by STRIPE. However, invoices can be generated by the back-end, for example, in PDF format.
  • Database 18 is the part of the back-end that is responsible for storing persistent data.
  • the database system may be powered by an SQL database such as PostgreSQL.
  • SQL database such as PostgreSQL.
  • collaboration with external services may imply using third party databases. In order to keep data integrity intact, as little data as possible is duplicated to external databases.
  • access device 16 is described in more detail. Access and security play an important role in the centralized access system of the present disclosure. To offer a seamless experience to all members, regardless of their level of technological adoption, access passes in the form of an access device are used as the main access control method in accordance with the present disclosure. Said access passes may use wireless technology to communicate with, e.g., contactless readers (the above-mentioned electronic or connected locks, tablets, smartphones, vending machines, etc.). The access passes can take various forms. For example, access device 16 may be an access card, a sticker, a key chain, and the like. In particular, access device 16 may be a conventional smart card having a standard form, which is relatively cheap and easy to personalize and store.
  • Access passes are only available for members and visitors, as will be described in more detail below.
  • the access passes may be used to unlock main entrance 41 of building 10, entrance 21 to the main area of the office space, unlock and lock meeting rooms, for example, meeting rooms 66, 52, unlock and lock private offices such as private office 22, and use additional services, for example, coffee machines, vending machines, and the like.
  • a unique access pass (ID) is assigned for each member and
  • the access pass is stored on access device 16. If a member loses access device 16, a new access device can be configured, for example, in any one of waiting rooms 54. To do so, the user must log in via terminal 56 with his login/password, follow a "I lost my access card" process during which the old access card is disabled and can no longer be used, pick up a new access card, which may be stocked inside waiting room 54, bring the new access card into contact with a contactless reader provided, for example, in or at terminal 56 to synchronize the same with the user account, and use the newly configured access card to unlock entrance 20. Access information is stored in central database 18 and not in a local database for security reasons.
  • the access pass can take various forms, for example, stickers, cards, and the like.
  • NFC near field communication
  • an NFC-enabled mobile phone can be used by a member as an access device.
  • Contactless access control has the advantage that is does not require a complex hardware installation and is very user-friendly.
  • a member can autonomously program a new access device by using terminal 56 having contactless features.
  • a contactless access control can be set up in a large or small space, and also in a plurality of locations (for example, it is easy to enable/disable access across sites).
  • access cards are cost-effective, and hardware costs are minimal as the data management is performed on a central server.
  • door locks play an important role. These door locks only allow access for members, registered visitors and guests. Generally, there can be four types of doors inside the system that require access control. Each door can be unlocked using a valid access pass.
  • Main entrance 41 can be entered using an access device or an access code.
  • electronic lock 42 may perform both of these functions.
  • entrance 20 controls access to the main area of the office space. From the outside, this door can only be opened with a valid access pass (access device). Guests are not allowed to enter via entrance 20 without being accompanied by their host.
  • Meeting room doors can only be locked and unlocked using the access pass of the member who booked it.
  • lock 68 can only be unlocked during the booking period by the user having booked the same.
  • users To check out from a meeting room, users must lock the door to the meeting room from the outside.
  • Private office doors can only be locked and unlocked using the access pass of the member or members who booked it. It can only be unlocked during the booking period, and checkout must be performed by locking the door.
  • the above-mentioned locks are electronic locks that can be unlocked using a contactless access device.
  • electronic locks typically work on a battery. Therefore, power shortage must be identified, and batteries need to be replaced periodically.
  • battery control devices may be provided for each lock and generate an alarm that is sent to back web application 72 to alert an administrator that the battery needs to be replaced.
  • the above- described access control system must be fully integrated with other systems such as access pass creation, the booking system, security systems, invoicing, etc.
  • a separate building door access control exists for building 10 it must also be integrated into the same.
  • the plurality of connected locks of the present disclosure allow for a precise access control for each room, giving different rights for different users at different times. Therefore, with no reception and no staff inside the facilities, the strict but flexible access control using access device 16 and, for example, electronic locks 12, 21, 68 is key to managing spaces and making sure that services are provided to the right users at the right time. In addition, to allow for billing for the provided services, for example, with hourly rates, it is necessary to detect when people check in and check out from each facility and the respective rooms provided therein. Using the plurality of connected locks, the exact moment when a user enters an office space, enters and leaves a meeting room or a private office, and the like, can be registered by access system 100. Further, WiFi access logs can be combined with these data, and it can be estimated who is in a space, as well as the total occupancy of each space. This information can again be displayed to other users intending to book a space or reserve a room.
  • a mobile application can be used to ensure a high level of services while providing mobility, as well as for controlling the overall experience inside the respective facilities.
  • the mobile application offers different services when logged in and logged out. For example, when logged out, users can use the application to consult a location and an availability of the distributed facilities, for example, the office spaces and their associated open desks, meeting rooms, private offices, and the like. Further, the application can be used for sign up and log in, as well as for getting general information on the services provided by centralized access system 100, such as a user guide, contact information, prices.
  • members When logged in, members can use the application to consult/modify their account information, book a desk, a meeting room or a private office, as well as extend/cancel a booking, consult invoices, access additional services such as a taxi service, food delivery, etc., lock/unlock connected doors in case the associated portable device is NFC-enabled, report issues (loss of access device 16, security issues, etc.), and log out.
  • the application is also used to push notifications to users. For example, for a meeting room, a booking start, a booking info, a booking end, a booking update, and the like can be notified. The same applies to private offices. Further, as previously mentioned, arrival of guests can be notified, booking start and booking end for an open desk can be notified, arrival of a delivery can be notified, and the like.
  • a helpline in form of an interactive voice server.
  • This communication channel may provide a solution for users without internet access and a direct link with facility managers for issues and urgent matters.
  • the voice server provides access for users to sign up for the service, manage their account, manage their booking, get an access code for members who forgot their access device, report an issue, and the like.
  • Voice response can be configured in different languages to meet users' preferences. Further, with an interactive voice server, no phone calls are lost, and statistics about most frequent questions and issues can be collected.
  • the website accessed by the user is the first contact point for all types of users. It provides general information about the service, as well as complete control over member accounts.
  • users can use the website to consult the location and availability of office spaces, sign up and log in, and get general information about the offered services.
  • members can use the platform to consult/modify their account information, book a desk, meeting room or private office, and the like, consult invoices, access other services, report issues, and the like.
  • users are automatically redirected to a login page where they can log in (members: login/password, guests: access code sent by their contact), sign up, consult availability, get general information, and the like.
  • members can use the platform to consult/modify their account information, book a desk and the like, consult invoices, access all services offered by system 100, i.e., printers, taxi services, any other type of office equipment, etc., report issues, log out, access a collaborative platform that may be provided to chat and share files with other members and guests, and access the internet.
  • Guests and visitors can use the platform to access the available services at the facility, report issues, log out, access the collaborative platform, access the internet and subscribe to a membership.
  • system 100 may be configured to store user profiles in database 18 that may, for example, be used to appropriately configure any computers, printers and other equipment in the respective office spaces in an automatic manner when they are used by a particular user.
  • the web platform is web based and accessible on any operating system and hardware. Further, being hosted on a central server, the web platform does not require any complex IT infrastructure and is easy to scale if the number of members or facilities grows. Finally, the web platform provides a solution for controlling access to the available services such as printers and the like.
  • Waiting room terminal 56 is a lightweight tool that can mainly be used for automatically configuring new access passes for members. It includes contactless features that allow for reading and programming an access device 16. Terminal 56 is provided in waiting room 54 to give information to users and allow users to automatically sign up and configure a unique access pass. A member may create a new access pass. A guest can use terminal 56 to notify a host of its arrival, enter the access code that was received with the invitation, consult general information about the service, or sign up. A visitor can consult general information about the service, complete a subscription and create an access pass and sign up with the service.
  • a computer and/or tablet 30 is provided for displaying booking information and configuration of a booking.
  • members may use the tablet to control their booking period and be notified if they exceed their time limit, extend the booking, consult and order services, checkout and control room automation if available (light, air conditioning, etc.).
  • an ID validation may be necessary (for booking extension, ordering services, etc.). This may be performed using access device 16 containing the unique access pass of a user.
  • each meeting room may display visual information about its availability. When a member is already inside the office space and immediately needs a meeting room, he or she can simply walk toward a meeting room to unlock it. To make the booking process as seamless as possible, the availability information for the different rooms may also be displayed, for example, at the entrance of waiting room 54 or at any other appropriate location inside the office space by a suitable display device.
  • one or more detection devices 28 may be installed inside the office space to monitor usage of the same.
  • presence detectors may be included in each room, and motion detectors or seating detectors 28 may be provided for each open desk 50.
  • the gathered information will be used to estimate availability of spaces, and to also gather information on how people use the equipment and the respective spaces.
  • locks management solution 77 there are several possibilities for locks management solution 77.
  • smart locks may be used that are WiFi connected locks targeting mainly the home automation market.
  • a conventional hotel card lock system may be used that provides an access control solution for hotels, storing access rights inside an access card.
  • real time access control systems can be used, which use wireless updates from a central server.
  • a real time access control system is used that is resilient to power shortage, network shortage, and can be updated in real time.
  • the system should be easy to install or remove and compatible with standard door locks.
  • the respective locks may be opened by an access pass, a key, or a smartphone, for example, using NFC.
  • each lock should be connected to the central data processing device 14, i.e., the server running back web application 72, and allow for a web-based configuration and management.
  • the system should allow for a precise configuration inside a building, i.e., assigning different rights for different rooms for different access passes at different times.
  • the system should allow for the management of connected locks in different buildings within one system.
  • an exemplary system that may be used is the BRIVO system.
  • NFC communication system may be used, which has the advantage that it may be configured via, for example, smart devices such as a tablet.
  • NFC communication means are already included.
  • an NFC system may be used to ensure future compatibility with smartphones and other connected objects.
  • One solution may be a fully integrated system with custom software, while another solution may be use of a standard tablet with a custom app, perhaps together with a secured enclosure/stand.
  • Using a fully integrated system has the advantage of offering a visible and welcoming experience and a user- friendly interface.
  • the hardware will generally be very reliable.
  • using a secured enclosure/stand the hardware can be protected from stealing and damages.
  • the hardware is easy to configure for one facility and may be reconfigured when moving to another facility.
  • it can provide a user interface for displaying the web platform of the associated service provider.
  • some tablets already offer the possibility to read and configure access devices, using an NFC reader and writer.
  • Governmental contact point solutions e.g., wireless access point solutions
  • any secure platform that enables captive portal support with a simple web-based user interface, assigning different rights and roles for different users, automatically disconnecting at the end of the scheduled time, and compatibility with all platforms can be used.
  • Two types of solutions, which may be used are traditional enterprise class networks and cloud based wireless access solutions.
  • cloud based wireless access solutions are used, as they generally fulfil the above-listed requirements.
  • This system architecture may be composed of a router WiFi fiber modem connected to the internet, a WiFi access point with a POE injector, and cloud based network management software.
  • standard tablets can be used.
  • printer solutions any solution provided by one of the major printing companies may be used.
  • web-to-print solutions could also be used that allow for a seamless way of printing documents from a web interface.
  • a user generally has a particular user status associated with the user.
  • the user may have member status.
  • the user After registering as a member, the user will generally get access to one or more of the plurality of the distributed facilities, for example, one or more of buildings 10 including the shared office spaces. In other words, the member can enter any building 10 and the associated workspace therein using access device 16.
  • data processing device 14 updates database 18 accordingly, and controls locks 21 at each of the facilities to which the user has subscribed to allow access by access device 16 during the times covered by the membership. The same applies to lock 42 provided at main entrance 41 of each building 10.
  • the user may also have access to, for example, meeting room 52, private office 22 via lock 12, or meeting room 66 via lock 68. Further, the user may also book a specific open desk 50 in open office space 60.
  • the subscription may allow the user to access the WiFi network provided at each facility, as well as any other services covered by the subscription, for example, printers or the like.
  • billing for services such as printing and the like may be based on the actual usage of said services, which may be tracked due to the unique ID of access device 16 that is used for accessing the same.
  • a visitor status may be provided that allows users to get access to a space for a limited period of time, for example, one day.
  • a guest may be a user that is invited by a member.
  • a guest does not need to be registered, but gets access to the building by using an access code that is generated, for example, by a code generation device (e.g., the back-end) upon a request by a member.
  • the generated code may be sent to the guest, and the guest may enter the generated code into lock 42 serving as a code input device provided at main entrance 41 of a facility. After entering the facility, the guest may wait in waiting room 54 to be picked up by the member.
  • the guest may also be allowed to access the wireless network and other services during a limited period of time, for example, from 30 minutes before to 30 minutes after a meeting, using the received code.
  • a member that has subscribed to one or more office spaces may use its computer to check the availability of a given office space on the website.
  • the user may log in and book a seat in the open office space 60 of the desired facility, for example, for a few hours.
  • the member uses access device 16 to unlock main entrance 41.
  • the member may also receive a welcome notification on its mobile phone, as well as information on how to find the booked desk. Further, the member will also unlock entrance 20 after passing through waiting room 54 via lock 21, using access device 16. Then, the user may proceed to open office space 60 and sit at any available desk or the specific desk that has been booked.
  • the user may connect to the wireless network and access all services available at the facility.
  • inside open office space 60 may wish to organize a meeting in one of the meeting rooms, for example, meeting room 66.
  • the user may walk to the closest meeting room and see whether the room is available, for example, by checking a sign that is provided in front of each meeting room and displays whether the meeting room is available or not, or during which times it is not available.
  • the user simply uses access device 16 to unlock the meeting room, for example, by unlocking lock 68 provided at meeting room 66. This may result in the meeting room being booked for the member for the next hour in an automatic manner.
  • the booking can be confirmed/extended, for example, using a tablet (not shown) provided in the meeting room.
  • the user leaves meeting room 66 and locks the door using access device 16, thereby ending the booking of the same.
  • a member may set up a meeting with clients or colleagues.
  • the user may log in on the website and select a meeting room and the period of time for which it should be booked. After confirmation, an access code is generated for the clients or colleagues.
  • the member can send the access code to the clients or colleagues, together with additional information such as the address of the facility, the time of the meeting, and the like.
  • the user accesses the facility in the above-described manner.
  • the users may receive a notification, for example, on its mobile phone.
  • the visitors may use terminal 56 provided in waiting room 54 to notify the user. Then, the user picks up the visitors at the waiting room and unlocks the door to the booked meeting room using access device 16.
  • the user can perform various controls such as controlling the
  • a working group can be created on an associated online platform to share files and notes between participants of the meeting.
  • a code allowing access to a facility may be received via email or SMS, together with the address and the time of the meeting.
  • the visitor may enter the code via lock 42 and access building 10. Then, the visitor may proceed to waiting room 54, if necessary, by following signs provided inside building 10. Inside waiting room 54, the visitor may notify the user that has sent the invitation, for example, using terminal 56, and wait until being picked up by the user.
  • the visitor may use the generated access code to access the provided online platform via the wireless network.
  • the visitor may exit building 10 via main entrance 41.
  • a user may register for a free limited time pass, for example, a one day pass using the user's email or telephone number.
  • the user receives a confirmation and a generated access code via SMS or email.
  • the code is valid for, for example, one day.
  • the visitor enters the building 10 and receives a SMS with a welcome message and advice on how to use the facility.
  • the visitor may use terminal 56 to complete registration of a profile (name, surname, password, payment details, etc.).
  • the visitor may pick an access device 16, which may be provided in waiting room 54 and synchronize the same with the visitor's account using terminal 56.
  • the visitor may use access device 16 to unlock entrance 20 via lock 21 and enter open office space 60.
  • the visitor may book a seat, a meeting room or a private office for the day.
  • a user may have a single access device (an access card) that allows access to different hotels, for example, of a hotel chain around the globe.
  • the user may book a room via the website for a specific date, and the system will then automatically program the respective electronic locks provided at the respective hotels to allow the user to access the booked room at the specified date. In this manner, the user does not need to register when arriving at the hotel. Further, checkout can also automatically be performed. In addition, payment may also be handled automatically, for example, as soon as the booking has been confirmed by the user.
  • additional services may also be included and/or booked by the user, for example, access to a wireless network at the hotel, a breakfast room, a gym, or other recreational areas and the like.
  • a tablet or other computer may be provided in each room, which may read in the unique ID stored on the access card or receive any other form of authorization (password, code, etc.) and may be used to order additional services, for example, taxi services, food services, and the like, and also handle electronic billing for the additional services.
  • the disclosed system and method can also be used for airport lounges and the like.
  • the system can configure the electronic locks associated with the respective lounges or lobbies such that the user having the corresponding access device may enter each lounge a predetermined time before its flight departs.
  • the occupancy of each lounge can be determined, and in case of several lounges at a given location, customers may be directed to specific lounges that are not fully occupied.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A centralized access system (100) is used for managing access of users to a plurality of distributed facilities, for example, a plurality of shared office spaces provided at geographically different locations. Each user has an access device (16) such as a smartcard including a unique ID associated with the user. A user can subscribe to obtain access to one or more of the plurality of office spaces for a period of time, and each office space may include a plurality of electronic locks that are connected to a central server (14) of the system. The server (14) may then control the respective locks (21) such that the user has access to the office space, and any services provided therein, at the location and the time that has been booked.

Description

Description
CENTRALIZED ACCESS SYSTEM AND METHOD
Technical Field
The present invention generally relates to a centralized access system and method, in particular, to a centralized system for controlling user access to a plurality of distributed facilities, for example, office spaces, residential buildings and the like, and the user's authorization to use specific services within these facilities, for example, a WiFi network, printing services, a gym, a swimming pool or the like.
Background
There are a number of existing technologies for providing access and services to building occupants, for example, workers in an office building. Due to the considerable costs associated with leasing office space, many small or medium-sized companies, as well as individuals, sometimes use a shared office space provided in a building owned by a corresponding service provider. This allows for avoiding or limiting inefficiencies associated with leasing office space, as such an office space generally includes facilities such as meeting rooms, a kitchen, recreation rooms, and the like, which are rarely used. Further, in today's global economy, it is common for many employees or businessmen to travel both at home and abroad. Therefore, it is advantageous if the person that is travelling has access to office space also during such travels.
When providing such shared office spaces, several design constraints exist. First of all, the user experience must be as seamless as possible and adapted to any type of user. Further, security and access control are a key factor in an environment with no permanent presence of users. In addition, sometimes it may be cost-effective to design the system such that there is no staff on site at the respective office spaces. Nevertheless, the office space should feel welcoming and comfortable.
In order to be financially profitable, the system must provide solutions for controlling usage of space and services. In addition, the system should be easy to set up, disassemble and store, without reducing the quality of service.
Therefore, it is desirable to provide a system and method that allow for a flexible, secure and easy user access to a plurality of distributed facilities such as shared office spaces, but not limited to the same.
Summary of the Invention
In a first aspect, a centralized access system for controlling user access to a plurality of distributed facilities comprises a plurality of electronic locks respectively associated with the plurality of distributed facilities, and at least one equipment provided in the plurality of distributed facilities. A central data processing device is in communication with the plurality of electronic locks and the least one equipment. An access device includes a unique ID associated with a user, and a database is configured to store information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities and the at least one equipment. The data processing device is configured to control the plurality of electronic locks to selectively allow or deny access by the access device based on the information stored in the database. Further, the data processing device is configured to selectively allow or deny access to the at least one equipment by the user based on the information stored in the database, for example, simultaneously to allowing or denying access by the access device based on the information stored in the database.
In a further aspect, a method of controlling user access to a plurality of distributed facilities comprises providing an access device with a unique ID associated with a user, storing information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities in a database, controlling a plurality of electronic locks respectively associated with the plurality of facilities to selectively allow or deny access by the access device based on the information stored in the database, and providing at least one service to the user at the plurality of facilities based on the information stored in the database.
With the system and method disclosed herein, a process for providing access and services to building occupants, for example, workers at office spaces is provided. This process could also be used in other areas of real estate, for example, residential buildings or hotels. With the disclosed system and method, it is possible to centralize information concerning a specific user, and to allow the user to access multiple spaces, which can be located in multiple geographical regions, and to offer the user several on site services that are the same in all the different locations. This allows a user having a single access device to be able to access different facilities, for example, different office buildings, connect to a wireless network and use office equipment such as printers and the like. This is because each space will recognize the user and the access rights of the user. These access rights, and the corresponding services, are controlled both in space (the accessible spaces at different locations) and time (the period of time during which the user has access to a given space).
For example, in the hotel world, the disclosed system and method could provide for the ability to book a room online, immediately receive the room number, and be able to access the room at the booked date with an access device that has been provided to the user in advance and can be used to access the room without any further need to register upon arrival at the hotel, and get automatic access to the WiFi network of the hotel, or to the minibar in the room.
In another aspect, a computer program comprises computer- executable instructions that, when executed on a computer, cause the computer to execute the steps of storing information indicating a period of time during which a user has access to at least part of one or more of a plurality of distributed facilities and to at least one equipment provided in the plurality of distributed facilities in a database, the information including a unique ID associated with the user, and controlling a plurality of electronic locks respectively associated with the plurality of facilities to selectively allow or deny access by an access device including the unique ID associated with the user, and selectively allowing or denying access to the at least one equipment by the user based on the information stored in the database.
[11] Other features and aspects of this disclosure will be apparent from the following description and the accompanying drawings.
Brief Description of the Drawings
[12] In the following, embodiments of the present invention are
described in detail with reference to the attached drawings, in which:
[13] FIG. 1 shows an exemplary floor plan of a shared office space in accordance with an embodiment of the present invention;
[14] FIG. 2 shows a schematic overview of a centralized access system in accordance with an embodiment of the present invention; and
[15] FIG. 3 shows a system architecture in accordance with an
embodiment of the present invention.
Detailed Description
[16] FIG. 1 shows a floor plan of a shared office space provided in a building 10 as an example of one of a plurality of distributed facilities that can be accessed using the system and method disclosed herein. It will be appreciated that, in the present example, a plurality of buildings 10 may be provided at different locations distributed around a city, or even in different countries.
Further, the term "facilities" as used herein is not intended to only designate different buildings, but may also designate different spaces, for example, floors, apartments or rooms within a building, or other spaces or equipment within an office space that may be accessed using a single access device, preferably at a plurality of different locations (herein referred to as "distributed facilities").
As shown in FIG. 1, building 10 includes a main entrance 41. Main entrance 41 may comprise one or more doors configured to be opened by using an access device to unlock an electronic or smart lock 42, which will be described in more detail below, or by inputting a code via electronic lock 42, which may also function as a code input device. In some embodiments, a separate code input device may be provided.
As shown in FIG. 1 , the shared office space includes a lobby or waiting room 54, a kitchen or recreational area 58, an open office space 60 including a plurality of workplaces ("open desks") 50, meeting rooms 52, 66, and one or more private offices 22. In addition, the shared office space may include one or more flexible meeting rooms 32 being provided with, for example, a telephone or another communication device. A printer room 62 may include a printer 64 and any other office equipment such as a fax machine and the like, which may be used by the user having the appropriate access rights. Further, a separate room may include technical equipment such as, for example, a wireless or wired communication device 26, for example, a router providing access to the internet. Throughout the office space, a plurality of wireless or wired access points 28 in communication with communication device 26 may be provided.
Waiting room 54 may be openly accessible to any person having entered through main entrance 41. In some embodiments, however, an electronic lock (not shown) that may be opened, for example, by inputting an access code or using an access device may be provided in front of waiting room 54. Inside waiting room 54, a reception terminal 56, for example, a tablet, may be provided. Reception terminal 56 may be configured to be used by a user to, for example, check the availability of one of meeting rooms 52, 66, book one of the meeting rooms 52, 66, reserve private office 22, reserve a seat at one of workplaces 50, and the like. This will be described in more detail below.
Waiting room 54 may also include an entrance 20 for access to the main area of the shared office space, i.e., open office space 60, the various meeting rooms 52, 66 and the other facilities provided in the shared office space. Entrance 20 is secured by an electronic (door) lock 21. Access via entrance 20 will be described in more detail below.
Each meeting room or private office may be secured by a further electronic lock, for example, a lock 12 in front of private office 22 and a lock 68 in front of meeting room 66. Each meeting room or private office may include a printer 24, a computer 30, a TV, a conference phone, and the like.
Electronic locks 12, 21, 68 and, optionally, lock 42 may form a system of connected locks that are in communication with a central data processing device 14 (for example, a server or the like) shown in FIG. 2. FIG. 2 shows an overview of the general architecture of the access system of the present disclosure. As shown in FIG. 2, a centralized access system 100 in accordance with the present disclosure includes data processing device 14, which is in communication with the plurality of electronic locks provided at a plurality of distributed facilities, for example, a plurality of buildings 10, each including the above-described shared office space. As an example, FIG. 2 shows data processing device 14 being in communication with (connected to) a plurality of electronic locks (smart locks) 21 provided at the entrance 20 to the main area in each shared office space. It will be readily appreciated, however, that this is only an example, and data processing device 14 generally will be in communication with all connected electronic locks provided in the different facilities. Likewise, it will be appreciated that the term "electronic lock" as used herein encompasses any type of electronic or smart lock that has a communication device, a controller and the like enabling remote control of the lock by a central data processing device or control device. Access system 100 also includes an administration interface 70, for example, a known computer having a display and an input device, and a database 18. In addition, access system 100 includes an access device 16 including an electronic ID that may be uniquely associated with a user of access system 100. Via administration interface 70, an administrator can manage access of the user carrying access device 16 to the respective office spaces. For example, a user may subscribe to a membership program allowing the user access to all open office spaces 50 in the different facilities. In this case, database 18 stores the information that access device 16 may unlock each electronic lock 21 (and, if necessary, electronic lock 42 and any other locks that allow access to entrance 20) at the respective facilities. Therefore, the user travelling, for example, to different cities, each city having a building 10 configured in the above-described manner, may simply enter each building via main entrance 41, for example, by using access device 16, enter open office space 60 via entrance 20 using access device 16 to unlock electronic lock 21, and occupy any available seat at one of open desks 50. In addition, the user's access to the different services (WiFi, printers, and the like) provided in each building 10 may also be managed via administration interface 70 and controlled by central data processing device 14. It should be appreciated, however, that this is merely one example for the access rights that may be given to a user. Further details of the system architecture shown in Fig. 2 will be described in the following.
FIG. 3 shows the system architecture of centralized access system 100 in more detail. As previously mentioned, access system 100 includes administration interface 70 and database 18 associated (in communication) with central data processing device 14. In particular, data processing device 14 may include a back web application 72 running, for example, on a central server of the entity operating distributed access system 100. Back web application 72 is configured to read from and write to database 18, expose administration interface 70, which is used for managing data related to the plurality of distributed facilities, e.g., shared office spaces, expose an API consumed by a front web application 76 and, for example, a native application running on a mobile device 44 carried by a user, and manage external services such as a locks management solution 77 for controlling the respective electronic locks, a WiFi access management solution controlling WiFi access at the respective facilities, a presence management solution 38 configured for detecting a user presence at each of the plurality of distributed facilities, a payment management solution 80 and an SMS/push management solution 82.
Administration interface 70 may be configured as a website displayed on a computer system used by an administrator to manage data related to the plurality of distributed facilities (for example, creating a space or adding a lock). Administration interface 70 may, for example, be powered by the Rails gem Active Admin, and may offer the following features: administrator authentication, base actions such as create, edit, delete, browsing of records with the help of different filters, and extraction of records into CSV files.
API 74, for example, a JSON API, is the channel through which front web application 76 and the native application running on mobile device 44 get, update, create or delete data. To restrain the access to the data specific to a user, some endpoints require an authentication. This authentication may be powered, for example, by the gem Devise and its plug-in DeviseTokenAuth.
Front web application 76 may provide a user interface 36 including a website that may be displayed on a display of, for example, a personal computer 40 of a user. Using said user interface 36, the user may book access to one or more of the plurality of distributed facilities for a specified period of time. Back web application 72 (central data processing device 14) will then correspondingly update database 18 and store the booked access time therein, together with any associated services to which the user has access.
As previously mentioned, back web application 72 leverages external services for tasks requiring specific know-how. These tasks are the control of smart locks, the management of access to a WiFi network, the measurement of an occupancy of a given space, the distribution of SMS and push messages, and the processing of payments. All these interactions are performed through HTTP requests on APIs exposed by each of these services.
For example, the plurality of electronic locks may be controlled in the following manner. In particular, the electronic locks may be BRIVO smart locks, and the back web application 72 may interact with the RESTful BRIVO API. The BRIVO system is built around three classes: groups, users and locks. A space such as a particular shared office space will correspond to a group, and users and locks correspond to an entry in the BRIVO system. The back-end (central data processing device 14, i.e. back web application 72) keeps the BRIVO system updated. This happens in the following cases: (i) creation of a space and its locks using administration interface 70, this results in the creation of a BRIVO group with the corresponding BRIVO locks; (ii) creation of a user, (iii) subscription of a user to a space, this results in the addition of the corresponding BRIVO user to the corresponding BRIVO group, (iv) end of a subscription, this results in the BRIVO user being removed from the corresponding BRIVO group. In addition, a guest system may be enabled. To this end, one guest BRIVO group is created per space. This guest group contains only the digicode lock of the space. Each guest invitation creates a user with a daily subscription, with the guest's ID being set to the ID of the user that is sending the invitation. This host ID indicates to the back-end that it needs to add the guest BRIVO user to the guest-dedicated group. Booking of, for example, a meeting room is performed as follows. At the start of a booking, the meeting room corresponding to the BRIVO group is added to the BRIVO users attending the meeting. At the end of the booking, the meeting room is removed from the BRIVO users attending.
Further, back web application 72 manages access to the wireless network, for example, an AEROHIVE WiFi network, through an API such as the ID manager REST API. Through the ID manager, private pre-shared keys (PPSK) unique to each user are created. Each key may be valid for the whole WiFi network. The back-end (central data processing device 14) creates a new PPS when a user registers to a space and disables the same when the
registration ends. In other words, a service such as, for example, access to a WiFi network may be provided based on the user's registration. Access to such services may be based on access device 16 (for example, a printer or the like may include a contactless reader for reading the ID included in the access device), or it may be based on a code or password generated based on the user's registration (for example, to access a WiFi network or computer, or to be input into a code input device associated with office equipment, doors to specific areas within the facilities, a coffee machine, a video game or other entertainment machine etc.).
To estimate the occupancy of the spaces, data may be gathered using a user detection device 28, for example, chair presence detectors (see Fig. 1), cameras provided at the entrance to each facility, and the like. The back-end may be configured to request information on the detection by the user detection device 28 at regular intervals, for example, every five minutes. The information gathered in this manner may also be displayed to a user, for example, on the display of the user's computer 40. This may assist the user in selecting available facilities and/or available workspaces, meeting rooms or private offices.
Preferably, the back-end may further be configured to store device tokens collected by the native application running on a user's portable smart device 44, and may send a push to the smart device 44 when a guest invited by the user has arrived in the waiting room 54, a booking for a meeting room or private office starts, a booking for a meeting room or private office ends, or send a reminder for a booking via SMS/push management solution 82. In the same manner, the back-end may use the phone number collected during user
registration to send a message, for example, an SMS, when an access code to enter a space is received for the first time or when a guest has arrived. Payment transactions may be performed using any known electronic billing system, for example, STRIPE or any other appropriate payment management solution. For example, during registration, the mobile and web applications create a customer in the STRIPE system, and send back its ID to the back-end. When a user wishes to subscribe to a space, the mobile and web applications issue a charge corresponding to the duration of the subscription. Once this charge is accepted by the user, the mobile and web applications update the database 18 associated with back web application 72. To prevent fraud, the back-end verifies with the STRIPE service that the charge ID is genuine and the charge is paid. In this manner, no financial information is transmitted through the back-end. All financial transactions are handled by STRIPE. However, invoices can be generated by the back-end, for example, in PDF format.
Database 18 is the part of the back-end that is responsible for storing persistent data. The database system may be powered by an SQL database such as PostgreSQL. However, collaboration with external services may imply using third party databases. In order to keep data integrity intact, as little data as possible is duplicated to external databases.
In the following, access device 16 is described in more detail. Access and security play an important role in the centralized access system of the present disclosure. To offer a seamless experience to all members, regardless of their level of technological adoption, access passes in the form of an access device are used as the main access control method in accordance with the present disclosure. Said access passes may use wireless technology to communicate with, e.g., contactless readers (the above-mentioned electronic or connected locks, tablets, smartphones, vending machines, etc.). The access passes can take various forms. For example, access device 16 may be an access card, a sticker, a key chain, and the like. In particular, access device 16 may be a conventional smart card having a standard form, which is relatively cheap and easy to personalize and store. Access passes are only available for members and visitors, as will be described in more detail below. In the system of the present disclosure, the access passes may be used to unlock main entrance 41 of building 10, entrance 21 to the main area of the office space, unlock and lock meeting rooms, for example, meeting rooms 66, 52, unlock and lock private offices such as private office 22, and use additional services, for example, coffee machines, vending machines, and the like. A unique access pass (ID) is assigned for each member and
synchronized with the member's account. The access pass is stored on access device 16. If a member loses access device 16, a new access device can be configured, for example, in any one of waiting rooms 54. To do so, the user must log in via terminal 56 with his login/password, follow a "I lost my access card" process during which the old access card is disabled and can no longer be used, pick up a new access card, which may be stocked inside waiting room 54, bring the new access card into contact with a contactless reader provided, for example, in or at terminal 56 to synchronize the same with the user account, and use the newly configured access card to unlock entrance 20. Access information is stored in central database 18 and not in a local database for security reasons.
As mentioned above, the access pass can take various forms, for example, stickers, cards, and the like. Further, for example, with near field communication (NFC), an NFC-enabled mobile phone can be used by a member as an access device. Contactless access control has the advantage that is does not require a complex hardware installation and is very user-friendly. For instance, with NFC, a member can autonomously program a new access device by using terminal 56 having contactless features. Further, a contactless access control can be set up in a large or small space, and also in a plurality of locations (for example, it is easy to enable/disable access across sites). In addition, access cards are cost-effective, and hardware costs are minimal as the data management is performed on a central server. Therefore, no complex IT infrastructure and maintenance teams are needed. [38] In order to control access inside access system 100, door locks play an important role. These door locks only allow access for members, registered visitors and guests. Generally, there can be four types of doors inside the system that require access control. Each door can be unlocked using a valid access pass.
[39] Main entrance 41 can be entered using an access device or an access code. As previously described, electronic lock 42 may perform both of these functions.
[40] Inside waiting room 54, entrance 20 controls access to the main area of the office space. From the outside, this door can only be opened with a valid access pass (access device). Guests are not allowed to enter via entrance 20 without being accompanied by their host.
[41] Meeting room doors can only be locked and unlocked using the access pass of the member who booked it. For example, lock 68 can only be unlocked during the booking period by the user having booked the same. To check out from a meeting room, users must lock the door to the meeting room from the outside.
[42] Private office doors can only be locked and unlocked using the access pass of the member or members who booked it. It can only be unlocked during the booking period, and checkout must be performed by locking the door.
[43] Preferably, the above-mentioned locks are electronic locks that can be unlocked using a contactless access device. It should be noted that electronic locks typically work on a battery. Therefore, power shortage must be identified, and batteries need to be replaced periodically. For example, battery control devices may be provided for each lock and generate an alarm that is sent to back web application 72 to alert an administrator that the battery needs to be replaced. Further, for a seamless experience and security reasons, the above- described access control system must be fully integrated with other systems such as access pass creation, the booking system, security systems, invoicing, etc. In addition, in case a separate building door access control exists for building 10, it must also be integrated into the same.
The plurality of connected locks of the present disclosure allow for a precise access control for each room, giving different rights for different users at different times. Therefore, with no reception and no staff inside the facilities, the strict but flexible access control using access device 16 and, for example, electronic locks 12, 21, 68 is key to managing spaces and making sure that services are provided to the right users at the right time. In addition, to allow for billing for the provided services, for example, with hourly rates, it is necessary to detect when people check in and check out from each facility and the respective rooms provided therein. Using the plurality of connected locks, the exact moment when a user enters an office space, enters and leaves a meeting room or a private office, and the like, can be registered by access system 100. Further, WiFi access logs can be combined with these data, and it can be estimated who is in a space, as well as the total occupancy of each space. This information can again be displayed to other users intending to book a space or reserve a room.
In some embodiments, a mobile application (app) can be used to ensure a high level of services while providing mobility, as well as for controlling the overall experience inside the respective facilities. The mobile application offers different services when logged in and logged out. For example, when logged out, users can use the application to consult a location and an availability of the distributed facilities, for example, the office spaces and their associated open desks, meeting rooms, private offices, and the like. Further, the application can be used for sign up and log in, as well as for getting general information on the services provided by centralized access system 100, such as a user guide, contact information, prices. When logged in, members can use the application to consult/modify their account information, book a desk, a meeting room or a private office, as well as extend/cancel a booking, consult invoices, access additional services such as a taxi service, food delivery, etc., lock/unlock connected doors in case the associated portable device is NFC-enabled, report issues (loss of access device 16, security issues, etc.), and log out. The application is also used to push notifications to users. For example, for a meeting room, a booking start, a booking info, a booking end, a booking update, and the like can be notified. The same applies to private offices. Further, as previously mentioned, arrival of guests can be notified, booking start and booking end for an open desk can be notified, arrival of a delivery can be notified, and the like.
To compensate for the absence of permanent staff at each facility, it may be advisable to set up a helpline in form of an interactive voice server. This communication channel may provide a solution for users without internet access and a direct link with facility managers for issues and urgent matters. The voice server provides access for users to sign up for the service, manage their account, manage their booking, get an access code for members who forgot their access device, report an issue, and the like. Voice response can be configured in different languages to meet users' preferences. Further, with an interactive voice server, no phone calls are lost, and statistics about most frequent questions and issues can be collected.
The website accessed by the user is the first contact point for all types of users. It provides general information about the service, as well as complete control over member accounts. When used outside access system 100, users can use the website to consult the location and availability of office spaces, sign up and log in, and get general information about the offered services. Once they are logged in, members can use the platform to consult/modify their account information, book a desk, meeting room or private office, and the like, consult invoices, access other services, report issues, and the like.
From within access system 100, users are automatically redirected to a login page where they can log in (members: login/password, guests: access code sent by their contact), sign up, consult availability, get general information, and the like. Once they are logged in, members can use the platform to consult/modify their account information, book a desk and the like, consult invoices, access all services offered by system 100, i.e., printers, taxi services, any other type of office equipment, etc., report issues, log out, access a collaborative platform that may be provided to chat and share files with other members and guests, and access the internet. Guests and visitors can use the platform to access the available services at the facility, report issues, log out, access the collaborative platform, access the internet and subscribe to a membership. In some embodiments, when a meeting room or a private desk is booked, a private and secure online space is automatically created, allowing participants to share files and chat easily. The creator of the private and secure online space can give temporary access to the created spaces to other members. In other embodiments, system 100 may be configured to store user profiles in database 18 that may, for example, be used to appropriately configure any computers, printers and other equipment in the respective office spaces in an automatic manner when they are used by a particular user.
Inside the web platform, a special interface must be provided for an administrator of system 100. This interface will provide features allowing for the management of member accounts and corporate accounts, consulting analytics, and collecting cumulated invoices. Preferably, the web platform is web based and accessible on any operating system and hardware. Further, being hosted on a central server, the web platform does not require any complex IT infrastructure and is easy to scale if the number of members or facilities grows. Finally, the web platform provides a solution for controlling access to the available services such as printers and the like.
Waiting room terminal 56 is a lightweight tool that can mainly be used for automatically configuring new access passes for members. It includes contactless features that allow for reading and programming an access device 16. Terminal 56 is provided in waiting room 54 to give information to users and allow users to automatically sign up and configure a unique access pass. A member may create a new access pass. A guest can use terminal 56 to notify a host of its arrival, enter the access code that was received with the invitation, consult general information about the service, or sign up. A visitor can consult general information about the service, complete a subscription and create an access pass and sign up with the service.
Inside each meeting room, for example, meeting room 52, a computer and/or tablet 30 is provided for displaying booking information and configuration of a booking. During a meeting, members may use the tablet to control their booking period and be notified if they exceed their time limit, extend the booking, consult and order services, checkout and control room automation if available (light, air conditioning, etc.). For some features, an ID validation may be necessary (for booking extension, ordering services, etc.). This may be performed using access device 16 containing the unique access pass of a user. To ease the use of meeting rooms, each meeting room may display visual information about its availability. When a member is already inside the office space and immediately needs a meeting room, he or she can simply walk toward a meeting room to unlock it. To make the booking process as seamless as possible, the availability information for the different rooms may also be displayed, for example, at the entrance of waiting room 54 or at any other appropriate location inside the office space by a suitable display device.
As previously mentioned, one or more detection devices 28 may be installed inside the office space to monitor usage of the same. For example, presence detectors may be included in each room, and motion detectors or seating detectors 28 may be provided for each open desk 50. The gathered information will be used to estimate availability of spaces, and to also gather information on how people use the equipment and the respective spaces.
As previously mentioned, there are several possibilities for locks management solution 77. For example, smart locks may be used that are WiFi connected locks targeting mainly the home automation market. Alternatively, a conventional hotel card lock system may be used that provides an access control solution for hotels, storing access rights inside an access card. Further, real time access control systems can be used, which use wireless updates from a central server. Preferably, a real time access control system is used that is resilient to power shortage, network shortage, and can be updated in real time. Further, the system should be easy to install or remove and compatible with standard door locks. The respective locks may be opened by an access pass, a key, or a smartphone, for example, using NFC. Preferably, each lock should be connected to the central data processing device 14, i.e., the server running back web application 72, and allow for a web-based configuration and management. In particular, the system should allow for a precise configuration inside a building, i.e., assigning different rights for different rooms for different access passes at different times. Finally, the system should allow for the management of connected locks in different buildings within one system. As previously mentioned, an exemplary system that may be used is the BRIVO system.
Concerning access pass solutions, several different technologies may be used. One may be a common contactless RFID smartcard that is compatible with most systems. However, such an RFID smartcard requires a specific reader/writer for configuration. In some embodiments, a secure version of an RFID smartcard can be used. In other embodiments, an NFC
communication system may be used, which has the advantage that it may be configured via, for example, smart devices such as a tablet. In some smartphones, NFC communication means are already included. Preferably, an NFC system may be used to ensure future compatibility with smartphones and other connected objects.
For waiting room terminal 56, different solutions can be envisioned. One solution may be a fully integrated system with custom software, while another solution may be use of a standard tablet with a custom app, perhaps together with a secured enclosure/stand. Using a fully integrated system has the advantage of offering a visible and welcoming experience and a user- friendly interface. Further, the hardware will generally be very reliable. In addition, using a secured enclosure/stand, the hardware can be protected from stealing and damages. Further, the hardware is easy to configure for one facility and may be reconfigured when moving to another facility. In addition, it can provide a user interface for displaying the web platform of the associated service provider. Additionally, some tablets already offer the possibility to read and configure access devices, using an NFC reader and writer.
Concerning contact point solutions, e.g., wireless access point solutions, any secure platform that enables captive portal support with a simple web-based user interface, assigning different rights and roles for different users, automatically disconnecting at the end of the scheduled time, and compatibility with all platforms can be used. Two types of solutions, which may be used, are traditional enterprise class networks and cloud based wireless access solutions. Preferably, cloud based wireless access solutions are used, as they generally fulfil the above-listed requirements. This system architecture may be composed of a router WiFi fiber modem connected to the internet, a WiFi access point with a POE injector, and cloud based network management software.
For the tablet provided in each meeting room, standard tablets can be used. For printer solutions, any solution provided by one of the major printing companies may be used. Further, web-to-print solutions could also be used that allow for a seamless way of printing documents from a web interface.
For the above-mentioned presence sensors, a system that is composed of, for example, activity sensors deployed under desks or seats, network receivers use to collect data via wireless or wired transfer via the internet, and a cloud based management software could be used. Industrial Applicability
In the following, an operation of centralized access system 100 in accordance with the exemplary embodiment will be described in more detail.
In the exemplary system, a user generally has a particular user status associated with the user. For example, the user may have member status. After registering as a member, the user will generally get access to one or more of the plurality of the distributed facilities, for example, one or more of buildings 10 including the shared office spaces. In other words, the member can enter any building 10 and the associated workspace therein using access device 16. Once a user has subscribed, data processing device 14 updates database 18 accordingly, and controls locks 21 at each of the facilities to which the user has subscribed to allow access by access device 16 during the times covered by the membership. The same applies to lock 42 provided at main entrance 41 of each building 10. Depending on the details of this subscription, the user may also have access to, for example, meeting room 52, private office 22 via lock 12, or meeting room 66 via lock 68. Further, the user may also book a specific open desk 50 in open office space 60. In addition, the subscription may allow the user to access the WiFi network provided at each facility, as well as any other services covered by the subscription, for example, printers or the like. Of course, billing for services such as printing and the like may be based on the actual usage of said services, which may be tracked due to the unique ID of access device 16 that is used for accessing the same.
As a further user status, a visitor status may be provided that allows users to get access to a space for a limited period of time, for example, one day. Finally, a guest may be a user that is invited by a member. A guest does not need to be registered, but gets access to the building by using an access code that is generated, for example, by a code generation device (e.g., the back-end) upon a request by a member. The generated code may be sent to the guest, and the guest may enter the generated code into lock 42 serving as a code input device provided at main entrance 41 of a facility. After entering the facility, the guest may wait in waiting room 54 to be picked up by the member. The guest may also be allowed to access the wireless network and other services during a limited period of time, for example, from 30 minutes before to 30 minutes after a meeting, using the received code.
[62] A member that has subscribed to one or more office spaces may use its computer to check the availability of a given office space on the website. The user may log in and book a seat in the open office space 60 of the desired facility, for example, for a few hours. When the member arrives in front of building 10, it uses access device 16 to unlock main entrance 41. In some embodiments, the member may also receive a welcome notification on its mobile phone, as well as information on how to find the booked desk. Further, the member will also unlock entrance 20 after passing through waiting room 54 via lock 21, using access device 16. Then, the user may proceed to open office space 60 and sit at any available desk or the specific desk that has been booked.
Further, the user may connect to the wireless network and access all services available at the facility.
[63] In a further example, the member that is at the facility, for
example, inside open office space 60, may wish to organize a meeting in one of the meeting rooms, for example, meeting room 66. To this end, the user may walk to the closest meeting room and see whether the room is available, for example, by checking a sign that is provided in front of each meeting room and displays whether the meeting room is available or not, or during which times it is not available. When a meeting room is available, the user simply uses access device 16 to unlock the meeting room, for example, by unlocking lock 68 provided at meeting room 66. This may result in the meeting room being booked for the member for the next hour in an automatic manner. Once inside the meeting room, the booking can be confirmed/extended, for example, using a tablet (not shown) provided in the meeting room. After the meeting is over, the user leaves meeting room 66 and locks the door using access device 16, thereby ending the booking of the same.
In a further example, a member may set up a meeting with clients or colleagues. To this end, the user may log in on the website and select a meeting room and the period of time for which it should be booked. After confirmation, an access code is generated for the clients or colleagues. The member can send the access code to the clients or colleagues, together with additional information such as the address of the facility, the time of the meeting, and the like. At the time of the meeting, the user accesses the facility in the above-described manner. Further, when the clients or colleagues are entering building 10 using the generated access code, the user may receive a notification, for example, on its mobile phone. Alternatively, the visitors may use terminal 56 provided in waiting room 54 to notify the user. Then, the user picks up the visitors at the waiting room and unlocks the door to the booked meeting room using access device 16. Using the tablet provided inside, for example, meeting room 66, the user can perform various controls such as controlling the
temperature, the light, etc. in the meeting room. In addition, a working group can be created on an associated online platform to share files and notes between participants of the meeting.
From a visitor perspective, a code allowing access to a facility may be received via email or SMS, together with the address and the time of the meeting. Upon arrival at building 10, the visitor may enter the code via lock 42 and access building 10. Then, the visitor may proceed to waiting room 54, if necessary, by following signs provided inside building 10. Inside waiting room 54, the visitor may notify the user that has sent the invitation, for example, using terminal 56, and wait until being picked up by the user. After passing through entrance 20, the visitor may use the generated access code to access the provided online platform via the wireless network. After the meeting has ended, the visitor may exit building 10 via main entrance 41. Further, in case of a visitor, such a user may register for a free limited time pass, for example, a one day pass using the user's email or telephone number. The user receives a confirmation and a generated access code via SMS or email. The code is valid for, for example, one day. Using the code, the visitor enters the building 10 and receives a SMS with a welcome message and advice on how to use the facility. Inside waiting room 54, the visitor may use terminal 56 to complete registration of a profile (name, surname, password, payment details, etc.). The visitor may pick an access device 16, which may be provided in waiting room 54 and synchronize the same with the visitor's account using terminal 56. After synchronization, the visitor may use access device 16 to unlock entrance 20 via lock 21 and enter open office space 60. After accessing the online platform via the wireless network, the visitor may book a seat, a meeting room or a private office for the day.
Although the preferred embodiments of this invention have been described herein, improvements and modifications may be incorporated without departing from the scope of the following claims.
For example, although the exemplary embodiment described herein relates to the use of shared office spaces, it will be readily apparent to the skilled person that the system and method disclosed herein can also be used for hotels, residential buildings, and the like. For example, a user may have a single access device (an access card) that allows access to different hotels, for example, of a hotel chain around the globe. The user may book a room via the website for a specific date, and the system will then automatically program the respective electronic locks provided at the respective hotels to allow the user to access the booked room at the specified date. In this manner, the user does not need to register when arriving at the hotel. Further, checkout can also automatically be performed. In addition, payment may also be handled automatically, for example, as soon as the booking has been confirmed by the user. As described above, additional services may also be included and/or booked by the user, for example, access to a wireless network at the hotel, a breakfast room, a gym, or other recreational areas and the like. Further, a tablet or other computer may be provided in each room, which may read in the unique ID stored on the access card or receive any other form of authorization (password, code, etc.) and may be used to order additional services, for example, taxi services, food services, and the like, and also handle electronic billing for the additional services.
In another embodiment, the disclosed system and method can also be used for airport lounges and the like. For example, as soon as a flight is booked, the system can configure the electronic locks associated with the respective lounges or lobbies such that the user having the corresponding access device may enter each lounge a predetermined time before its flight departs. Further, using the above-mentioned presence sensors, the occupancy of each lounge can be determined, and in case of several lounges at a given location, customers may be directed to specific lounges that are not fully occupied.
Similarly, access to WiFi copy machines, electronic newspapers, or one or more tablets can be provided in each lounge offering the above-described additional services.
It is explicitly stated that all features disclosed in the description and/or the claims are intended to be disclosed separately and independently from each other for the purpose of original disclosure as well as for the purpose of restricting the claimed invention independent of the composition of the features in the embodiments and/or the claims. It is explicitly stated that all value ranges or indications of groups of entities disclose every possible intermediate value or intermediate entity for the purpose of original disclosure as well as for the purpose of restricting the claimed invention, in particular as limits of value ranges.

Claims

Claims
1. A centralized access system (100) for controlling user access to a plurality of distributed facilities (10), comprising:
a plurality of electronic locks (12, 21, 42, 68) respectively associated with the plurality of distributed facilities (10);
at least one equipment (24, 26, 30) provided in the plurality of distributed facilities (10);
a data processing device (14) in communication with the plurality of electronic locks (12, 21, 42, 68) and the at least one equipment (24, 26, 30);
an access device (16) including a unique ID associated with a user; and
a database (18) configured to store information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities (10) and the at least one equipment (24, 26, 30), wherein the data processing device (14) is configured to control the plurality of electronic locks (12, 21, 42, 68) to selectively allow or deny access by the access device (16), and configured to selectively allow or deny access to the at least one equipment (24, 26, 30) by the user based on the information stored in the database (18).
2. The system of claim 1, wherein the at least one equipment (24, 26, 30) includes one or more of: a wireless or wired communication device (26) connected to the internet or an intranet; a printer (24); a network or standalone computer (30); a voice communication device (32) such as a telephone; a copier and other types of office equipment; a gym or another service area provided in the plurality of distributed facilities (10).
3. The system of claim 1 or 2, wherein access to the at least one equipment (24, 26, 30) is based on the access device (16), or on a code which has been generated based on the information stored in the database (18).
4. The system of any one of claims 1 to 3, wherein each electronic lock (12, 21, 42, 68) includes at least a first electronic lock (21, 42) and a second electronic lock (12, 66),
each of the plurality of facilities (10) includes an entrance (20, 41) secured by the first electronic lock (21, 42) and a private room or meeting room
(22, 66) secured by the second electronic lock (12, 68), and
the data processing device (14) is configured to selectively allow or deny access to at least the private room or meeting room (22, 66) by the access device (16) based on the information stored in the database (18).
5. The system of any one of claims 1 to 4, further comprising a user interface (36) in communication with the data processing device (14), the user interface (36) being configured to allow the user to book access to one or more of the plurality of distributed facilities (10) for a specified period of time, wherein the data processing device (14) is configured to store the booked access time in the database (18).
6. The system of claim 5, wherein the data processing device (14) is configured to determine an occupancy of the plurality of distributed facilities (10) based at least in part on information stored in the database (18), and to cause the user interface (36) to display said occupancy to the user.
7. The system of any one of claims 1 to 6, further comprising at least one user detection device (28) configured to detect a user presence at each of the plurality of distributed facilities (10), and a display device (40, 44, 56) configured to display said user presence.
8. The system of any one of claims 1 to 7, further comprising a code generation device that is configured to generate at least one access code upon a request by the user, and a code input device associated with one of the plurality of distributed facilities (10), wherein the data processing device (14) is configured to allow access to the one of the plurality of distributed facilities (10) when the code is input via the code input device (42).
9. The system of claim 8, wherein the data processing device (14) is configured to send a notification to the user when the code has been input via the code input device.
10. The system of any one of claims 1 to 9, wherein the plurality of facilities (10) include a plurality of shared office spaces provided at different locations, each shared office space comprising a plurality of public and/or private workspaces (22, 50, 52, 66).
11. The system of any one of claims 1 to 9, wherein the plurality of facilities (10) include a plurality of residential buildings, hotels, airport lounges, recreational facilities, or the like.
12. A method of controlling user access to a plurality of distributed facilities (10), comprising:
providing an access device (16) with a unique ID associated with a user; storing information indicating a period of time during which the user has access to at least part of one or more of the plurality of distributed facilities (10) in a database (18);
controlling a plurality of electronic locks (12, 21, 42, 68) respectively associated with the plurality of facilities (10) to selectively allow or deny access by the access device (16) based on the information stored in the database (18); and
providing at least one service to the user at the plurality of facilities (10) based on the information stored in the database (18).
13. The method of claim 12, wherein the at least one service includes at least one of: allowing access to the internet or an intranet; providing access to a network or standalone computer; providing access to a voice communication device; allowing use of a copier or any other type of office equipment; providing access to a gym or another service area within the plurality of facilities; providing access to an entertainment system, for example, a video game machine or the like.
14. The method of claim 12 or 13, further comprising:
providing a user interface for booking access to one or more of the plurality of distributed facilities (10) for a specified period of time; and
storing the booked access time in the database (18).
15. The method of any one of claims 12 to 14, further comprising:
detecting a user presence at each of the plurality of distributed facilities (10); and
displaying the determined user presence on a display device (40,
44, 56).
16. The method of any one of claims 12 to 15, further comprising:
generating at least one access code upon a request by the user, the at least one access code allowing access to one of the plurality of distributed facilities (10); and
notifying the user when the at least one access code is used to access the one of the plurality of distributed facilities (10).
17. A computer program comprising computer-executable instructions that, when executed on a computer system, cause the computer system to execute the steps of:
storing information indicating a period of time during which a user has access to at least part of one or more of a plurality of distributed facilities (10) and to at least one equipment (24, 26, 30) provided in the plurality of distributed facilities (10) in a database, the information including a unique ID associated with the user; and
controlling a plurality of electronic locks (12, 21, 42, 68) respectively associated with the plurality of facilities (10) to selectively allow or deny access by an access device (16) including the unique ID associated with the user, and selectively allowing or denying access to the at least one equipment (24, 26, 30) by the user based on the information stored in the database (18).
18. The computer program of claim 17, further comprising instructions to cause execution of the following steps:
providing a user interface for booking access to one or more of the plurality of distributed facilities (10) for a specified period of time; and
storing the booked access time in the database (18).
19. The computer program of claim 17 or 18, further comprising instructions to cause execution of the following steps:
detecting a user presence at each of the plurality of distributed facilities (10); and
displaying the determined user presence on a display device (40,
44, 56).
20. The computer program of any one of claims 17 to 19, further comprising instructions to cause execution of the following steps:
detecting a user presence at each of the plurality of distributed facilities (10); and
displaying the determined user presence on a display device (40,
44, 56).
21. The computer program of any one of claims 17 to 20, further comprising instructions to cause execution of the following steps:
generating at least one access code upon a request by the user, the at least one access code allowing access to one of the plurality of distributed facilities (10); and
notifying the user when the at least one access code is used to access the one of the plurality of distributed facilities (10).
EP16723660.3A 2016-05-18 2016-05-18 Centralized access system and method Ceased EP3271902A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2016/000828 WO2017198282A1 (en) 2016-05-18 2016-05-18 Centralized access system and method

Publications (1)

Publication Number Publication Date
EP3271902A1 true EP3271902A1 (en) 2018-01-24

Family

ID=56024225

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16723660.3A Ceased EP3271902A1 (en) 2016-05-18 2016-05-18 Centralized access system and method

Country Status (3)

Country Link
EP (1) EP3271902A1 (en)
DE (1) DE202017103011U1 (en)
WO (1) WO2017198282A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
HUP1800009A2 (en) * 2018-01-15 2019-07-29 Csaba Kato Self-service hotel-management system
DE102018106145A1 (en) * 2018-03-16 2019-09-19 Steinel Gmbh Building-sensor system
CN109697517A (en) * 2018-11-16 2019-04-30 杭州掌商电子商务有限公司 A kind of shared office management platform
JP2021108052A (en) * 2019-12-27 2021-07-29 富士フイルムビジネスイノベーション株式会社 Information processing system, information processing device, and program
CN111583457A (en) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 Intelligent door lock system based on face recognition
US11386731B2 (en) 2020-08-24 2022-07-12 Delphian Systems, LLC Bridge device for access control in a multi-tenant environment
CN112383582A (en) * 2020-10-09 2021-02-19 爱普(福建)科技有限公司 Management method and system for real-time data of edge layer
DE102021213695A1 (en) * 2021-12-02 2023-06-07 Sphinx Electronics Gmbh & Co Kg Method and system for providing a rentable space for use by different users throughout the day

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140247111A1 (en) * 2010-01-29 2014-09-04 Assa Abloy Hospitality, Inc. Method and system for permitting remote check-in and coordinating access control
EP2889812A1 (en) * 2013-12-24 2015-07-01 Pathway IP SARL Room access control system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100201536A1 (en) * 2009-02-10 2010-08-12 William Benjamin Robertson System and method for accessing a structure using a mobile device
US20140002236A1 (en) * 2010-12-02 2014-01-02 Viscount Security Systems Inc. Door Lock, System and Method for Remotely Controlled Access
US20130024222A1 (en) * 2011-02-28 2013-01-24 Leapin Pty Ltd System and method for controlling access to electronic locks
US9363264B2 (en) * 2013-11-25 2016-06-07 At&T Intellectual Property I, L.P. Networked device access control
US9437063B2 (en) * 2014-01-04 2016-09-06 Latchable, Inc. Methods and systems for multi-unit real estate management

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140247111A1 (en) * 2010-01-29 2014-09-04 Assa Abloy Hospitality, Inc. Method and system for permitting remote check-in and coordinating access control
EP2889812A1 (en) * 2013-12-24 2015-07-01 Pathway IP SARL Room access control system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2017198282A1 *

Also Published As

Publication number Publication date
WO2017198282A1 (en) 2017-11-23
DE202017103011U1 (en) 2017-06-29

Similar Documents

Publication Publication Date Title
WO2017198282A1 (en) Centralized access system and method
US10943420B1 (en) Facility and resource access system
JP6632887B2 (en) Method and system for managing key exchange
CN104182798B (en) Self-service booking method and system based on mobile device
US20150179012A1 (en) Room access control system
CN102262801A (en) Self-service check-in system of hotel
WO2019241890A1 (en) Methods and devices for monitoring facilities
WO2013061289A1 (en) Queue remote management system and method
AU2023210587A1 (en) Methods and systems for access control and awareness management
CN106845742A (en) Hotel integrated management system
JP2004086582A (en) Rental booth and rental booth group management device and group management method
EP1702433A1 (en) System and method for providing services across a network
CN106845654A (en) Hotel management and security administration integral system based on cloud communication
EP2889812A1 (en) Room access control system
KR102449396B1 (en) An uncontacted, touchless and versatility-based autonomous hotel service system using guests' mobile application
AU2015101875A4 (en) Site Attendance Management System
JP7165929B2 (en) Authentication information output system, processing method, and program
JP2017212588A (en) Information notification system
JP6296460B2 (en) Information system, facility use information management server, and program for collecting / providing information by anonymous communication using beacon and user authentication communication
KR20180075895A (en) System and method for networking and reservation managing of accommodations of grand scale event
JP2003058922A (en) Management system in theme park facility
EP3731193A1 (en) Occupancy detection system and method
JP2001297023A (en) Database update device
JP7678523B2 (en) Server system, information processing system, and notification method
AU2021101120A4 (en) A method that ensures any person performing an asset service or visit is physically located at the asset when performing the task and provides real time information to the service provider and the asset owner. The method also includes ensuring a person visiting a location is present at that location at that time and this information is shared with interested parties.

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20170713

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20181002

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
APBK Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNE

APBN Date of receipt of notice of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA2E

APBR Date of receipt of statement of grounds of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA3E

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

APBT Appeal procedure closed

Free format text: ORIGINAL CODE: EPIDOSNNOA9E

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20230426