EP3358535A1 - Verfahren zur lokalisierung eines elektronischen schlosses - Google Patents
Verfahren zur lokalisierung eines elektronischen schlosses Download PDFInfo
- Publication number
- EP3358535A1 EP3358535A1 EP17154715.1A EP17154715A EP3358535A1 EP 3358535 A1 EP3358535 A1 EP 3358535A1 EP 17154715 A EP17154715 A EP 17154715A EP 3358535 A1 EP3358535 A1 EP 3358535A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- access
- data carrier
- based resource
- access rights
- rights
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Definitions
- the present invention is related to the field of access control systems for controlling access to one or more specific areas in a building.
- EAC systems electronic access control systems are often used to control access to certain areas or physical spaces within the building.
- These electronic access control systems (which will be also referred to in the following as EAC systems) usually comprise a door lock that gives access to that specific physical space of the building; a user who wants to access this space is in possession of some sort of mobile data carrier with an identification code stored therein.
- the identification code is read by the reader, and if the read identification code is valid, then access to the space secured by the door lock is given to the holder of the mobile data carrier.
- the identification code stored in the mobile data carrier which upon being determined as valid gives access to the physical space is provided by a control access server.
- this access control server is the element of the EAC system in charge of establishing these identification codes when setting up the EAC system; the access control server then provides these identification codes to the mobile data carrier.
- Different identification codes are usually given to every user of the EAC system who requests access that specific space.
- Each identification code may be valid to gain access to a single space within the building, or it may provide access to several spaces or areas within the building (their office or the cafeteria in a business building), but not to others (the servers area in the IT department or the safe deposit room in the account department).
- the identification code may be valid any time, or its validity may be temporarily restricted (so that an employee has access on weekdays and at certain time slots, but not during the weekend).
- the invention provides a method for facilitating location of an access-based resource.
- a first aspect of the invention relates to a method for facilitating location of an access-based resource to at least one data carrier, the data carrier being able to communicate with the access-based resource, and the access-based resource being configured to grant access to a physical space upon validation of access rights, the method comprising:
- a user of the data carrier is provided with access rights to access an access-based resource, and also with at least an image of the access-based resource so as to be able to locate it.
- the digital data can be sent to the at least one data carrier together with the access rights using a same communication channel, usually in a wireless fashion.
- the digital data need not be encrypted, just the access rights are preferably encrypted, so there is no need for a separate channel.
- the digital data is any one of: an image file of the access-based resource (such as a JPG, JPEG, BMP or any other image file), any file containing the at least one image of the access-based resource (such as a Word or a PDF file, or a video file), or a combination thereof.
- an image file of the access-based resource such as a JPG, JPEG, BMP or any other image file
- any file containing the at least one image of the access-based resource such as a Word or a PDF file, or a video file
- the digital data containing at least one image including the access-based resource can be any geographical or geolocation data of the access-based resource, including picture representations containing the access-based resource, usually of the door or locker where the access-based resource is installed. This representation facilitates the user of the at least data carrier (who is provided with the digital data) to find the access-based resource.
- the access-based resource is an electronic or intelligent lock mounted in a door (or similar) which gives access to the physical space in the building.
- the electronic lock usually comprises a reader which is able to read access rights provided to the at least one first data carrier; it is also possible that the reader is implemented as an element physically separate of the electronic lock.
- the access-based resource is configured to grant access to the physical space upon reading and validating access rights presented to it by the at least one data carrier.
- the at least one data carrier can be any mobile device or portable electronic device that has processing and communication capabilities, so as to process signals and exchange information with other elements, such as the access-based resource and a server.
- the access rights defined for the at least one data carrier include preferably encrypted data, more preferably in binary form.
- the at least one data carrier may just serve as carrier and storing means for the access rights; the at least one data carrier does not need to be able to process or understand these access rights; the access-based resource is able to read and process these preferably encrypted access rights.
- These access rights can be provided so as to access one or more access-based resources. Also these access rights can be time-limited or not.
- the access rights defined for the at least one data carrier are directly to the at least one data carrier, preferably via means of an encrypted data package.
- Communication between the at least one data carrier and the access-based resource is preferably done via a short-range communication channel (infrared, NFC, Bluetooth® or BLE, WiFi, etc).
- Communication between the at least one data carrier and any server is preferably done using any telecommunications network (3G, LTE, etc) or by means of a WiFi network.
- the method comprises further sending to the at least one data carrier a one-time access to a server storing the digital data containing at least one image including the access-based resource, preferably in the form of a link to the access control server. If the digital data containing at least one image including the access-based resource is too heavy, the user of the at least one data carrier may decide when to access the server where the digital data is stored (for example, when the at least one data carrier is connected to a WiFi).
- the step of providing digital data containing at least one image including the access-based resource can comprise the following steps:
- the step of providing the at least one data carrier with access rights readable by the access-based resource comprises:
- the request of delegation of access rights comprises data related to the at least one data carrier (IMSI, MSISDN, or any other set of data that uniquely identifies a mobile device) or data related to a user of the at least one data carrier (such as an email address or a username or a social network identity of the user, reachable from the at least one data carrier).
- IMSI at least one data carrier
- MSISDN MSISDN
- data related to a user of the at least one data carrier such as an email address or a username or a social network identity of the user, reachable from the at least one data carrier.
- the above solution makes it possible to delegate access rights to a first user (the owner or user of the at least one data carrier) by a second user (the owner or user of the another data carrier), so that the second user can access a specific space secured by the access-based resource, with a very simple and flexible process.
- the digital data containing at least one image including the access-based resource is preferably uploaded in the server by the user of the another data carrier (the second user).
- the user of the another data carrier may request that the digital data is provided, or is directly sent, or is made available to the at least one data carrier.
- the method further comprises displaying on the at least one data carrier the at least one image of the access-based resource. This way the user of the at least one data carrier need not do anything else with their data carrier: the image of the access-based resource is automatically shown to him/her.
- access to the physical space secured by the access-based resource is granted upon validation of the access rights stored in the at least one data carrier.
- Validation of the access rights is preferably done at the access-based resource; this validation is preferably carried out offline, without establishing any communication with any server at the time of validation, thereby saving resources from the access-based resource.
- Validation of the access rights could also be done at a usually remote server.
- the method prior to granting access to the physical space by the access-based resource, the method further comprises validating code provided by the at least one data carrier.
- This code may need to be provided by the at least one data carrier, usually upon request to carry out some action with the data carrier, may be gesture-based code (such as a shaking gesture with the first or the second data carrier), or it may be a PIN code or similar, previously introduced in the at least one data carrier.
- This additional step of validating code at the user side, not just at the access-based resource or the server side enhances the security in case the at least one data carrier is lost by their authentic user.
- this server is preferably the access control server that will be defined in the following.
- Another aspect of the invention refers to an access control server for facilitating location of an access-based resource, the access-based resource being configured to grant access to a physical space within a building upon validation of access rights, the access control server comprising:
- the access control server is usually a remote access control server managing several access-based resources located within the same building or in different buildings.
- the access control server is preferably cloud-based, and communication between the access control server with the other elements is carried out via a wireless communication network.
- the access control server is not remotely located from the access-based resources it controls, and the communication network may be wired.
- the access control server is part of an access control system also comprising the access-based resource, and in some embodiments it comprises several access-based resources managed by the same access control server or by several access control servers.
- the access-based resource has communication capabilities to communicate with the access control server and with the at least one data carrier. _The capability of the access-based resource to communicate with the data carrier(s) is ensured at the production process by adding a secret for decrypting the communication with the data carrier, including the encrypted access rights.
- the access control server further comprises means for receiving a request of delegation of access rights from another data carrier; the request of delegation of access rights from the another data carrier comprising data related to the at least one data carrier or related to a user of the at least one data carrier.
- the access control server upon receiving a request of delegation of access rights from the another data carrier, is preferably configured to define access rights for the at least one data carrier, so that access to the physical space can be granted to the at least one data carrier upon the access-based resource validating the access rights of the at least one data carrier, the request of delegation of access rights from the another data carrier comprising data related to the at least one data carrier or related to a user of the at least one data carrier.
- the another data carrier is preferably previously registered before the access control server, and has been granted access rights for the access-based resource and user rights, which enable the user of the another data carrier to access the access control server; these user rights also enable the user of the another data carrier to delegate access rights to other users.
- the present invention also relates to an access control system for facilitating location of an access-based resource for accessing a physical space within a building is provided, the access control system comprising:
- This invention provides a flexible and simple solution to the problem previously posed in the background section for facilitating location of an access-based resource to third party users.
- the example described in the following corresponds to a parcel delivery service, where a customer of the service and owner of a house has granted temporary access to this house to a parcel courier, and the parcel courier may have difficulties in reaching the house.
- the access control system provided by the present disclosure is also applicable to and useful in other services such as nursing services or building management (for managing access to doors, locker facilities and IT communications cabinets), where it might also be necessary to rapidly locate the house (or locker or room in a building) where the service is to be delivered.
- data processing units are assumed to include standardized cryptography modules and algorithms.
- Figure 1 shows the main elements of the access control system 100 of the invention, and how they are interrelated.
- This electronic lock 10 is burglar-proof, for example, an XS-Pro cylinder with a Legic® reader, complemented with Bluetooth or BLE functionality.
- Mr. Smith also has a mobile smartphone 20, where he can download an application (an Android or iOS App) associated with the access control system 100 and therefore become a user of the system by registering (with his mobile phone number and/or email address) and getting one or more administrator usernames and passwords.
- an application an Android or iOS App
- the house holder acquires user rights for accessing an access control server 30 and for setting access rights to the electronic lock 10. It is also possible to become a user of the system via the corresponding webpage.
- the access control server 30 provides a web-based software that is in charge of generating the individual, time-related and lock-specific access rights, and of maintaining these access rights afterwards. These access rights generated by the access control server 30 were provided to Mr. Smith's mobile smartphone 20 once Mr. Smith registered himself in the system.
- the downloaded application also enables Mr. Smith to open the electronic lock 10 installed at the front door 11 of his house using his smartphone 20, via a Bluetooth communication interface that is established between the electronic lock 10 and the smartphone 20.
- the application should be executed and kept on running as a background process. It is then necessary to activate the application and to unlock the screen of the smartphone and activate the door unlocking in the application to open the door. Mr. Smith needs to hold his smartphone in front of the reader in the cylinder and the electronic lock will open upon validation Mr. Smith's access rights at the access control server 30.
- Mr. Smith has temporarily given access rights to the parcel courier, so that the parcel courier can deliver a parcel at his house, where there is no one in at the estimated time the courier will deliver the parcel.
- Mr. Smith can access the access control server 30, where a list associated to him as a user is stored; this list includes inter alia, the electronic locks he wishes to have controlled and managed by the system, the users he wants to give access to and to which electronic lock(s) each user has access to, and whether the access authorization is time restricted or not.
- Mr. Smith accesses the access control server 30 with the application in his mobile smartphone or via the corresponding webpage, and indicates that he wishes to delegate access rights to the electronic lock 10 to the parcel courier for a time slot around the estimated delivery time. To do so, Mr. Smith includes the parcel courier's mobile phone number and/or email address in his list, associating the parcel courier's data with the electronic lock 10 and during the required time period.
- the access control server defines encrypted access rights for the parcel courier's mobile phone which are readable by the electronic lock 10, and which will permit the parcel courier to open the electronic door 10 during the time period defined by Mr. Smith, by using his mobile phone 40.
- These encrypted access rights are sent to the parcel courier's mobile phone 40, via an encrypted data package.
- the parcel courier has already downloaded the application, as a frequent user of the system; and upon receiving the access rights delegated by Mr. Smith, he may open the electronic lock 10 with his mobile phone 40 and leave the parcel inside Mr. Smith's house.
- the parcel courier gets in his mobile phone 40 digital data to locate Mr. Smith's house, so as to make it easier for the parcel courier to reach Mr. Smith's house.
- These digital data include an image of the electronic lock 10, such as a picture 50 of the complete front door.
- Mr. Smith has previously uploaded the digital data in the access control server 30 making use of his user rights; if the picture 50 of the front door is too heavy, instead of the picture itself, the parcel courier may receive a link to the URL direction where the picture is stored in the access control server 30.
- These data can also include additional contact details of Mr. Smith, such as Mr. Smith's mobile phone number, so that the parcel courier may contact him if necessary. Or these data may include detailed geolocalisation data or navigation directions to Mr. Smith's front door, so that the parcel courier may reach Mr. Smith's house.
- the owner of the building where the rented flat is has previously uploaded detailed information on how to reach the flat, such as pictures of the front door of the building and of the specific flat the user has paid for (in many storey buildings the front doors of all the flats sometimes have no number, but they may be identifiable by some specific feature related to the front door, such as the door mat), the visitor may be able to reach their rented flat without bothering the owner of the flat.
- These digital data containing at least an image including the access-based resource need not be encrypted, and can be sent to the parcel courier's mobile phone 40 together with the access rights using the same channel; there is no need to establish a separate channel.
- a one-time access to the access control server is sent to the mobile device so as to download the application and be able to open the electronic lock. This way, the owner of the mobile device may also register himself into the access control system; then the encrypted access rights for the electronic lock 10 are sent to the mobile device.
- the access rights provided to the parcel courier are time restricted to the time interval chosen by Mr. Smith.
- the access control server configures these access rights as valid for the specific time interval and then they expire by themselves offline. There is no need to synchronize with the access control server in order to terminate the validity of the access rights. So in case of losing the smartphone, a possible intruder that takes the smartphone will not be able to open the electronic door: since validation is carried out offline and the smartphone is used as an AoC ('access on card') to open the electronic lock 10, the 'AoC' access rights which are time restricted will not open the electronic lock after the time interval chosen by Mr. Smith, which can be made to a single day or even some hours.
- Mr. Smith may decide that the electronic lock 10 of his front door 11 is only openable if, in addition to presenting access rights validated by the access control server 30, a valid PIN code is entered by the user of the smartphone mobile phone. Or he may also establish that a specific action or gesture has be done with the smartphone. In such case, Mr. Smith with his user rights can do so by executing the application in his smartphone, accessing the access control server, and entering the should specific PIN code or gesture-based action that is needed to additionally input to open the electronic lock of his front door.
- This two-step validation provides a security feature in case Mr. Smith loses his smartphone 20, since if the PIN or gesture-based action request is activated, the user must know the required PIN or gesture-based action, enter the PIN or do the gesture, and hold the device again in front of the electronic lock to open it.
- the method for facilitating location of an access-based resource of the present invention includes sequences of messages and commands for reading the access rights, validating the access rights at the access control server, and granting access to the access-based resource; and for establishing the necessary communication channels for uploading and downloading the digital data containing at least an image showing at least the access-based resource.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17154715.1A EP3358535A1 (de) | 2017-02-03 | 2017-02-03 | Verfahren zur lokalisierung eines elektronischen schlosses |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17154715.1A EP3358535A1 (de) | 2017-02-03 | 2017-02-03 | Verfahren zur lokalisierung eines elektronischen schlosses |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3358535A1 true EP3358535A1 (de) | 2018-08-08 |
Family
ID=58158773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17154715.1A Withdrawn EP3358535A1 (de) | 2017-02-03 | 2017-02-03 | Verfahren zur lokalisierung eines elektronischen schlosses |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP3358535A1 (de) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2085934A1 (de) * | 2008-01-31 | 2009-08-05 | Forbruger-Kontakt Distribution a/s | Kontrolle des Zugangs zu einem Standort |
US20140236468A1 (en) * | 2013-02-21 | 2014-08-21 | Apple Inc. | Customizing destination images while reaching towards a desired task |
US20140239647A1 (en) * | 2013-02-28 | 2014-08-28 | Tyto Life LLC | Door lock assembly for a dwelling |
US20160180618A1 (en) * | 2014-12-23 | 2016-06-23 | Gate Labs Inc. | Increased security electronic lock |
-
2017
- 2017-02-03 EP EP17154715.1A patent/EP3358535A1/de not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2085934A1 (de) * | 2008-01-31 | 2009-08-05 | Forbruger-Kontakt Distribution a/s | Kontrolle des Zugangs zu einem Standort |
US20140236468A1 (en) * | 2013-02-21 | 2014-08-21 | Apple Inc. | Customizing destination images while reaching towards a desired task |
US20140239647A1 (en) * | 2013-02-28 | 2014-08-28 | Tyto Life LLC | Door lock assembly for a dwelling |
US20160180618A1 (en) * | 2014-12-23 | 2016-06-23 | Gate Labs Inc. | Increased security electronic lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3358534A1 (de) | Delegieren von zugangsrechten | |
CN109559407B (zh) | 有时间限制的安全访问权 | |
EP2888855B1 (de) | Systeme und verfahren für zugangsverwaltung mittels drahtloser signale | |
EP3259741B1 (de) | Verfahren und system zur verwaltung von berechtigungsnachweisen | |
EP3736714B1 (de) | Systeme und verfahren für remote-zugriffsrechte und verifizierung | |
EP2383955B1 (de) | Zuweisung und verteilung von zugangsberechtigungen an mobile kommunikationsgeräte | |
EP3610603B1 (de) | Sichere passwortteilung für drahtlose netzwerke | |
EP3502936B1 (de) | Authentifizierungssystem und informationsaufzeichnungsmedium | |
US20170236350A1 (en) | Electronic door lock system | |
US20130047233A1 (en) | Data management with a networked mobile device | |
CN110178160B (zh) | 具有可信第三方的访问控制系统 | |
EP2428937A1 (de) | Gate-steuerungssystem und verfahren für fernentriegelung durch validierte benutzer | |
EP3258447A1 (de) | Verteiltes berechtigungssperrsystem | |
EP3454243B1 (de) | Tokenausführungssystem für zugangskontrolle | |
EP2848569A1 (de) | Elektrische Verriegelungsanordnung | |
CN104584521A (zh) | 移动通信设备 | |
KR20190008352A (ko) | 동적 키 액세스 제어 시스템들, 방법들 및 장치 | |
CN104952128A (zh) | 一种基于智能手持终端的电子解锁系统及其解锁方法 | |
CN110766850B (zh) | 访客信息管理方法、门禁系统、服务器及存储介质 | |
CN104253853A (zh) | 嵌入式设备加载应用程序组件以在朋友与家人间的移动设备间共享数字信息的系统和方法 | |
CN107886602A (zh) | 一种开锁方法及系统 | |
CN104253852A (zh) | 使用嵌入式设备在朋友与家人之间的移动设备之间共享数字信息的系统和方法 | |
EP3550488A1 (de) | System und verfahren zum berechtigungsnachweis für den zugang zu eingeschränkten räumen | |
US20180367307A1 (en) | Secure access to resources | |
EP3301960A1 (de) | Zugangsdelegationssystem für einen eigentümerbenutzer zum delegieren einer berechtigung für den zugriff auf eine ressource an einen delegierten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20190209 |