EP3770867A1 - Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d'au moins deux niveaux différents - Google Patents

Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d'au moins deux niveaux différents Download PDF

Info

Publication number
EP3770867A1
EP3770867A1 EP19187903.0A EP19187903A EP3770867A1 EP 3770867 A1 EP3770867 A1 EP 3770867A1 EP 19187903 A EP19187903 A EP 19187903A EP 3770867 A1 EP3770867 A1 EP 3770867A1
Authority
EP
European Patent Office
Prior art keywords
administrator
door
successor
user
locking system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19187903.0A
Other languages
German (de)
English (en)
Inventor
Claudia Dr.-Ing. Nagel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KiwiKi GmbH
Original Assignee
KiwiKi GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KiwiKi GmbH filed Critical KiwiKi GmbH
Priority to EP19187903.0A priority Critical patent/EP3770867A1/fr
Publication of EP3770867A1 publication Critical patent/EP3770867A1/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights

Definitions

  • the invention relates to a computer-aided door locking system for at least one property with users from at least two different levels.
  • An object within the meaning of the invention is understood to mean in particular buildings, but also rooms, apartments, containers and any objects that have at least one door within the meaning of the invention.
  • a door within the meaning of the invention can be opened or locked using a digital key as required.
  • the door can be opened in particular in that a door opener is provided which, with valid authorization, enables the door to be opened using a digital key.
  • the door can be opened and closed by an active door opener with a suitable door actuating device, for example with a motor drive that can move the door between an open position and a closed position.
  • a suitable door actuating device for example with a motor drive that can move the door between an open position and a closed position.
  • Such a drive can also provide a sufficiently large closing force, so that in this case - provided there is sufficient security against forcible opening - a door lock can be dispensed with.
  • a door in the sense of the invention is to be understood as any movable closure element that can be moved into a position that enables access to an object, in particular to an enclosed space or area.
  • the term door is to be understood broadly. It includes any type of closure element by means of which an opening is released as required by moving the closure element.
  • access control systems such as turnstiles, revolving doors, etc., which, if the term door is interpreted further, are also to be regarded as doors in the sense of the invention. In this respect, it is not absolutely necessary for a door in the sense of the invention to completely close the opening of an object in the closed state.
  • Users of the door locking system in the context of the invention are understood to mean both an administrator or several administrators and users.
  • At least two levels mean, in particular, a superordinate administrator level and one or more user levels to which individual users or user groups can be assigned.
  • Users at the same level usually have the same authorizations, whereas users at different levels, in particular users at different levels, have different rights.
  • the invention can be used particularly advantageously and easily in connection with such door locking systems in which there is exactly one administrator of an administrator level (first absolute level) and one or more users of at least one user level (second absolute level).
  • the administrator is particularly authorized to authorize one or more other users of a user level by assigning access authorizations.
  • Several user levels can also be provided, e.g. a first user level (second absolute level), a second user level (third absolute level), etc.
  • the administrator and / or one or more users of certain user levels can be authorized to authorize further users of at least the same or lower user level. With the authorization every user of a certain user level receives the rights assigned to the corresponding user level.
  • the rights mentioned refer in particular to access authorizations to doors within the meaning of the invention.
  • an administrator can have unrestricted access authorization to all relevant doors of an object of which he is the owner.
  • the users of certain user levels can - if desired - only have restricted access rights. These restricted access authorizations can either be set individually for each user or for each user level.
  • the access authorization for a specific user or a specific user level can be limited, for example, to a specific period (in particular to one or more months, weeks, hours) and / or to specific times of the day.
  • the access authorization can also be restricted to one door or several selected doors of an object.
  • users in the form of cleaning staff can only be granted access authorization on Mondays between 9 a.m. and 10 a.m. so that they can access areas of an object to be cleaned.
  • users in the form of craftsmen can be given access to certain areas of a building in a certain period of time in order to carry out maintenance or repair work.
  • a large number of computer-aided locking systems for objects within the meaning of the invention are known from practice, in particular electronic locking systems.
  • the computerized locking systems make it possible to open a door lock and / or a door of the property using a digital key.
  • a digital key is different differs from conventional keys in that no manual insertion of a physical key into a door lock combined with a mechanical opening process with the aid of the key is required. Rather, the door lock can be unlocked or a door can be opened if an administrator or user has a digital key, this digital key is transmitted in a suitable form to a computer system with a computer program product that is functionally connected to the door locking system, and then the Door lock is effected by activating a door opener and / or opening the door.
  • the transmission of the digital key can take place in particular with the aid of a cell phone, another mobile communication device or some other suitable means (eg a transponder). It is not necessary for the administrator or user who wants to open a door to be on site at the door. He can also initiate this via a remote data connection.
  • the term digital key is to be interpreted broadly. It also includes digital requests and commands in the form of code, which is transmitted directly to a door opener and causes the door opener to be activated. Such a code can be sent, for example, by an administrator or a user logging on to an account and / or establishing data access to at least one server and at least one database in some other way and using a computer program product (software) to send the Initiated codes.
  • Such a registration can take place, for example, by an - also automated - input of a combination of user name and password by means of a device (also internet-based) in a database.
  • the database can then be used to check whether the user has the appropriate access authorization.
  • the presentation of a human finger on a fingerprint sensor and / or computer-aided person recognition on a door and / or a transponder can also be provided.
  • transponders those transponders are particularly preferred that are used to activate a Door opener can remain in a pocket or other container because an access authorization comparison is carried out automatically. The door opener is activated automatically with such transponders when approaching a door for which the administrator or user has access authorization.
  • a method for operating a locking system and a locking system are known.
  • a digital key referred to as an electronic key
  • an electronic lock are provided, as well as a central unit used in the locking mode that is locally separated from the electronic key and the electronic lock.
  • an external authorization code is generated by the central unit by means of an authorization code determination program, the external authorization code is transmitted to the electronic key and the external authorization code from the electronic key is stored in a memory, with the external one from the electronic lock when the electronic key interacts with the electronic lock
  • Authorization code is read from the memory and checked by a processor of the electronic lock in that the processor itself determines its own authorization code with its own authorization code determination program and compares it with the external authorization code received from the electronic key. If the determined own authorization code is identical, the processor enables an opening process with the transmitted external authorization code. It is also disclosed that a mobile phone is used as a communication device for sending and / or receiving the authorization code.
  • the prior art mentioned above essentially relates to electronic locking systems which use key cards or other separate access elements which are usually provided exclusively or predominantly as an element for storing and providing a digital key as required.
  • Such access elements can - analogous to conventional keys - be physically transferred from one person to another.
  • the invention is based on the object of providing a computer-aided door locking system that can also or exclusively be operated with multifunctional elements such as smartphones, tablet PCs, smartwatches, etc., with the door locking system determining access authorizations
  • Authorized users from at least two different levels and at the same time a secure transfer of access authorizations in the event of a change of ownership or use.
  • a first user level can be provided for a property owner or tenant and the owner or tenant in turn can grant access rights to persons at a second, lower level, for example a friend who should have temporary access to the property during a period of absence (e.g. during vacation).
  • Door locks in the sense of the invention are in particular motor locks with at least one mechanical bolt that can be moved between an open and a closed position for opening and closing, magnetic locks that can be kept open and / or locked by being energized, or other door locking devices that have suitable Have means for alternately opening and closing a door.
  • a door lock is not absolutely necessary.
  • the door can also be provided with a suitable drive (e.g. an electric motor drive) in order to open and close the door.
  • a suitable drive e.g. an electric motor drive
  • the drive can be designed in such a way that it has a sufficiently high resistance when the door is closed and thereby generates a closing force that prevents the door from being opened undesirably. In this case there is no need for a separate door lock.
  • Door openers within the meaning of the invention are, in particular, all devices that enable or actively cause the door to be opened.
  • door openers in particular devices with an unlocking mechanism for the door lock, which make it possible to open the door manually and / or with motorized assistance when or after the door opener is activated.
  • a door opener is also to be regarded as a drive that opens the door when activated. A previous unlocking process is then not necessary.
  • the transmission of the digital key can, in particular if this is done with a mobile device, for example a mobile phone, be connected to an additional security check in order to increase the security before a stolen digital key is used.
  • identification codes of mobile devices can also be stored in the computer system, which should be authorized in connection with a digital key.
  • the device When the digital key is transmitted, the device must also transmit the identification code and match it with the aid of the computer program product.
  • the door opener is activated or the door is only opened if the digital key and identification code are stored as an authorized combination.
  • activation can take place in different variants, namely according to variant i., Which relates to activation by the administrator and according to variant ii., Which relates to activation by the successor administrator.
  • the administrator of an object determines a successor administrator of the object, whereby the successor administrator, prompted by the code of the computer program product, receives a corresponding request that he can accept if he wants to become the successor administrator of the object, in which case the Request by the successor administrator in a first procedural step initially automatically deactivates all user access authorizations of the user levels assigned to the administrator and in a second procedural step the authorization of the administrator is transferred to the successor administrator.
  • the object is an apartment in a building
  • the administrator is the owner of an apartment
  • the successor administrator is the buyer of this apartment, to whom the electronic key sovereignty is to be completely and securely handed over by the owner according to the inventive method.
  • e-mail used in this example
  • other suitable query options can also be used, e.g. messages sent to a mobile phone with a specific telephone number or messages to a user ID of a user portal, in particular an internet-based user portal, etc.
  • Example is not to be understood as limiting in terms of specific technical details.
  • the owner of an apartment (property) that has a computer-aided door locking system within the meaning of the invention has sold it, he is usually obliged to hand over the key sovereignty to the buyer (new owner).
  • he is the administrator of the object and would like to initiate the transfer he determines according to variant i. the buyer as successor administrator of the object and in this case, for example, enters the e-mail address of the buyer in connection with his administrator role assigned to the object into the computer system.
  • the code of the computer program product then causes an e-mail with a request to take over the administrator role (and thus the key sovereignty) to be sent to the buyer (new owner).
  • all user access authorizations for the administrator are initially automated in a first process step assigned user levels deactivated.
  • all user access authorizations ever assigned by the administrator are automatically and irrevocably deleted. This ensures that no more authorizations remain after the second process step. Only when the deletion is complete is the authorization of the administrator (administrator role) transferred to the successor administrator in a second process step. The function of administrator is withdrawn from the previous owner and the buyer is assigned the administrator role at the same time.
  • Variant ii The main difference is that the initial action for the transfer of the administrator role is carried out by the successor administrator.
  • the buyer new owner
  • the transfer module according to variant ii. in the first method step and in the second method step the same as in the previously described variant i. In this respect, reference is made to the explanation above.
  • the person of the current administrator and an object assigned to this administrator role can also be linked with further parameters, for example with a user ID of a database-based system.
  • a user ID of a database-based system This applies in particular to cases in which a door locking system according to the invention is also included is linked to a database and each administrator role can only be assigned once for a specific object. A person can then also be clearly assigned to each object using the user ID.
  • the simple specification of a user ID and an object by a successor administrator is sufficient for a change of ownership or a change of use according to variant ii. to cause.
  • An advantage in terms of data protection law is that the contact details of the current administrator do not have to be communicated to the successor administrator and can therefore be kept hidden by the database.
  • both the administrator and the successor administrator can activate a change in the administrator role in relation to a change in ownership or use and then - with the consent of the other, i.e. the person who did not make the request - transfer the administrator role .
  • the variant iii. has the advantage that a helper who is not a party to the actual transfer of the administrator role can initiate and thus initiate the transfer process. This can be beneficial, especially when it comes to the transfer of administrator roles from tenants, to ensure a timely transfer.
  • the door locking system has the advantage that, with the transfer module, it enables a secure transfer of the administrator role in the event of a change in ownership or use. In particular, it is ensured in this way that access authorizations are not unintentionally left with users who should no longer have access authorization after a change of ownership or a change of use. Furthermore, the door locking system enables initiation and complete, secure implementation without any involvement in the change of ownership or the change of use involved operator of the door locking system.
  • Special transfer functions can be provided, according to which the code of the computer program product includes a special transfer module that enables the at least one administrator and a successor administrator to implement a change in ownership or use of the object itself in such a way that all existing access authorizations are retained. In this case, however, this special transfer is clearly visible to the successor administrator and requires confirmation. Security can be increased by the fact that the activation of the special transfer module is only possible by a successor administrator. In another embodiment, however, it can also be enabled by an assistant or the current administrator.
  • the computer program product is functionally linked to a database in which at least one digital contact information of the administrator is stored, the code of the computer program product for the creation of a request for feature i., Ii. and / or iii. is designed to query at least one contact information of the successor administrator, provided that such is not yet stored in the database.
  • the door locking system has the advantage that it automatically prompts the user, in particular new users, to enter contact information and stores this in the database if such contact information is not yet available.
  • the coupling to a database can have further functional advantages.
  • contact information can be queried worldwide and new users can be created by corresponding queries with all contact data relevant to the database, without the operator of the door locking system being involved.
  • the buyer of an object who receives a corresponding request from the current administrator, can transmit all contact information, for example via the Internet, and thus complete the database of the operator of the door locking system with his entry with the appropriate contact information.
  • the database of a door locking system according to the invention is designed to store a transfer date for the transmission.
  • the transfer can also be made dependent on acceptance before a corresponding transfer date.
  • the person who did not accept the request in due time can be notified that the acceptance was late and is therefore no longer possible or can only be effected under certain additional conditions, for example consent to the payment of a late fee.
  • the transfer module is also designed to carry out a transfer on the transfer date at least optionally automatically. In this case, if the option of automatic transmission was activated at the time of the handover date, the transfer module can delay the transfer until the transfer date is reached. This enables transmissions to be unusual Times and also to be carried out when a (possibly sole) responsible person is prevented from personally realizing or activating a corresponding transmission.
  • the database is designed to store a transmission acceptance parameter, it can be specified, for example, that the recipient of an inquiry according to variants i., Ii. and / or iii. only receives a certain time window to positively confirm the request and the request is considered confirmed if it does not respond.
  • This makes it possible to increase the practical benefit insofar as - if this procedure is legally compliant - to increase the acceptance of the door locking system, because a non-response to inquiries can result in legal disadvantages. In this case, the door locking system and the messages sent by a transfer module are more likely to be taken seriously by the user in any case.
  • a door locking system can thus enable automated transmissions and make them dependent on the fulfillment of complex framework conditions. For example, a transfer of key sovereignty from tenant A to tenant B can be made dependent on tenant A having initially agreed to the submission within a certain period, that tenant A has renovated, uploaded photos of the renovated property to the database, the owner has reviewed the photos and accepted the renovation and tenant B has also accepted the renovation and consented to the transfer.
  • a transfer of key sovereignty from tenant A to tenant B can be made dependent on tenant A having initially agreed to the submission within a certain period, that tenant A has renovated, uploaded photos of the renovated property to the database, the owner has reviewed the photos and accepted the renovation and tenant B has also accepted the renovation and consented to the transfer.
  • Such a configuration makes it possible to rent real estate including tenant changes for almost any Manage periods of time across a large number of tenant changes without ever being on site during this period.
  • the database has a user-related possibility of uploading and / or downloading electronic files, conducting audio or video conferences and / or accepting electronic signatures.
  • transmissions can also be enriched with formal things such as documents, qualitative approvals of objects and other interactive interactions.
  • the executable code or a digital access authorization for activating the door opener is transmitted at least partially via a remote data connection from the computer system with the computer program product to the door to be opened.
  • the door opener can thus be activated either directly via the remote data connection, for example by setting up a command from a mobile device via the remote data connection to a database and sending an executable code to activate the door opener directly from the database via another remote data connection .
  • a certain number of digital access authorizations can be stored directly on a door, so that sending a digital access authorization from a mobile device to the door is sufficient to activate the door opener immediately.
  • the variant described last is particularly suitable for areas in which no remote data connection is possible, a remote data connection fails more frequently or redundancy is desired for other reasons.
  • a remote data connection means, in particular, Internet connections, intranet connections, dedicated lines, VPN connections, etc.
  • a central computer system can be used for a large number of door locking systems.
  • a central computer system possibly with a corresponding one Database, can in this case be operated by one operator in connection with a large number of door locking systems from different customers.
  • the activation of the door opener can also be done independently by using standards contained in almost every phone, tablet PC and other mobile devices from the Internet. In this regard, reference is made in particular to WLAN, Bluetooth and other wireless transmission standards.
  • the exercise can also take place via transponders, in particular in that a transponder transmits its ID to the door, the door verifies whether this ID has authorization according to a list available on the door, and - provided the authorization is given, the door opener is activated.
  • the activation of the door opener by means of an internet-enabled mobile device is preferably carried out by a user logging in to a database-based system via the internet with their user data and the system then transmitting an opening command in the form of an executable code to the relevant door of the object.
  • centrally stored user accounts preferably those that are stored on the Internet and can therefore be reached at any time via a remote data connection.
  • a reading device which is functionally coupled to the computer system via a remote data connection, is arranged integrated on at least one door or in an opening mechanism of a door, enables this is an operation in a buffer storage mode, wherein the buffer storage mode can be maintained even if the remote data connection is temporarily interrupted.
  • the reading device preferably has an intermediate memory in which digital access authorizations can be stored for access using a mobile terminal device and / or a transponder.
  • At least one second user level (third absolute level) is provided in the code of the computer program product, an administrator and a user of the first user level being authorized to assign at least one user access authorization for a user of the second To be assigned to a user level and / or to a further user level.
  • the first user level like the administrator himself - receives permanent access authorization and also has the option of authorizing further users.
  • an additional user level is useful, which, although not able to authorize other users, also has permanent access authorization.
  • the code of the computer program stipulates that a successor administrator who makes a request according to feature ii) will not be informed by a successor administrator at a defined end time (Subsequent tenant) has been accepted by a certain administrator with regard to the property, then the request can be compulsorily fulfilled if at least one further requirement defined in the code of the computer program is met.
  • the code of the computer program product can define that after a corresponding Evidence, for example the uploading of an original judicial document with a corresponding decision, a compulsory fulfillment of the request is effected and the successor administrator is assigned the administrator role by the computer system without the administrator's consent.
  • Figure 1 shows how a transfer of the administrator role in the event of a change of owner with a door locking system according to the invention according to variant i. takes place, ie initiated by person A.
  • person A begins with an action that is visualized by arrow 1.
  • person A in their function as administrator, determines person B as the successor administrator. This can be done, for example, in that person A logs on to a database-based online portal with their user profile and specifies person B as the successor administrator in an area provided for this purpose. Person B can thus - if person B is already included in the online portal - be made in a simple manner by selection, possibly with a previous search in a directory - and confirmation.
  • a corresponding request is sent to person B by the code of the computer program product.
  • This request informs person B that person A has requested a transfer of the administrator role. This can be done, for example, in that person B is informed by email, by message on a mobile phone or in some other way.
  • the request is rejected and person A remains the administrator.
  • the same can optionally also be provided if person B does not accept the request within a predetermined time window.
  • the computer program product evaluates the non-acceptance within a time window as a rejection (counts as rejected).
  • Figure 2 visualized - starting from the same starting position as in Figure 1, ie person A is the owner of an object and accordingly has electronic key sovereignty and the administrator role - a transfer of the administrator role according to variant ii.
  • the transfer of the administrator's authorization is initiated by person B.
  • person B names an object for which person B would like to assume the administrator role. This can be done by selecting the object from a directory, in particular if the administration takes place via an online portal with a corresponding database.
  • the code of the computer program product then causes a request to transfer the administrator role to be sent to the person who is currently in the administrator role. In the present case, this is person A.
  • FIG. 3 In the example of Figure 3 is in the starting position person A tenant of an object, for example a rented apartment.
  • Person A has electronic key sovereignty and thus the administrator role for the rental apartment.
  • Person A lives in the rented apartment with other family members who are users within the meaning of the invention and who have user access authorizations, for example a first user level.
  • person A cancels the tenancy.
  • a person H responsible for the house for example a landlord or a property manager, becomes aware of this and takes note of the notice date.
  • H makes a request as the successor administrator according to variant ii.
  • the termination date can either be entered in A together with the termination in a database, or H entered it in a database after receiving the termination.
  • the code of the computer program product causes A to be requested to consent to the transfer of the administrator role on the cancellation date entered in the database. If A rejects this request according to arrow 7a, the request is canceled.
  • step 8 in a first method step, all user access authorizations that A had ever granted are deleted, in particular the user access authorizations mentioned at the beginning for the other family members.
  • step 9 the administrator role is then transferred to the assistant H after all user access authorizations have been successfully deleted.
  • H then has the option of assigning user access authorizations himself as a new administrator in accordance with step 10, for example in order to grant service providers access to the rented apartment and to carry out corresponding activities to carry out in the property, in particular cleaning, maintenance, repair, renovation or control services.
  • the assistant H After completion of the optional work and adequate preparation of the apartment - or even in advance by specifying a transfer date - the assistant H appoints a new tenant B as the successor administrator.
  • the code causes tenant B to receive a request as to whether he agrees to accept the administrator role. If B rejects this request according to arrow 13a, the request is discarded. If B agrees to the request according to arrow 13b, in a first step 14 all user access authorizations that H had assigned are deleted. And in a further, later step 15, the administrator role is transferred from H to B on the specified transfer date. B then of course again has the option of assigning user access authorizations as a new administrator.
  • Figure 4 shows an example of a door locking system in which the transfer module for a transmission according to variant iii. is used.
  • the administrator role lies with person A, who rents an apartment.
  • A terminates the apartment and an auxiliary person H, in particular a property manager or the apartment owner, becomes aware of this in accordance with step 16.
  • Person H also learns that person B has rented the apartment from a certain handover date and that person A will leave the apartment renovated by this handover date.
  • H enters the handover date and the information that B should become the successor administrator on the handover date.
  • the transfer module of the door locking system then initiates a request to person A according to step 18 with the information that the administrator role is to be handed over on the transfer date and according to step 19 a request to person B that he can accept the administrator role on the transfer date. If, at the latest by the handover date, both person A has agreed to the request in accordance with step 20 and person B has consented in accordance with step 21, On the transfer date according to step 22, the door locking system causes all user access authorizations that person A had assigned to be deleted. Only then is the administrator role transferred from person A to person B according to step 23. Person B can then assign user access authorizations himself according to step 24.
  • the embodiment described last has the advantage that the handover of rental objects including the handover of the electronic key sovereignty can be timed and with a high degree of legal certainty with regard to the deletion of all access authorizations. Furthermore - and this also applies to the other exemplary embodiments - the handover of an object itself can take place at a predetermined point in time without the presence of other people, for example the assistant H, being required. This makes it possible to manage properties without the mandatory on-site presence of an owner or property manager over a longer period of time and over several tenant changes.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
EP19187903.0A 2019-07-23 2019-07-23 Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d'au moins deux niveaux différents Withdrawn EP3770867A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP19187903.0A EP3770867A1 (fr) 2019-07-23 2019-07-23 Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d'au moins deux niveaux différents

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP19187903.0A EP3770867A1 (fr) 2019-07-23 2019-07-23 Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d'au moins deux niveaux différents

Publications (1)

Publication Number Publication Date
EP3770867A1 true EP3770867A1 (fr) 2021-01-27

Family

ID=67438637

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19187903.0A Withdrawn EP3770867A1 (fr) 2019-07-23 2019-07-23 Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d'au moins deux niveaux différents

Country Status (1)

Country Link
EP (1) EP3770867A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4436605A1 (de) 1993-10-15 1995-04-20 Joachim Linz Verfahren zur sicheren Ver- und Entriegelung von Schlössern mit einer Authentisierung
EP1325476A1 (fr) * 2000-10-13 2003-07-09 Nokia Corporation Systeme de verrouillage sans fil
DE102013111429A1 (de) 2013-10-16 2015-04-16 Lock Your World Gmbh & Co. Kg Verfahren zum Betreiben eines Schließsystems sowie Schließsystem
EP3291183A1 (fr) * 2016-09-02 2018-03-07 Assa Abloy AB Séquence de délégations pour contrôler l'accès à un objet d'accès
CN108537923A (zh) * 2018-03-27 2018-09-14 丁巨波 基于网络的智能锁管理控制方法及系统
US20180266153A1 (en) * 2013-02-28 2018-09-20 Otto Llc Door lock assembly for a dwelling

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4436605A1 (de) 1993-10-15 1995-04-20 Joachim Linz Verfahren zur sicheren Ver- und Entriegelung von Schlössern mit einer Authentisierung
EP1325476A1 (fr) * 2000-10-13 2003-07-09 Nokia Corporation Systeme de verrouillage sans fil
US20180266153A1 (en) * 2013-02-28 2018-09-20 Otto Llc Door lock assembly for a dwelling
DE102013111429A1 (de) 2013-10-16 2015-04-16 Lock Your World Gmbh & Co. Kg Verfahren zum Betreiben eines Schließsystems sowie Schließsystem
EP3291183A1 (fr) * 2016-09-02 2018-03-07 Assa Abloy AB Séquence de délégations pour contrôler l'accès à un objet d'accès
CN108537923A (zh) * 2018-03-27 2018-09-14 丁巨波 基于网络的智能锁管理控制方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "KIWI Portal Manual", 15 September 2018 (2018-09-15), XP055659523, Retrieved from the Internet <URL:https://web.archive.org/web/20180915060015if_/https://kiwi.ki/wp-content/uploads/2017/09/KIWI-Portal-Manual-1.2.pdf> [retrieved on 20200120] *

Similar Documents

Publication Publication Date Title
EP3103057B1 (fr) Procédé d&#39;accès à une baie physiquement sécurisée ainsi qu&#39;infrastructure informatique
EP3542350A1 (fr) Système de contrôle d&#39;accès avec mise à jour d&#39;état automatique
EP2595341B1 (fr) Gestion des droits d&#39;utilisateurs et système de contrôle d&#39;accès avec restriction de durée
WO2017108818A1 (fr) Système et procédé de transfert de droits d&#39;accès à un véhicule
EP2977964A1 (fr) Procédé de commande d&#39;un appareil nécessitant des autorisations d&#39;utilisateur par l&#39;intermédiaire d&#39;un terminal mobile
EP3096299B1 (fr) Installation de fermeture et procédé de fonctionnement d&#39;une installation de fermeture pour une porte de batiment
EP3009992B1 (fr) Procede et dispositif de gestion d&#39;autorisations d&#39;acces
EP3567557A1 (fr) Système de fermeture
EP3770867A1 (fr) Système de fermeture porte assisté par ordinateur pour au moins un objet avec les utilisateurs d&#39;au moins deux niveaux différents
DE19821998C1 (de) Signalbetätigbares Schließsystem für Türen oder Tore sowie Verfahren zum Betreiben eines solchen
EP3096298B1 (fr) Procédé pour opérer un système de verrouillage et système de verrouillage
DE4436605A1 (de) Verfahren zur sicheren Ver- und Entriegelung von Schlössern mit einer Authentisierung
EP1821262A2 (fr) Système de contrôle d&#39;autorisations de personnes à exécuter des activités autorisées
DE3342651A1 (de) Verfahren zur absicherung des zugriffs an terminals
DE102017000514B3 (de) Vorrichtungen, systeme und verfahren zum entriegeln eines schlosses eines schloss-systems
DE102013100321A1 (de) System und Verfahren zum Parametrieren von Flügeln bzw. Flügelanlagen
DE202020102303U1 (de) Antriebssystem
EP4050545A1 (fr) Procédé d&#39;installation d&#39;une pluralité de composants de porte
WO2022180088A1 (fr) Procédé d&#39;installation d&#39;une pluralité de composants de porte
DE10220866A1 (de) Verfahren und Einrichtung zum automatischen Entriegeln und Verriegeln von Möbelschlössern
EP4358043A1 (fr) Procédé de mise en service d&#39;un dispositif de verrouillage électromécanique
DE102022127174A1 (de) Verfahren zur Inbetriebnahme einer elektro-mechanischen Sperrvorrichtung
EP4358044A1 (fr) Procédé de mise en service d&#39;un dispositif de verrouillage électromécanique
EP3489914A1 (fr) Procédé de contrôle d&#39;entrée et système de contrôle d&#39;entrée
DE102022104787A1 (de) Verfahren, Kraftfahrzeug und Computerprogrammprodukt

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20210609

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20230103

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20230516