EP4053806A1 - Electronic-key management system and server - Google Patents
Electronic-key management system and server Download PDFInfo
- Publication number
- EP4053806A1 EP4053806A1 EP20866925.9A EP20866925A EP4053806A1 EP 4053806 A1 EP4053806 A1 EP 4053806A1 EP 20866925 A EP20866925 A EP 20866925A EP 4053806 A1 EP4053806 A1 EP 4053806A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- electronic
- electronic key
- key
- locking device
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims description 58
- 238000010586 diagram Methods 0.000 description 16
- 238000000034 method Methods 0.000 description 14
- 230000004913 activation Effects 0.000 description 8
- 230000008859 change Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 210000004204 blood vessel Anatomy 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 210000003128 head Anatomy 0.000 description 2
- 210000000554 iris Anatomy 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00761—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C2009/00936—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for key cabinets
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00968—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
- G07C2009/00992—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier mechanical key
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/62—Comprising means for indicating the status of the lock
Definitions
- the present disclosure relates to an electronic key management system and a server.
- Locking devices installed for security on entrance doors, lockers, facilities, etc. may be largely classified into mechanical locking devices and electronic locking devices.
- mechanical locking device that opens and closes an entrance door, a locker, etc., using a key
- the electronic locking device that opens and closes a door using a password, a user's fingerprint and voice or an electronic key has been frequently used. Since there is no fear of losing keys, general users may easily open and close doors and lockers through simple authentication, and security is excellent, the market for the electronic locking devices is rapidly growing in recent years.
- an electronic key management system is required to prevent loss by storing a plurality of electronic keys and to efficiently manage the electronic keys.
- the technical problem to be solved by the present disclosure is to provide an electronic key management system and a server capable of efficiently and stably managing an electronic key.
- an electronic key management system includes: an electronic key configured to lock and unlock an electronic locking device; an electronic key storage device configured to include a plurality of key holes and a key holder fastened with an electronic key carried into the key hole, and control the key holder according to a preset electronic key access right; a management server configured to set an access right to the electronic locking device of the electronic key, transmit a one-time authentication ID to the electronic key that is put into the electronic locking device and electrically connected to the electronic locking device, and receive log information of the electronic key on the electronic locking device in real time; and a user terminal configured to transmit and receive the log information and the one-time authentication ID between the electronic key and the management server, and display real-time log information.
- the management server may transmit one-time authentication data corresponding to the one-time authentication ID to the electronic locking device through the electronic key.
- the management server may store any one or more of location information of the plurality of electronic locking devices and current state information of the electronic locking device, and display the location information and the current state information through a display unit.
- the management server may display locations of the electronic locking devices into which the electronic key without unlocking authority is put on the display unit on which the locations of the plurality of electronic locking devices are displayed, differently from other electronic locking devices.
- the management server may transmit the one-time authentication ID corresponding to the one-time authentication data to the electronic locking device into which the electronic key without the unlocking authority displayed on the display unit differently from the other electronic locking devices is put and the put electronic key, respectively, when an administrator's approval is input.
- the electronic key may delete the one-time authentication ID after receiving the one-time authentication ID and unlocking the electronic locking device.
- the management server may transmit a message notifying an unlocking attempt without unlocking authority from the electronic locking device to a pre-registered user terminal of a user with unlocking authority when the unlocking attempt by the electronic key without the unlocking authority is confirmed.
- an electronic key management server includes: a communication unit configured to transmit and receive an electronic key and information; a storage unit configured to store log information received from the electronic key; and a control unit configured to set an access right to an electronic locking device of the electronic key, and set a one-time authentication authority for the electronic key that is put into the electronic locking device and electrically connected to the electronic locking device, in which the control unit controls to transmit a one-time authentication ID generated according to the one-time unlocking authority setting to the electronic key.
- the storage unit may store locations of a plurality of electronic locking devices, and may further include a display unit for displaying at least one of current state information of the electronic locking device received through the communication unit and a location of the electronic locking device.
- control unit may set an authentication authority of the electronic key, and the authentication authority may include at least one of a date, a time, and a day of the week in which authentication execution is possible.
- FIG. 1 is a block diagram schematically illustrating a configuration of an electronic key management system used in an embodiment of the present disclosure.
- the electronic key management system may include a key 200, a user terminal 400, and a management server 500.
- the electronic key 200 refers to a key for locking or unlocking an electronic locking device 100.
- the electronic key 200 collects a use history and transmits the collected use history to the authorized user terminal 400 and the management server 500.
- the electronic locking device 100 may be any one of a pad lock, a Europrofile double, a rim lock, a drawer lock, and a cam lock.
- the user terminal 400 provides an electronic key management service by accessing the electronic key 200 and the management server 500 through a communication network.
- the user terminal 400 is installed with an application for providing the electronic key management service, and the user may use the electronic key management service through the installed application.
- the electronic key management service refers to various services that may improve convenience and security in the use of the electronic key 200, and includes log information (use history), authority setting, and the like.
- the log information may be information on a time when the electronic key 200 is put into the electronic locking device 100 and is electrically connected to the electronic locking device 100 and authentication success/failure.
- Authority setting is to set any one or more of a date, a time, and a day of the week in which the electronic key 200 may perform authentication with the electronic locking device 100. Accordingly, the electronic key 200 may enable the electronic key to be activated only when the authority is set.
- the authority setting can be made through the user terminal 400 and/or the management server 500 as described later.
- the user terminal 400 may be implemented as, for example, a smartphone, a PDA, a tablet PC, a notebook computer, a laptop computer, a personal computer, and electronic devices or similar devices capable of performing other communications, receiving user input, and outputting a screen.
- the management server 500 receives and stores electronic key-related information from one or more user terminals 400 and/or electronic keys connected through a communication network, and provides various electronic key management services.
- the management server 500 may search, edit, delete, etc. stored information according to the request of the user terminal 400, and grant a one-time unlocking authority to the electronic key.
- the management server 500 may be implemented as, for example, a workstation, a server, a general-purpose computer, an electronic device capable of performing other communication, or a similar device.
- the communication network may be implemented using at least some of, for example, long term evolution (LTE), LTE-advanced (LTE-A), Wi-Fi, a local area network (LAN), a wide area network (WAN), code division multiple access (CDMA), time division multiple access (TDMA), wireless broadband (WiBro), and global system for mobile communications (GSM), and other communication methods developed in the past and present or available in the future.
- LTE long term evolution
- LTE-A LTE-advanced
- Wi-Fi Wi-Fi
- LAN local area network
- WAN wide area network
- CDMA code division multiple access
- TDMA time division multiple access
- WiBro wireless broadband
- GSM global system for mobile communications
- a communication network is not mentioned, and each component is described as if they directly communicate.
- each component may use different communication networks.
- the electronic key 200 and the user terminal 400 may use a Wi-Fi communication method
- the user terminal 400 and the server may use the long term evolution (LTE) communication method
- FIG. 2 is a diagram schematically illustrating a configuration of the electronic locking device according to the embodiment of the present disclosure.
- the electronic locking device 100 includes a transmission/reception unit 112, an authentication unit 114, a command unit 116, and a storage unit 118.
- the transmission/reception unit 112 may receive unique ID (UID) data pre-stored in the electronic key 200 or a one-time authentication ID (for example, ID of the electronic locking device).
- UID unique ID
- a one-time authentication ID for example, ID of the electronic locking device
- the authentication unit 114 performs authentication based on the UID data or the one-time authentication ID. When both the one-time authentication data and the UID data are retrieved, the authentication unit 114 performs the authentication using the one-time authentication data.
- the UID data is data for common authentication
- the one-time authentication data is data for one-time authentication that is assigned one-time from the management server 500 according to an administrator's approval.
- the authentication unit 114 may compare the UID data pre-stored in the electronic key 200 with authentication data (for example, the UID of the electronic key) pre-stored in the electronic locking device 100, and perform the authentication on the UID data based on the comparison result.
- the authentication unit 114 may perform the authentication process on the UID data (authentication success), and when it is determined that the UID data and the authentication data are not the same, the authentication unit 114 may not process the approval for the UID data (authentication failure).
- the authentication unit 114 may perform primary authentication according to whether first authentication data pre-stored in the electronic key 200 is matched, further receive encrypted data input by a button provided in the electronic key 200, and determine whether pre-stored second authentication data is matched, thereby performing double authentication on the encrypted data.
- the authentication unit 114 may store and manage all log information related to authentication of the UID data and the one-time authentication data.
- the log information may include, for example, log information on whether the electronic key 200 is authenticated, log information on an opening/closing time of the electronic locking device 100 by the authenticated electronic key 200, log information on registration or change of the master electronic key 200, and log information on registration or change of a blacklist according to whether the electronic key 200 is lost.
- the blacklist may be registered or changed by allowing the management server 500 receiving loss information of the electronic key 200 from the user terminal to match and store the UID data related to the lost electronic key 200 with the loss information.
- the management server 500 may register or change the blacklist by matching and storing the lost information with UID data related to the electronic key 200.
- the user terminal 400 may correspond to the mobile communication terminal, and the loss information may include the UID data of the electronic key 200 and data on whether the electronic key 200 is lost.
- the authentication unit 114 may receive the blacklist generated by the management server 500, from the electronic key 200, determine whether the electronic key 200 is registered in the blacklist, and maintain a locked state of the electronic locking device 100 when it is determined that the electronic key 200 is registered in the blacklist. In this case, the authentication unit 114 may transmit to the management server 500 as a notification message that the attempt has been made to unlock the electronic locking device 100 with the electronic key 200.
- the user terminal 400 may transmit the acquisition information of the lost electronic key 200 to the management server 500. Accordingly, the management server 500 may change (delete) the blacklist corresponding to the acquired information.
- the electronic key 200 may undergo a key activation operation.
- the electronic key 200 may receive a password generated by the application from the user terminal 400 through the wireless communication in the state in which the electronic key 200 is connected to the user terminal 400 on which an application for setting the input of the UID data is mounted before a terminal unit provided in a key head of the electronic key 200 electrically contacts with a data communication unit of the electronic lock device 100.
- the electronic key 200 may determine whether the input key value matches the password, and may be activated when it is determined that the input key value matches the password.
- the electronic key 200 may have a function of performing the authentication thereafter.
- the electronic key 200 may have a default value for key activation provided therein before the terminal unit provided in the key head of the electronic key 200 electrically contacts with the data communication unit of the electronic locking device 100.
- the electronic key 200 may determine whether the input key value matches the default value, and may be activated when it is determined that the input key value matches the default value.
- the electronic key 200 may have a function of performing the authentication thereafter.
- the authentication unit 114 performs the key activation operation using the electronic key 200, but the present disclosure is not limited thereto. Therefore, the key activation operation may also be performed through biometrics using fingerprints, blood vessels, irises, and the like.
- the command unit 116 instructs the electronic locking device 100 to be unlocked.
- the command unit 116 may instruct the electronic locking device 100 to be opened after all the authentication for the UID data in the authentication unit 114 has passed. To this end, the command unit 116 may transmit a control signal related to unlocking to a driving unit of the electronic locking device 100.
- the command unit 116 may instruct the electronic locking device 100 to maintain the locked state.
- the storage unit 118 may store a list of identifiers (authentication data) of the electronic key 200 capable of locking and unlocking itself in an internal memory of the electronic locking device 100.
- the electronic locking device 100 may perform authentication through authentication of the UID data, thereby improving the security efficiency of the electronic locking device 100.
- FIG. 3 is a block diagram schematically illustrating a configuration of the electronic key according to the embodiment of the present disclosure.
- the electronic key 200 includes a communication unit 211, a transmission/reception unit 212, an authentication unit 214, a control unit 216, and a storage unit 218.
- the communication unit 211 may include a module that transmits and receives information through a local area network such as Bluetooth.
- the communication unit 211 may be connected to the user terminal 400 and the management server 500 by wire or wirelessly to transmit log information L to the user terminal 400 and/or the management server 500.
- the electronic key 200 since the electronic key 200 has a limitation in adding a communication module due to its volume constraint, when only a short-range communication module such as Bluetooth is added to the electronic key 200, the electronic key 200 may communicate with the management server 500 using the user terminal 400 without directly communicating with the management server 500.
- the communication unit 211 may be wirelessly connected to the user terminal 400 by performing a pairing operation with the user terminal 400 through Bluetooth.
- the communication unit 211 may receive a key access right from the user terminal 400 or the management server 500.
- the communication unit 211 may receive and store authentication data, such as UID data, one-time UID data, and one-time authentication data, for unlocking the electronic key from the user terminal 400 or the management server 500.
- the communication unit 211 may transmit the key use history (log information) to the user terminal 400 or the management server 500 in real time.
- the transmission/reception unit 216 may receive the unique ID (UID) data pre-stored in the electronic locking device 100 when the electronic key 200 is put into the electronic locking device 100 and electrically contacts with the electronic locking device 100, and may transmit the pre-stored UID or one-time authentication ID stored in advance in the electronic key 200 to the electronic locking device 100.
- the transmission/reception unit 216 may transmit the one-time authentication data in preference to other data when the electronic key 200 is put into the electronic locking device 100 and electrically contacts with the electronic locking device 100.
- the one-time authentication ID may be deleted when the contact with the electronic locking device 100 is cut off.
- the authentication unit 214 performs authentication based on the UID data or the one-time authentication ID. When both the one-time authentication data and the UID data are retrieved, the authentication unit 214 performs the authentication using the one-time authentication data.
- the control unit 216 controls the communication unit 211 and the storage unit 218 to perform electronic key authentication and management.
- the contact time and the authentication success or failure may be stored in the storage unit 218 to database the key use history.
- control unit 216 When the control unit 216 is put into the electronic locking device 100 and electrically contacts with the electronic locking device 100 to perform the authentication with the electronic locking device 100, the control unit 216 uses the one-time UID data to perform the authentication with the electronic locking device 100 when the one-time UID data is received directly from the management server 500 or through the user terminal 400.
- control unit 216 may store and manage information related to the authentication of the UID data and the one-time data during the authentication.
- the electronic key 200 may undergo the key activation operation. Since the key activation operation is the same as the operation described in FIG. 2 , a detailed description thereof will be omitted.
- the authentication unit 214 performs the key activation operation using the electronic key 200, but the present disclosure is not limited thereto. Therefore, the key activation operation may also be performed through biometrics using fingerprints, blood vessels, irises, and the like.
- control unit 216 instructs the electronic locking device 100 to be unlocked.
- the unlocking command of the control unit 216 is the same or similar to the method performed by the command unit 116 of the electronic locking device 110 according to an embodiment of the present disclosure. As a result, in other embodiments of the present disclosure, a description thereof will be omitted.
- the electronic key 200 may further include a battery.
- the battery may be a recharging type. As will be described later in FIG. 6 , the battery of the electronic key 200 may be charged by the key storage device.
- the electronic locking device by performing the authentication using the UID data based on the wireless communication between the electronic key 200 and the user terminal 400, the electronic locking device may be unlocked by a simple and convenient authentication method, and furthermore, the security efficiency of the electronic locking device 110 may be improved.
- the access right to the electronic locking device 100 may be easily controlled by the management server 500.
- the electronic locking device 100 does not have a separate power supply, and temporarily receives power from the connection terminal of the electronic key 200 through the connection terminal and thus unlocks the electronic locking device 100.
- the connection terminal of the electronic locking device 100 and the connection terminal of the electronic key 200 may be in physical contact with each other to supply power as well as exchange identifiers (UIDs) of each other, thereby performing the primary authentication.
- UIDs exchange identifiers
- the list of the identifiers of the electronic key 200 that may lock and unlock itself is stored in the internal memory of the electronic locking device 100
- the list of the identifiers of the electronic locking device 100 that may be locked and unlocked is stored in the internal memory of the electronic key 200, and thus the connection terminals come into contact with each other, thereby performing the primary authentication.
- a secondary authentication means may be added to the electronic key 200.
- four key pads 260 are attached to the electronic key 200, and the secondary authentication may be performed through the key pad 260.
- numbers such as 1, 2, 3, and 4 are printed on the keypad 260, and the secondary authentication may be performed with a combination thereof.
- a power button of the electronic key 200 is first pressed to turn on the electronic key 200, and then a preset password is input to the keypad 260.
- the password input by the user is the same as the password stored in the internal memory of the electronic key 200, the information indicating that the second authentication using the password succeeds is notified through sound or a lamp, and then the double authentication may be performed in a manner that the electronic locking device 100 is unlocked when a user makes the electronic key 200 contact with the electronic locking device 100.
- the keypad 260 is shown to aid understanding of the disclosure.
- a fingerprint sensor may be added to the electronic key 200, and the authentication using biometric information may be performed using a user's fingerprint.
- the communication module such as Bluetooth may be added to the electronic key 200.
- the double authentication may be performed using an external device while the electronic key 200 communicates with an external device such as a smartphone.
- a user may be authenticated through face recognition using a camera or voice recognition using a microphone on a smartphone. Only when such secondary authentication succeeds, the information indicating that the authentication succeeds with the electronic key 200 on the smartphone may be transmitted.
- the double authentication may be performed by the method of performing authentication with the contact of the electronic key 200 with the electronic locking device 100. The double authentication enhances the security.
- FIG. 4 is a block diagram illustrating a configuration of a user terminal according to an embodiment of the present disclosure.
- the user terminal 400 may include an input unit 410, a display unit 420, a communication unit 430, a storage unit 440, and a control unit 450.
- the input unit 410 converts a user's input operation into an input signal and transmits the input signal to the control unit 450.
- the input unit 410 may be implemented as, for example, a keyboard, a mouse, a touch sensor on a touch screen, a touch pad, a keypad, a voice input, and other input processing devices that are possible in the present, in the past, or in the future.
- the display unit 420 outputs a screen under the control of the control unit 450.
- the display unit 420 may be implemented as, for example, a liquid crystal display (LCD), a light emitting diode (LED), an organic light emitting diode (OLED), a projector, and other display devices that are possible in the present, in the past, or in the future.
- the display unit 420 may display, for example, an interface page for providing information or an information providing result page. According to the embodiment, a component that uses other methods of transmitting information such as voice output or vibration instead of the screen output to other users may be used instead of the display unit 420.
- the communication unit 430 exchanges data with the management server 500 and/or the electronic key 200.
- the communication unit 430 transmits the one-time authentication ID received from the management server 500 to the control unit 450. In addition, the communication unit 430 transmits data to the management server 500 under the control of the control unit 450.
- the communication technology used by the communication unit 430 may vary depending on the type of communication network or other circumstances.
- the communication unit 430 may communicate with the electronic key 200 through a first communication network, and communicate with the management server 500 through a second communication network.
- the storage unit 440 stores data under the control of the control unit 450 and transmits the requested data to the control unit 450.
- the control unit 450 controls the overall operation of the user terminal 400 and each component.
- the communication unit 430 transmits and receives data under the control of the control unit 450 according to the viewpoint, and it may be expressed that the control unit 450 controls the communication unit 430 to transmit and receive data.
- control unit 450 may transmit the one-time authentication ID request message to the management server 500 according to the information input from the input unit 410.
- control unit 450 may transmit the one-time authentication ID received from the management server 500 to the electronic key 200.
- the communication unit 430 transmits and receives data under the control of the control unit 450 according to the viewpoint, and it may be expressed that the control unit 450 controls the communication unit 430 to transmit and receive data.
- FIG. 5 is a block diagram illustrating a configuration of a management server according to an embodiment of the present disclosure.
- the management server 500 may include a display unit 520, a communication unit 530, a storage unit 540, and a control unit 550.
- the management server includes the display unit 520, the communication unit 530, the storage unit 540, and the control unit 550, but some of these may be implemented as physically distinguished devices.
- the display unit 520 may be implemented as a separate monitor or an external terminal such as a manager terminal.
- the display unit 520 outputs the screen under the control of the control unit 550.
- the display unit 520 may be implemented as, for example, a liquid crystal display (LCD), a light emitting diode (LED), an organic light emitting diode (OLED), a projector, and other display devices that are possible in the present, in the past, or in the future.
- the display unit 520 may display, for example, the interface page for providing the information or the information providing result page.
- the component that uses other methods of transmitting information such as voice output or vibration instead of the screen output to other users may be used instead of the display unit 520.
- the display unit 520 may display the pre-stored location of the electronic locking device 100 on a map.
- the display unit 520 displays the location of the electronic locking device 100 and the current state (including the charging state, the connection state, and the like of the electronic key) of the electronic locking device 100 on the map in real time.
- the display unit 520 may display the location of the locking device on the map in different colors according to the current state. Accordingly, the user may intuitively grasp the location and current state of the locking device by checking the map.
- the communication unit 530 exchanges data with the user terminal 400 and/or the electronic key 200.
- the communication unit 530 receives log information from the electronic key 200 and/or the user terminal 400 and transmits the log information to the storage unit 540.
- the communication unit 530 may receive one-time authentication request information from the electronic key 200 and/or the user terminal 400 to transmit the received one-time authentication request information to the control unit 550.
- the communication technology used by the communication unit 530 may vary depending on the type of communication network or other circumstances.
- the storage unit 540 stores data under the control of the control unit 550 and transmits the requested data to the control unit 550.
- the control unit 550 controls the overall operation of the management server 500 and each component. In particular, as described later, the control unit 550 may transmit the one-time authentication ID request message to the management server 500 according to the information input from the input unit (not illustrated), and transmit the one-time authentication ID received from the management server 500 to the electronic key 200.
- the control unit 550 When the control unit 550 receives a signal from the electronic key 200 without the unlocking authority that is put into the electronic locking device 100 and electrically contacts with the electronic locking device 100, the control unit 550 displays the location of the corresponding electronic locking device 100 on the display device.
- the absence of the unlocking authority means the electronic key that does not have the UID corresponding to the electronic locking device 100.
- the location of the electronic locking device 100 into which the electronic key 200 without the unlocking authority is put is displayed differently from the location of the electronic locking device 100 into which the electronic key 200 is not put. For example, the location of the electronic locking device 100 to which the electronic key 200 is not put is indicated in black.
- the location of the electronic locking device 100 into which the electronic key 200 without the unlocking authority is put may be indicated in red.
- the one-time authentication may be performed by selecting (clicking the mouse or touching the touch panel) the electronic locking device 100 indicated in red. That is, the control unit 550 generates the one-time authentication ID for the selected electronic locking device 100 and the one-time authentication data, and transmits the generated one-time authentication ID and one-time authentication data to the electronic key 200 and the electronic locking device 100 through the communication unit 530.
- Data for the one-time authentication is implemented such that the authentication authority disappears when the corresponding electronic locking device 100 and the electronic key 200 are separated.
- the one-time authentication ID and one-time authentication data stored in the electronic key 200 and the electronic locking device 100 may be implemented to be deleted after one-time authentication.
- control unit 550 may set the authority for the authentication stored in the electronic key 200.
- the control unit 550 may transmit information for setting any one or more of a date, a time, and a day of the week of the electronic key 200 to the electronic key 200 directly or through the user terminal 400 according to the input through the input unit (not illustrated) for setting the authentication authority. Accordingly, the electronic key 200 may enable the electronic key to be activated only when the authority is set.
- FIG. 6 is a block diagram schematically illustrating a configuration of an electronic key management system according to another embodiment of the present disclosure.
- the electronic key management system may include the electronic locking device 100, the electronic key 200, the electronic key storage device 300, the user terminal 400, and the management server 500.
- the electronic locking device 100 includes not only drawers, cabinets, storage boxes, and safes, but also CCTV or traffic signal control panel doors, communication company's repeater enclosure doors, communication base stations, entrance doors of police station/military unit/armory/ammunition locker, an ARM device, a lading box logistics vehicle, and the like.
- Such an electronic locking device 100 does not have a separate power source, and temporarily receives power from the connection terminal (not illustrated) of the electronic key 200 through the connection terminal (not illustrated), thereby unlocking the electronic locking device 100.
- the connection terminal of the electronic locking device 100 and the connection terminal of the electronic key 200 may be in physical contact with each other to supply power as well as exchange identifiers (UIDs) of each other, thereby performing the authentication.
- UIDs exchange identifiers
- the electronic locking device 100 Since such a small electronic locking device has a small volume and needs to be installed in several locations, the electronic locking device 100 does not have a power supply provided therein, and the method of unlocking an electronic locking device 100 while receiving power from the electronic key 200 is very useful.
- the electronic key storage device 300 may transmit and receive information through the communication network with the management server 500.
- the electronic key storage device 300 may transmit the history of the electronic key inserted into the key hole to be described later and/or the charging information of the fastened electronic key to the management server 500 in real time.
- the electronic key storage device 300 may receive the access authority information on the electronic locking device for each electronic key or may download firmware update information of the electronic key storage device.
- the electronic key storage device 300 may notify the management server 500 when it is confirmed that the unlocking attempt is made by the electronic key without the unlocking authority.
- the management server 500 transmits a message notifying the unlocking attempt without the unlocking authority to the pre-registered terminal when the unlocking attempt is confirmed with the electronic key without the unlocking authority.
- the pre-registered terminal may be an administrator or an external terminal registered by the administrator.
- the electronic key storage device 300 includes a plurality of key holes and a key holder fastened with the electronic key 200 carried into the key hole.
- the electronic key storage device 300 can store the electronic key 200 by inserting the electronic key 200 into each hole. For example, 25 key holes 330 may be provided, but the number of key holes 330 is not limited thereto. When the key is carried into the key hole 330, the electronic key 200 may be charged.
- the electronic key storage device 300 also controls the electronic key 200 to be fastened and unfastened with and from the key holder according to the access authority (accessible electronic key/accessible time) to the electronic key 200 set in advance. In addition, the electronic key storage device 300 charges the fastened electronic key 200.
- the electronic key storage device 300 may receive and store the log information from the fastened electronic key 200.
- the electronic key storage device 300 may receive the password when releasing the electronic key 200 fastened by the user and withdrawing the electronic key 200, and unfasten the corresponding electronic key 200 only when the input password matches the password stored by matching the corresponding electronic key 200.
- the electronic key storage device 300 may change the color of the state display unit provided around the key holder according to whether the user has the access authority through the password authentication. For example, the state display unit 340 around the key hole 330 that matches the key available to the user may be displayed in blue, and the state display unit 340 around the key hole 330 matching the key that is not available may be displayed in red. This makes it possible to easily identify a key that a user may use and a key hole to be returned.
- the electronic key storage device 300 may output the information on the location of the key hole with which the electronic key 200 matching the input password is fastened. For example, it is possible to turn on the LED provided in the location of the key hole.
- the electronic key storage device 300 may further display the charging state through the state display unit. For example, when the electronic key 200 is being charged, when the charging is completed, the state may be guided to the user in color by distinguishing reading/writing of data, and the like.
- FIG. 7 is a diagram illustrating an example of a screen displayed by the management server according to the embodiment of the present disclosure.
- the management server displays the locations of a plurality of electronic locking devices on a map.
- Each electronic locking device reflects and displays the current state in real time.
- Each of the electronic locking devices displays whether or not an electronic key is put and electrically connected to the electronic locking device.
- the state may be displayed differently in color and/or image. For example, the state in which the electronic key is connected may be displayed in red, and the state in which the electronic key is not connected may be displayed in blue.
- the management server may further display statistical information according to the pre-stored state of the electronic locking device in a separate area. For example, the number of electronic locking devices in the locked state, the number of electronic locking devices in the unlocked state, the number of electronic locking devices to which the electronic key is connected, and the number of electronic locking devices to which the blacklist electronic key is connected may each be displayed.
- FIG. 8 is a diagram illustrating an example of a screen displayed by the user terminal according to the embodiment of the present disclosure.
- the user terminal may include a connection information display unit 810 with a server, a discovering button 820, a pairing button 830, a signal quality display unit 840, and a key list 850 on the display screen.
- the access information display unit 820 displays the screen that displays the connection status with the management server by selecting and changing the connection and disconnection with the server each time the screen is clicked.
- the connection state with the server is changed, the state change is displayed in color or the like. For example, when the connection succeeds, the button may be displayed in blue.
- the discovering button 820 is a button for selecting a search for an electronic key in a communication range that is not initially connected to the user terminal and the electronic key.
- the discovering button 820 is selected, the list of electronic keys in the communication range is displayed on the key list 850.
- the pairing display unit 830 is a button for instructing the electronic key to be paired with the selected electronic key among the electronic keys displayed on the key list 850.
- the signal quality display unit 840 may display the quality of the paired signal.
- the key list 850 may display an ID of an electronic key according to a condition selected according to the discovering button 820 and the pairing button 830.
- An attempt to carry out the electronic key other than the carrying out date and time of the electronic key of the input electronic key according to this electronic key storage device may be prevented.
Abstract
Description
- The present disclosure relates to an electronic key management system and a server.
- Locking devices installed for security on entrance doors, lockers, facilities, etc., may be largely classified into mechanical locking devices and electronic locking devices. In the case of a mechanical locking device that opens and closes an entrance door, a locker, etc., using a key, there is a problem of having to replace the locking device when the key is lost, along with security problems due to manipulation or storage of the key.
- In view of this, the electronic locking device that opens and closes a door using a password, a user's fingerprint and voice or an electronic key has been frequently used. Since there is no fear of losing keys, general users may easily open and close doors and lockers through simple authentication, and security is excellent, the market for the electronic locking devices is rapidly growing in recent years.
- Therefore, when the plurality of electronic locking devices is installed in a plurality of locations, an electronic key management system is required to prevent loss by storing a plurality of electronic keys and to efficiently manage the electronic keys.
- The technical problem to be solved by the present disclosure is to provide an electronic key management system and a server capable of efficiently and stably managing an electronic key.
- Objects of the present disclosure are not limited to the object(s) mentioned above, and other object(s) that are not mentioned may be obviously understood by those skilled in the art from the following description.
- According to an aspect, an electronic key management system includes: an electronic key configured to lock and unlock an electronic locking device; an electronic key storage device configured to include a plurality of key holes and a key holder fastened with an electronic key carried into the key hole, and control the key holder according to a preset electronic key access right; a management server configured to set an access right to the electronic locking device of the electronic key, transmit a one-time authentication ID to the electronic key that is put into the electronic locking device and electrically connected to the electronic locking device, and receive log information of the electronic key on the electronic locking device in real time; and a user terminal configured to transmit and receive the log information and the one-time authentication ID between the electronic key and the management server, and display real-time log information.
- In one embodiment, the management server may transmit one-time authentication data corresponding to the one-time authentication ID to the electronic locking device through the electronic key.
- In one embodiment, the management server may store any one or more of location information of the plurality of electronic locking devices and current state information of the electronic locking device, and display the location information and the current state information through a display unit.
- In one embodiment, the management server may display locations of the electronic locking devices into which the electronic key without unlocking authority is put on the display unit on which the locations of the plurality of electronic locking devices are displayed, differently from other electronic locking devices.
- In one embodiment, the management server may transmit the one-time authentication ID corresponding to the one-time authentication data to the electronic locking device into which the electronic key without the unlocking authority displayed on the display unit differently from the other electronic locking devices is put and the put electronic key, respectively, when an administrator's approval is input.
- In one embodiment, the electronic key may delete the one-time authentication ID after receiving the one-time authentication ID and unlocking the electronic locking device.
- In one embodiment, the management server may transmit a message notifying an unlocking attempt without unlocking authority from the electronic locking device to a pre-registered user terminal of a user with unlocking authority when the unlocking attempt by the electronic key without the unlocking authority is confirmed.
- According to another aspect, an electronic key management server includes: a communication unit configured to transmit and receive an electronic key and information; a storage unit configured to store log information received from the electronic key; and a control unit configured to set an access right to an electronic locking device of the electronic key, and set a one-time authentication authority for the electronic key that is put into the electronic locking device and electrically connected to the electronic locking device, in which the control unit controls to transmit a one-time authentication ID generated according to the one-time unlocking authority setting to the electronic key.
- In one embodiment, the storage unit may store locations of a plurality of electronic locking devices, and may further include a display unit for displaying at least one of current state information of the electronic locking device received through the communication unit and a location of the electronic locking device.
- In one embodiment, the control unit may set an authentication authority of the electronic key, and the authentication authority may include at least one of a date, a time, and a day of the week in which authentication execution is possible.
- The effects according to the present disclosure are as follows.
- It is possible to easily manage the query of the use history of the electronic key, and the setting of the authentication authority, and the like by using the electronic key management system proposed in the present disclosure. As a result, it is possible to improve user convenience and security.
- In addition, it is possible to systematically manage the electronic keys using the electronic key storage device when it is necessary to store the plurality of keys, and easily perform the charging of the electronic keys and the collection of the use history (log information) during the process.
- The effects of the present disclosure are not limited to the above-mentioned effects, and other effects that are not mentioned may be obviously understood by those skilled in the art from the following description.
-
-
FIG. 1 is a block diagram schematically illustrating a configuration of an electronic key management system used in an embodiment of the present disclosure. -
FIG. 2 is a diagram schematically illustrating a configuration of a electronic locking device according to an embodiment of the present disclosure. -
FIG. 3 is a block diagram schematically illustrating a configuration of an electronic key according to an embodiment of the present disclosure. -
FIG. 4 is a block diagram illustrating a configuration of a user terminal according to an embodiment of the present disclosure. -
FIG. 5 is a block diagram illustrating a configuration of a management server according to an embodiment of the present disclosure. -
FIG. 6 is a block diagram schematically illustrating a configuration of an electronic key management system according to another embodiment of the present disclosure. -
FIG. 7 is a diagram illustrating an example of a screen displayed by the management server according to an embodiment of the present disclosure. -
FIG. 8 is a diagram illustrating an example of a screen displayed by the user terminal according to an embodiment of the present disclosure. - Since the present disclosure may be variously modified and have several exemplary embodiments, specific exemplary embodiments will be illustrated in the accompanying drawings and be described in detail in a detailed description. However, this is not intended to limit the present disclosure to specific embodiments, and can be understood to include all conversions, equivalents, or substitutes included in the technical spirit and technical scope of the present disclosure. In describing each drawing, similar reference numerals are used for similar components.
- The terms used in the present application are only used to describe specific embodiments, and are not intended to limit the present disclosure. Singular forms are intended to include plural forms unless the context clearly indicates otherwise. It will be further understood that the term "comprises" or "have" used in this specification, specifies the presence of stated features, numerals, steps, operations, components, parts mentioned in this specification, or a combination thereof, but do not preclude the presence or addition of one or more other features, numerals, steps, operations, components, parts, or a combination thereof.
- Unless indicated otherwise, it is to be understood that all the terms used in the specification including technical and scientific terms have the same meaning as those that are generally understood by those who are skilled in the art. Terms generally used and defined by a dictionary should be interpreted as having the same meanings as meanings within a context of the related art and should not be interpreted as having ideal or excessively formal meanings unless being clearly defined otherwise in the present disclosure.
- Hereinafter, preferred embodiments according to the present disclosure will be described in detail with reference to the accompanying drawings.
-
FIG. 1 is a block diagram schematically illustrating a configuration of an electronic key management system used in an embodiment of the present disclosure. - The electronic key management system may include a
key 200, auser terminal 400, and amanagement server 500. - The
electronic key 200 refers to a key for locking or unlocking anelectronic locking device 100. Theelectronic key 200 collects a use history and transmits the collected use history to the authorizeduser terminal 400 and themanagement server 500. - Here, the
electronic locking device 100 may be any one of a pad lock, a Europrofile double, a rim lock, a drawer lock, and a cam lock. - The
user terminal 400 provides an electronic key management service by accessing theelectronic key 200 and themanagement server 500 through a communication network. - The
user terminal 400 is installed with an application for providing the electronic key management service, and the user may use the electronic key management service through the installed application. Here, the electronic key management service refers to various services that may improve convenience and security in the use of theelectronic key 200, and includes log information (use history), authority setting, and the like. Here, the log information may be information on a time when theelectronic key 200 is put into theelectronic locking device 100 and is electrically connected to theelectronic locking device 100 and authentication success/failure. Authority setting is to set any one or more of a date, a time, and a day of the week in which theelectronic key 200 may perform authentication with theelectronic locking device 100. Accordingly, theelectronic key 200 may enable the electronic key to be activated only when the authority is set. The authority setting can be made through theuser terminal 400 and/or themanagement server 500 as described later. - To this end, the
user terminal 400 may be implemented as, for example, a smartphone, a PDA, a tablet PC, a notebook computer, a laptop computer, a personal computer, and electronic devices or similar devices capable of performing other communications, receiving user input, and outputting a screen. - The
management server 500 receives and stores electronic key-related information from one ormore user terminals 400 and/or electronic keys connected through a communication network, and provides various electronic key management services. In particular, themanagement server 500 may search, edit, delete, etc. stored information according to the request of theuser terminal 400, and grant a one-time unlocking authority to the electronic key. - The
management server 500 may be implemented as, for example, a workstation, a server, a general-purpose computer, an electronic device capable of performing other communication, or a similar device. - The communication network may be implemented using at least some of, for example, long term evolution (LTE), LTE-advanced (LTE-A), Wi-Fi, a local area network (LAN), a wide area network (WAN), code division multiple access (CDMA), time division multiple access (TDMA), wireless broadband (WiBro), and global system for mobile communications (GSM), and other communication methods developed in the past and present or available in the future. Hereinafter, for convenience, a communication network is not mentioned, and each component is described as if they directly communicate. In addition, each component may use different communication networks. For example, the
electronic key 200 and theuser terminal 400 may use a Wi-Fi communication method, and theuser terminal 400 and the server may use the long term evolution (LTE) communication method. -
FIG. 2 is a diagram schematically illustrating a configuration of the electronic locking device according to the embodiment of the present disclosure. - The
electronic locking device 100 includes a transmission/reception unit 112, anauthentication unit 114, acommand unit 116, and astorage unit 118. - When the
electronic key 200 is put into theelectronic locking device 100 and electrically contacts with theelectronic locking device 100, the transmission/reception unit 112 may receive unique ID (UID) data pre-stored in theelectronic key 200 or a one-time authentication ID (for example, ID of the electronic locking device). - The
authentication unit 114 performs authentication based on the UID data or the one-time authentication ID. When both the one-time authentication data and the UID data are retrieved, theauthentication unit 114 performs the authentication using the one-time authentication data. Here, the UID data is data for common authentication, while the one-time authentication data is data for one-time authentication that is assigned one-time from themanagement server 500 according to an administrator's approval. - In one embodiment, the
authentication unit 114 may compare the UID data pre-stored in theelectronic key 200 with authentication data (for example, the UID of the electronic key) pre-stored in theelectronic locking device 100, and perform the authentication on the UID data based on the comparison result. - That is, when it is determined that the UID data and the authentication data received from the
electronic key 200 are the same, theauthentication unit 114 may perform the authentication process on the UID data (authentication success), and when it is determined that the UID data and the authentication data are not the same, theauthentication unit 114 may not process the approval for the UID data (authentication failure). - In another modification, the
authentication unit 114 may perform primary authentication according to whether first authentication data pre-stored in theelectronic key 200 is matched, further receive encrypted data input by a button provided in theelectronic key 200, and determine whether pre-stored second authentication data is matched, thereby performing double authentication on the encrypted data. - The
authentication unit 114 may store and manage all log information related to authentication of the UID data and the one-time authentication data. - Here, the log information may include, for example, log information on whether the
electronic key 200 is authenticated, log information on an opening/closing time of theelectronic locking device 100 by the authenticatedelectronic key 200, log information on registration or change of the masterelectronic key 200, and log information on registration or change of a blacklist according to whether theelectronic key 200 is lost. - Here, when the
electronic key 200 is lost, the blacklist may be registered or changed by allowing themanagement server 500 receiving loss information of the electronic key 200 from the user terminal to match and store the UID data related to the lostelectronic key 200 with the loss information. - Specifically, when a user loses the
electronic key 200, he/she may input the loss information of theelectronic key 200 through theuser terminal 400 and transmits the input loss information to themanagement server 500, and themanagement server 500 may register or change the blacklist by matching and storing the lost information with UID data related to theelectronic key 200. Here, theuser terminal 400 may correspond to the mobile communication terminal, and the loss information may include the UID data of theelectronic key 200 and data on whether theelectronic key 200 is lost. - When an attempt is made to unlock the
electronic locking device 100 with theelectronic key 200, theauthentication unit 114 may receive the blacklist generated by themanagement server 500, from theelectronic key 200, determine whether theelectronic key 200 is registered in the blacklist, and maintain a locked state of theelectronic locking device 100 when it is determined that theelectronic key 200 is registered in the blacklist. In this case, theauthentication unit 114 may transmit to themanagement server 500 as a notification message that the attempt has been made to unlock theelectronic locking device 100 with theelectronic key 200. - On the other hand, when the user obtains the lost
electronic key 200, theuser terminal 400 may transmit the acquisition information of the lostelectronic key 200 to themanagement server 500. Accordingly, themanagement server 500 may change (delete) the blacklist corresponding to the acquired information. - Meanwhile, before the
authentication unit 114 performs the authentication, theelectronic key 200 may undergo a key activation operation. - For example, the
electronic key 200 may receive a password generated by the application from theuser terminal 400 through the wireless communication in the state in which theelectronic key 200 is connected to theuser terminal 400 on which an application for setting the input of the UID data is mounted before a terminal unit provided in a key head of theelectronic key 200 electrically contacts with a data communication unit of theelectronic lock device 100. - In this case, when a key value is input by a button provided on the
electronic key 200, theelectronic key 200 may determine whether the input key value matches the password, and may be activated when it is determined that the input key value matches the password. - That is, when the key value input by the user through the button is the same as the password received from the
user terminal 400, theelectronic key 200 may have a function of performing the authentication thereafter. - Alternatively, the
electronic key 200 may have a default value for key activation provided therein before the terminal unit provided in the key head of theelectronic key 200 electrically contacts with the data communication unit of theelectronic locking device 100. - In this case, when a key value is input by a button provided on the
electronic key 200, theelectronic key 200 may determine whether the input key value matches the default value, and may be activated when it is determined that the input key value matches the default value. - That is, when the key value input by the user through the button is the same as the default value, the
electronic key 200 may have a function of performing the authentication thereafter. - In an embodiment of the present disclosure, it is described that the
authentication unit 114 performs the key activation operation using theelectronic key 200, but the present disclosure is not limited thereto. Therefore, the key activation operation may also be performed through biometrics using fingerprints, blood vessels, irises, and the like. - When the double authentication for the UID data and the encrypted data is successfully performed, the
command unit 116 instructs theelectronic locking device 100 to be unlocked. - That is, the
command unit 116 may instruct theelectronic locking device 100 to be opened after all the authentication for the UID data in theauthentication unit 114 has passed. To this end, thecommand unit 116 may transmit a control signal related to unlocking to a driving unit of theelectronic locking device 100. - On the other hand, when the
authentication unit 114 fails to authenticate the UID data, thecommand unit 116 may instruct theelectronic locking device 100 to maintain the locked state. - The
storage unit 118 may store a list of identifiers (authentication data) of theelectronic key 200 capable of locking and unlocking itself in an internal memory of theelectronic locking device 100. As a result, according to an embodiment of the present disclosure, theelectronic locking device 100 may perform authentication through authentication of the UID data, thereby improving the security efficiency of theelectronic locking device 100. - On the other hand, according to an embodiment of the present disclosure, when the attempt is made to unlock the
electronic locking device 100 from the outside, information on who has accessed themanagement server 500 of theelectronic locking device 100 may be transmitted. -
FIG. 3 is a block diagram schematically illustrating a configuration of the electronic key according to the embodiment of the present disclosure. - Referring to
FIG. 3 , theelectronic key 200 includes acommunication unit 211, a transmission/reception unit 212, anauthentication unit 214, acontrol unit 216, and astorage unit 218. - The
communication unit 211 may include a module that transmits and receives information through a local area network such as Bluetooth. Thecommunication unit 211 may be connected to theuser terminal 400 and themanagement server 500 by wire or wirelessly to transmit log information L to theuser terminal 400 and/or themanagement server 500. - However, since the
electronic key 200 has a limitation in adding a communication module due to its volume constraint, when only a short-range communication module such as Bluetooth is added to theelectronic key 200, theelectronic key 200 may communicate with themanagement server 500 using theuser terminal 400 without directly communicating with themanagement server 500. - In an embodiment, the
communication unit 211 may be wirelessly connected to theuser terminal 400 by performing a pairing operation with theuser terminal 400 through Bluetooth. - The
communication unit 211 may receive a key access right from theuser terminal 400 or themanagement server 500. For example, thecommunication unit 211 may receive and store authentication data, such as UID data, one-time UID data, and one-time authentication data, for unlocking the electronic key from theuser terminal 400 or themanagement server 500. - In addition, the
communication unit 211 may transmit the key use history (log information) to theuser terminal 400 or themanagement server 500 in real time. - The transmission/
reception unit 216 may receive the unique ID (UID) data pre-stored in theelectronic locking device 100 when theelectronic key 200 is put into theelectronic locking device 100 and electrically contacts with theelectronic locking device 100, and may transmit the pre-stored UID or one-time authentication ID stored in advance in theelectronic key 200 to theelectronic locking device 100. In addition, when theelectronic key 200 stores the one-time authentication data, the transmission/reception unit 216 may transmit the one-time authentication data in preference to other data when theelectronic key 200 is put into theelectronic locking device 100 and electrically contacts with theelectronic locking device 100. The one-time authentication ID may be deleted when the contact with theelectronic locking device 100 is cut off. - The
authentication unit 214 performs authentication based on the UID data or the one-time authentication ID. When both the one-time authentication data and the UID data are retrieved, theauthentication unit 214 performs the authentication using the one-time authentication data. - The
control unit 216 controls thecommunication unit 211 and thestorage unit 218 to perform electronic key authentication and management. - When the
control unit 216 is put into theelectronic locking device 100 and electrically contact with theelectronic locking device 100, the contact time and the authentication success or failure may be stored in thestorage unit 218 to database the key use history. - When the
control unit 216 is put into theelectronic locking device 100 and electrically contacts with theelectronic locking device 100 to perform the authentication with theelectronic locking device 100, thecontrol unit 216 uses the one-time UID data to perform the authentication with theelectronic locking device 100 when the one-time UID data is received directly from themanagement server 500 or through theuser terminal 400. - In an embodiment, the
control unit 216 may store and manage information related to the authentication of the UID data and the one-time data during the authentication. - Meanwhile, before the
authentication unit 214 performs the authentication, theelectronic key 200 may undergo the key activation operation. Since the key activation operation is the same as the operation described inFIG. 2 , a detailed description thereof will be omitted. - In another embodiment of the present disclosure, it is described that the
authentication unit 214 performs the key activation operation using theelectronic key 200, but the present disclosure is not limited thereto. Therefore, the key activation operation may also be performed through biometrics using fingerprints, blood vessels, irises, and the like. - When the UID data is successfully authenticated, the
control unit 216 instructs theelectronic locking device 100 to be unlocked. - Here, the unlocking command of the
control unit 216 is the same or similar to the method performed by thecommand unit 116 of the electronic locking device 110 according to an embodiment of the present disclosure. As a result, in other embodiments of the present disclosure, a description thereof will be omitted. - Meanwhile, the
electronic key 200 may further include a battery. The battery may be a recharging type. As will be described later inFIG. 6 , the battery of theelectronic key 200 may be charged by the key storage device. - As described above, in another embodiment of the present disclosure, by performing the authentication using the UID data based on the wireless communication between the
electronic key 200 and theuser terminal 400, the electronic locking device may be unlocked by a simple and convenient authentication method, and furthermore, the security efficiency of the electronic locking device 110 may be improved. In addition, in another embodiment of the present disclosure, by performing the authentication using the one-time data based on the wireless communication between theelectronic key 200 and theuser terminal 400, the access right to theelectronic locking device 100 may be easily controlled by themanagement server 500. - The
electronic locking device 100 does not have a separate power supply, and temporarily receives power from the connection terminal of theelectronic key 200 through the connection terminal and thus unlocks theelectronic locking device 100. In this case, the connection terminal of theelectronic locking device 100 and the connection terminal of theelectronic key 200 may be in physical contact with each other to supply power as well as exchange identifiers (UIDs) of each other, thereby performing the primary authentication. - As a result, it is possible to lock and unlock the plurality of
electronic locking devices 100 with oneelectronic key 200. That is, the list of the identifiers of theelectronic key 200 that may lock and unlock itself is stored in the internal memory of theelectronic locking device 100, and the list of the identifiers of theelectronic locking device 100 that may be locked and unlocked is stored in the internal memory of theelectronic key 200, and thus the connection terminals come into contact with each other, thereby performing the primary authentication. - Since owning the
electronic key 200 is one authentication, it is possible to maintain higher security than the conventional electronic locking device such as a door lock that simply inputs a password. In particular, since such a small electronic locking device has a small volume and needs to be installed in several locations, a method of unlocking the lock while supplying power from theelectronic key 200 is very useful because there is no power supply inside theelectronic locking device 100. - In this case, in order to further enhance security, a secondary authentication means may be added to the
electronic key 200. InFIG. 2 , four key pads 260 are attached to theelectronic key 200, and the secondary authentication may be performed through the key pad 260. For example, numbers such as 1, 2, 3, and 4 are printed on the keypad 260, and the secondary authentication may be performed with a combination thereof. - In order for the user to perform the unlocking with the
electronic key 200, a power button of theelectronic key 200 is first pressed to turn on theelectronic key 200, and then a preset password is input to the keypad 260. When the password input by the user is the same as the password stored in the internal memory of theelectronic key 200, the information indicating that the second authentication using the password succeeds is notified through sound or a lamp, and then the double authentication may be performed in a manner that theelectronic locking device 100 is unlocked when a user makes theelectronic key 200 contact with theelectronic locking device 100. - Of course, in
FIG. 1 , the keypad 260 is shown to aid understanding of the disclosure. In addition, a fingerprint sensor may be added to theelectronic key 200, and the authentication using biometric information may be performed using a user's fingerprint. In addition, it is possible to perform the double authentication by adding various sensors to theelectronic key 200 and using these sensors. - However, since the
electronic key 200 has a limitation in the computational capability and the addition of the sensor due to the limitation of the volume, the communication module such as Bluetooth may be added to theelectronic key 200. In addition, the double authentication may be performed using an external device while theelectronic key 200 communicates with an external device such as a smartphone. - For example, a user may be authenticated through face recognition using a camera or voice recognition using a microphone on a smartphone. Only when such secondary authentication succeeds, the information indicating that the authentication succeeds with the
electronic key 200 on the smartphone may be transmitted. Next, the double authentication may be performed by the method of performing authentication with the contact of theelectronic key 200 with theelectronic locking device 100. The double authentication enhances the security. -
FIG. 4 is a block diagram illustrating a configuration of a user terminal according to an embodiment of the present disclosure. - Referring to
FIG. 4 , theuser terminal 400 may include aninput unit 410, adisplay unit 420, acommunication unit 430, astorage unit 440, and acontrol unit 450. - The
input unit 410 converts a user's input operation into an input signal and transmits the input signal to thecontrol unit 450. Theinput unit 410 may be implemented as, for example, a keyboard, a mouse, a touch sensor on a touch screen, a touch pad, a keypad, a voice input, and other input processing devices that are possible in the present, in the past, or in the future. - The
display unit 420 outputs a screen under the control of thecontrol unit 450. Thedisplay unit 420 may be implemented as, for example, a liquid crystal display (LCD), a light emitting diode (LED), an organic light emitting diode (OLED), a projector, and other display devices that are possible in the present, in the past, or in the future. Thedisplay unit 420 may display, for example, an interface page for providing information or an information providing result page. According to the embodiment, a component that uses other methods of transmitting information such as voice output or vibration instead of the screen output to other users may be used instead of thedisplay unit 420. - The
communication unit 430 exchanges data with themanagement server 500 and/or theelectronic key 200. - In an embodiment, the
communication unit 430 transmits the one-time authentication ID received from themanagement server 500 to thecontrol unit 450. In addition, thecommunication unit 430 transmits data to themanagement server 500 under the control of thecontrol unit 450. The communication technology used by thecommunication unit 430 may vary depending on the type of communication network or other circumstances. Thecommunication unit 430 may communicate with theelectronic key 200 through a first communication network, and communicate with themanagement server 500 through a second communication network. - The
storage unit 440 stores data under the control of thecontrol unit 450 and transmits the requested data to thecontrol unit 450. - The
control unit 450 controls the overall operation of theuser terminal 400 and each component. - When the
user terminal 400 transmits and receives data, it may be expressed that thecommunication unit 430 transmits and receives data under the control of thecontrol unit 450 according to the viewpoint, and it may be expressed that thecontrol unit 450 controls thecommunication unit 430 to transmit and receive data. - In particular, the
control unit 450 may transmit the one-time authentication ID request message to themanagement server 500 according to the information input from theinput unit 410. - In addition, the
control unit 450 may transmit the one-time authentication ID received from themanagement server 500 to theelectronic key 200. - As described above, when the
user terminal 400 transmits and receives data, it may be expressed that thecommunication unit 430 transmits and receives data under the control of thecontrol unit 450 according to the viewpoint, and it may be expressed that thecontrol unit 450 controls thecommunication unit 430 to transmit and receive data. -
FIG. 5 is a block diagram illustrating a configuration of a management server according to an embodiment of the present disclosure. - Referring to
FIG. 5 , themanagement server 500 may include adisplay unit 520, acommunication unit 530, astorage unit 540, and acontrol unit 550. In an embodiment of the present disclosure, it is disclosed that the management server includes thedisplay unit 520, thecommunication unit 530, thestorage unit 540, and thecontrol unit 550, but some of these may be implemented as physically distinguished devices. For example, thedisplay unit 520 may be implemented as a separate monitor or an external terminal such as a manager terminal. - The
display unit 520 outputs the screen under the control of thecontrol unit 550. Thedisplay unit 520 may be implemented as, for example, a liquid crystal display (LCD), a light emitting diode (LED), an organic light emitting diode (OLED), a projector, and other display devices that are possible in the present, in the past, or in the future. Thedisplay unit 520 may display, for example, the interface page for providing the information or the information providing result page. According to the embodiment, the component that uses other methods of transmitting information such as voice output or vibration instead of the screen output to other users may be used instead of thedisplay unit 520. - As in the description with reference to
FIG. 7 to be described later, thedisplay unit 520 may display the pre-stored location of theelectronic locking device 100 on a map. Thedisplay unit 520 displays the location of theelectronic locking device 100 and the current state (including the charging state, the connection state, and the like of the electronic key) of theelectronic locking device 100 on the map in real time. Thedisplay unit 520 may display the location of the locking device on the map in different colors according to the current state. Accordingly, the user may intuitively grasp the location and current state of the locking device by checking the map. - The
communication unit 530 exchanges data with theuser terminal 400 and/or theelectronic key 200. - In an embodiment, the
communication unit 530 receives log information from theelectronic key 200 and/or theuser terminal 400 and transmits the log information to thestorage unit 540. - In an embodiment, the
communication unit 530 may receive one-time authentication request information from theelectronic key 200 and/or theuser terminal 400 to transmit the received one-time authentication request information to thecontrol unit 550. The communication technology used by thecommunication unit 530 may vary depending on the type of communication network or other circumstances. - The
storage unit 540 stores data under the control of thecontrol unit 550 and transmits the requested data to thecontrol unit 550. - The
control unit 550 controls the overall operation of themanagement server 500 and each component. In particular, as described later, thecontrol unit 550 may transmit the one-time authentication ID request message to themanagement server 500 according to the information input from the input unit (not illustrated), and transmit the one-time authentication ID received from themanagement server 500 to theelectronic key 200. - When the
control unit 550 receives a signal from theelectronic key 200 without the unlocking authority that is put into theelectronic locking device 100 and electrically contacts with theelectronic locking device 100, thecontrol unit 550 displays the location of the correspondingelectronic locking device 100 on the display device. Here, the absence of the unlocking authority means the electronic key that does not have the UID corresponding to theelectronic locking device 100. In this way, the location of theelectronic locking device 100 into which theelectronic key 200 without the unlocking authority is put is displayed differently from the location of theelectronic locking device 100 into which theelectronic key 200 is not put. For example, the location of theelectronic locking device 100 to which theelectronic key 200 is not put is indicated in black. The location of theelectronic locking device 100 into which theelectronic key 200 without the unlocking authority is put may be indicated in red. The one-time authentication may be performed by selecting (clicking the mouse or touching the touch panel) theelectronic locking device 100 indicated in red. That is, thecontrol unit 550 generates the one-time authentication ID for the selectedelectronic locking device 100 and the one-time authentication data, and transmits the generated one-time authentication ID and one-time authentication data to theelectronic key 200 and theelectronic locking device 100 through thecommunication unit 530. - Data for the one-time authentication is implemented such that the authentication authority disappears when the corresponding
electronic locking device 100 and theelectronic key 200 are separated. For example, the one-time authentication ID and one-time authentication data stored in theelectronic key 200 and theelectronic locking device 100 may be implemented to be deleted after one-time authentication. - In another embodiment, the
control unit 550 may set the authority for the authentication stored in theelectronic key 200. - The
control unit 550 may transmit information for setting any one or more of a date, a time, and a day of the week of theelectronic key 200 to theelectronic key 200 directly or through theuser terminal 400 according to the input through the input unit (not illustrated) for setting the authentication authority. Accordingly, theelectronic key 200 may enable the electronic key to be activated only when the authority is set. -
FIG. 6 is a block diagram schematically illustrating a configuration of an electronic key management system according to another embodiment of the present disclosure. - The electronic key management system may include the
electronic locking device 100, theelectronic key 200, the electronickey storage device 300, theuser terminal 400, and themanagement server 500. - Since the
electronic key 200, theuser terminal 400, and themanagement server 500 are the same as those described inFIG. 1 , a detailed description thereof will be omitted. - The
electronic locking device 100 includes not only drawers, cabinets, storage boxes, and safes, but also CCTV or traffic signal control panel doors, communication company's repeater enclosure doors, communication base stations, entrance doors of police station/military unit/armory/ammunition locker, an ARM device, a lading box logistics vehicle, and the like. - Such an
electronic locking device 100 does not have a separate power source, and temporarily receives power from the connection terminal (not illustrated) of theelectronic key 200 through the connection terminal (not illustrated), thereby unlocking theelectronic locking device 100. In this case, the connection terminal of theelectronic locking device 100 and the connection terminal of theelectronic key 200 may be in physical contact with each other to supply power as well as exchange identifiers (UIDs) of each other, thereby performing the authentication. - Since such a small electronic locking device has a small volume and needs to be installed in several locations, the
electronic locking device 100 does not have a power supply provided therein, and the method of unlocking anelectronic locking device 100 while receiving power from theelectronic key 200 is very useful. - The electronic
key storage device 300 may transmit and receive information through the communication network with themanagement server 500. For example, the electronickey storage device 300 may transmit the history of the electronic key inserted into the key hole to be described later and/or the charging information of the fastened electronic key to themanagement server 500 in real time. In addition, the electronickey storage device 300 may receive the access authority information on the electronic locking device for each electronic key or may download firmware update information of the electronic key storage device. The electronickey storage device 300 may notify themanagement server 500 when it is confirmed that the unlocking attempt is made by the electronic key without the unlocking authority. Themanagement server 500 transmits a message notifying the unlocking attempt without the unlocking authority to the pre-registered terminal when the unlocking attempt is confirmed with the electronic key without the unlocking authority. In this case, the pre-registered terminal may be an administrator or an external terminal registered by the administrator. - The electronic
key storage device 300 includes a plurality of key holes and a key holder fastened with theelectronic key 200 carried into the key hole. - The electronic
key storage device 300 can store theelectronic key 200 by inserting theelectronic key 200 into each hole. For example, 25 key holes 330 may be provided, but the number of key holes 330 is not limited thereto. When the key is carried into the key hole 330, theelectronic key 200 may be charged. - The electronic
key storage device 300 also controls theelectronic key 200 to be fastened and unfastened with and from the key holder according to the access authority (accessible electronic key/accessible time) to theelectronic key 200 set in advance. In addition, the electronickey storage device 300 charges the fastenedelectronic key 200. - In another embodiment, the electronic
key storage device 300 may receive and store the log information from the fastenedelectronic key 200. - The electronic
key storage device 300 may receive the password when releasing theelectronic key 200 fastened by the user and withdrawing theelectronic key 200, and unfasten the correspondingelectronic key 200 only when the input password matches the password stored by matching the correspondingelectronic key 200. - In addition, the electronic
key storage device 300 may change the color of the state display unit provided around the key holder according to whether the user has the access authority through the password authentication. For example, the state display unit 340 around the key hole 330 that matches the key available to the user may be displayed in blue, and the state display unit 340 around the key hole 330 matching the key that is not available may be displayed in red. This makes it possible to easily identify a key that a user may use and a key hole to be returned. - In addition, when the pre-stored password is input, the electronic
key storage device 300 may output the information on the location of the key hole with which theelectronic key 200 matching the input password is fastened. For example, it is possible to turn on the LED provided in the location of the key hole. - The electronic
key storage device 300 may further display the charging state through the state display unit. For example, when theelectronic key 200 is being charged, when the charging is completed, the state may be guided to the user in color by distinguishing reading/writing of data, and the like. -
FIG. 7 is a diagram illustrating an example of a screen displayed by the management server according to the embodiment of the present disclosure. - Referring to
FIG. 7 , the management server displays the locations of a plurality of electronic locking devices on a map. - Each electronic locking device reflects and displays the current state in real time. Each of the electronic locking devices displays whether or not an electronic key is put and electrically connected to the electronic locking device. The state may be displayed differently in color and/or image. For example, the state in which the electronic key is connected may be displayed in red, and the state in which the electronic key is not connected may be displayed in blue.
- In addition, the management server may further display statistical information according to the pre-stored state of the electronic locking device in a separate area. For example, the number of electronic locking devices in the locked state, the number of electronic locking devices in the unlocked state, the number of electronic locking devices to which the electronic key is connected, and the number of electronic locking devices to which the blacklist electronic key is connected may each be displayed.
-
FIG. 8 is a diagram illustrating an example of a screen displayed by the user terminal according to the embodiment of the present disclosure. - Referring to
FIG. 8 , the user terminal may include a connectioninformation display unit 810 with a server, a discoveringbutton 820, apairing button 830, a signalquality display unit 840, and akey list 850 on the display screen. - The access
information display unit 820 displays the screen that displays the connection status with the management server by selecting and changing the connection and disconnection with the server each time the screen is clicked. When the connection state with the server is changed, the state change is displayed in color or the like. For example, when the connection succeeds, the button may be displayed in blue. - The discovering
button 820 is a button for selecting a search for an electronic key in a communication range that is not initially connected to the user terminal and the electronic key. When the discoveringbutton 820 is selected, the list of electronic keys in the communication range is displayed on thekey list 850. - The
pairing display unit 830 is a button for instructing the electronic key to be paired with the selected electronic key among the electronic keys displayed on thekey list 850. - The signal
quality display unit 840 may display the quality of the paired signal. - The
key list 850 may display an ID of an electronic key according to a condition selected according to the discoveringbutton 820 and thepairing button 830. - An attempt to carry out the electronic key other than the carrying out date and time of the electronic key of the input electronic key according to this electronic key storage device may be prevented.
- In addition, it is possible to systematically manage the electronic keys using the electronic key management system, and easily perform the charging of the electronic keys and the collection of the use history (log information) during the process. In addition, it is possible to easily set and change the authentication authority of the electronic key. In addition, it is possible to easily perform the electronic key management through the UI of the user terminal.
- Although the embodiments of the present disclosure has been described with reference to the accompanying drawings, those skilled in the art will appreciate that various modifications and alterations may be made without departing from the spirit or essential feature of the present disclosure. Therefore, it is to be understood that the embodiments described above are illustrative rather than being restrictive in all aspects.
Claims (11)
- An electronic key management system, comprising:an electronic key configured to lock and unlock an electronic locking device;an electronic key storage device configured to include a plurality of key holes and a key holder fastened with the electronic key carried into the key hole, and control the key holder according to a preset electronic key access right;a management server configured to set an access right to the electronic locking device of the electronic key, transmit a one-time authentication ID to the electronic key that is put into the electronic locking device and electrically connected to the electronic locking device, and receive log information of the electronic key on the electronic locking device in real time; anda user terminal configured to transmit and receive the log information and the one-time authentication ID between the electronic key and the management server, and display real-time log information.
- The electronic key management system of claim 1, wherein the management server transmits one-time authentication data corresponding to the one-time authentication ID to the electronic locking device through the electronic key.
- The electronic key management system of claim 1, wherein the management server stores any one or more of location information of the plurality of electronic locking devices and current state information of the electronic locking device, and displays the location information and the current state information through a display unit.
- The electronic key management system of claim 3, wherein the management server displays locations of the electronic locking devices into which the electronic key without unlocking authority is put on the display unit on which the locations of the plurality of electronic locking devices are displayed, differently from other electronic locking devices.
- The electronic key management system of claim 4, wherein the management server transmits the one-time authentication ID corresponding to the one-time authentication data to the electronic locking device into which the electronic key without the unlocking authority displayed on the display unit differently from the other electronic locking devices is put and the put electronic key, respectively, when an administrator's approval is input.
- The electronic key management system of claim 1, wherein the electronic key deletes the one-time authentication ID after receiving the one-time authentication ID and unlocking the electronic locking device.
- The electronic key management system of claim 1, wherein the management server transmits a message notifying an unlocking attempt without unlocking authority from the electronic locking device to at least one of a pre-registered administrator or a pre-registered external terminal when the unlocking attempt by the electronic key without the unlocking authority is confirmed.
- An electronic key management server, comprising:a communication unit configured to transmit and receive an electronic key and information;a storage unit configured to store log information received from the electronic key; anda control unit configured to set an access right to an electronic locking device of the electronic key, and set a one-time authentication authority for the electronic key that is put into the electronic locking device and electrically connected to the electronic locking device,wherein the control unit controls to transmit a one-time authentication ID generated according to the one-time unlocking authority setting to the electronic key.
- The electronic key management system of claim 8, wherein the storage unit stores locations of a plurality of electronic locking devices, and further includes a display unit for displaying at least one of current state information of the electronic locking device received through the communication unit and a location of the electronic locking device.
- The electronic key management system of claim 8, wherein the control unit sets an authentication authority of the electronic key, and
the authentication authority includes at least one of a date, a time, and a day of the week in which authentication execution is possible. - The electronic key management system of claim 8, wherein the control unit transmits one-time authentication data corresponding to the one-time authentication ID to the electronic locking device through the electronic key.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20190138472 | 2019-11-01 | ||
PCT/KR2020/015174 WO2021086161A1 (en) | 2019-11-01 | 2020-11-02 | Electronic-key management system and server |
Publications (2)
Publication Number | Publication Date |
---|---|
EP4053806A1 true EP4053806A1 (en) | 2022-09-07 |
EP4053806A4 EP4053806A4 (en) | 2024-04-03 |
Family
ID=75915224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20866925.9A Pending EP4053806A4 (en) | 2019-11-01 | 2020-11-02 | Electronic-key management system and server |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP4053806A4 (en) |
KR (1) | KR102654312B1 (en) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008130000A1 (en) * | 2007-04-16 | 2008-10-30 | Tokai Riken Co., Ltd. | Key management box |
WO2015177624A2 (en) * | 2014-05-19 | 2015-11-26 | Acsys Ip Holding Inc. | Mobile key devices systems and methods for programming and communicating with an electronic programmable key |
KR101788121B1 (en) * | 2015-04-14 | 2017-10-20 | 동서대학교산학협력단 | Locker Integrated Management System |
KR101834337B1 (en) * | 2015-06-15 | 2018-03-05 | 김범수 | Electronic key and electronic locking apparatus of dual-authentication |
JP6762552B2 (en) * | 2016-06-03 | 2020-09-30 | 東海理研株式会社 | Electronic lock system |
CN107633584B (en) * | 2017-10-09 | 2024-01-12 | 雅固拉国际精密工业(苏州)有限公司 | Intelligent access control system for industrial and commercial storage cabinet and control method thereof |
KR102501245B1 (en) * | 2018-02-14 | 2023-02-17 | 삼성전자주식회사 | Method and electronic device for providing key |
KR102540090B1 (en) * | 2018-03-06 | 2023-06-05 | 삼성전자주식회사 | Electronic device and method for managing electronic key thereof |
KR101976644B1 (en) * | 2018-11-13 | 2019-05-09 | 주식회사 한줌 | System for security storage tray using authentication key, and operating method thereof |
-
2020
- 2020-11-02 EP EP20866925.9A patent/EP4053806A4/en active Pending
- 2020-11-02 KR KR1020200144720A patent/KR102654312B1/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
KR20210053254A (en) | 2021-05-11 |
KR102654312B1 (en) | 2024-04-03 |
EP4053806A4 (en) | 2024-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9675152B2 (en) | Electronic security bag controlled by mobile phone | |
US20220070268A1 (en) | Firearm authentication and tracking system | |
US10964141B2 (en) | Internet-of-things (IoT) enabled lock with management platform processing | |
CN111210549A (en) | Key management method, device and system | |
CN105459956A (en) | Vehicle door unlocking control device and method and vehicle | |
EP3779742B1 (en) | Method and system for authenticating electronic lock device based on usage pattern | |
CN111768517A (en) | Door lock control system, method and device of logistics object management device and electronic equipment | |
CN110517384A (en) | A kind of key management box | |
KR200478030Y1 (en) | A Remote Lock System using Wireless Communications | |
KR100722990B1 (en) | System for controlling opening/locking of door using mobile terminal and recording-medium storing the controlling method | |
KR100894421B1 (en) | Fingerprint authentication terminal, access control system thereof, and user authentication method | |
EP4053806A1 (en) | Electronic-key management system and server | |
US20210398375A1 (en) | Electronic key management system and server | |
CN210038899U (en) | Intelligent lock | |
US11544980B2 (en) | Electronic key storage device | |
KR102010270B1 (en) | Mobile device storage box and system using the same | |
KR20150039955A (en) | A Remote Lock System using Wireless Communications | |
EP4141827A1 (en) | Electronic key interlocked with smart device | |
CN109615737B (en) | Management method for one-time unlocking | |
JP2002070377A (en) | Electronic lock control system | |
KR20050015000A (en) | Door lock system and operating method using a mobile terminal | |
KR102546283B1 (en) | Apparatus for storing electronic key | |
CN205632405U (en) | Locking control device and vehicle are separated to door | |
WO2003071470A1 (en) | Fingerprint recognition door lock system | |
CN109300256A (en) | A kind of multi-mode radio intelligent and safe storage cabinet system and the method for accessing cargo |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20210330 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20240305 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G07C 9/00 20200101AFI20240228BHEP |