EP4264578A2 - Dispositif de serrure électronique, en particulier d'un coffre-fort à clé, et procédé pour faire fonctionner ce dispositif de serrure électrique - Google Patents

Dispositif de serrure électronique, en particulier d'un coffre-fort à clé, et procédé pour faire fonctionner ce dispositif de serrure électrique

Info

Publication number
EP4264578A2
EP4264578A2 EP21839982.2A EP21839982A EP4264578A2 EP 4264578 A2 EP4264578 A2 EP 4264578A2 EP 21839982 A EP21839982 A EP 21839982A EP 4264578 A2 EP4264578 A2 EP 4264578A2
Authority
EP
European Patent Office
Prior art keywords
data
lock
sensor
locking
signals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21839982.2A
Other languages
German (de)
English (en)
Inventor
Tobias STÖTTER
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smart Access Solutions GmbH
Original Assignee
Smart Access Solutions GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smart Access Solutions GmbH filed Critical Smart Access Solutions GmbH
Publication of EP4264578A2 publication Critical patent/EP4264578A2/fr
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
    • G07C2009/00373Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit whereby the wake-up circuit is situated in the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00507Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
    • G07C2009/00539Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function anti-theft
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • G07C2009/00642Power supply for the lock by battery
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C2009/00746Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys by knocking on a surface for inputting the code, e.g. detecting a series of taps on a surface
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00777Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by induction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/00936Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for key cabinets

Definitions

  • Electronic lock device in particular a key safe, and method for operating the electric lock device
  • the present invention relates according to claim 1 to an electronic lock device, according to claim 40 to a method for operating the electronic lock device, according to claim 41 to a computer program product for executing the method according to claim 40 and to a system according to claim 42:
  • the key safes usually consist of a metal cylinder that is fixed in the masonry. The closure is then attached from the front.
  • the actual lock in the lock consists of a standard half cylinder. However, there are a wide variety of variants with one or more locking pins.
  • the object/key to be protected is in turn attached to the lock so that it can be removed together with the lock after opening the lock.
  • Either the key to be protected is so firmly connected to the lock that it cannot be separated from the cover.
  • an electronic lock device for locking a container in particular for retrofitting a key safe, according to claim 1.
  • the lock device according to the invention preferably has at least: An electrically operable actuator for transferring the electric lock device from a closed configuration to an open configuration, it being possible for the actuator to cause at least one locking element of a locking device to move from a bolt receptacle to an area outside of the bolt receptacle or for transferring the electric lock device from an open configuration into a closed configuration, it being possible for the actuator to cause the at least one locking element of the locking device to be moved from the area outside the bolt receptacle into the bolt receptacle.
  • the lock device according to the invention preferably has a near-field data transmission device for receiving data from at least one mobile terminal device that is temporarily located within a defined distance range from the electronic lock device and for sending data, in particular access data, to the at least one mobile terminal device that is located within a defined distance range from the electronic lock device temporarily located mobile terminal on.
  • the electronic lock device according to the invention preferably has a memory unit for at least temporarily storing time data and/or access data.
  • the time data preferably have at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data preferably has at least authorization data and identification data, the authorization data preferably defining which identification data the actuator uses to convert the lock device from the closed configuration into the open configuration. Enter the identification data preferably an assignment to the mobile device.
  • the lock device according to the invention preferably has a processor device for comparing the authorization data and the identification data. In the case of a positive comparison, the actuator can preferably be controlled by the processor device to open the lock device, with a positive comparison representing a defined match of the compared data.
  • This solution is advantageous because a digitally controllable electric lock device is provided.
  • the lock device according to the invention preferably additionally or alternatively has at least one sensor device for detecting at least one movement of the lock device and for generating sensor signals and/or sensor data as a function of the detected movement. Additionally or alternatively, the lock device according to the invention preferably has at least one energy source other than a fixed current connection for operating at least the actuator and/or the near-field data transmission device and/or the memory unit and/or the processor device and/or the sensor device.
  • the lock device according to the invention preferably has at least one control device for activating one or more device(s) that are deactivated in an idle state.
  • the device deactivated in the idle state is preferably at least one or more of the following devices: the actuator and/or the near-field data transmission device and/or the memory unit and/or the processor device.
  • the control device is preferably connected to the sensor device at least via a signal and/or data connection. Sensor data or sensor signals generated by the sensor device can preferably be transmitted to the control device via the signal and/or data connection. At least one deactivated device can be activated by the control device, preferably depending on the sensor data or sensor signals.
  • This solution is advantageous as it provides an electronic lock device that is very energy efficient.
  • the space available for an electronic lock device is very limited.
  • Such key safes usually have a diameter of less than 10 cm or less than 8 cm or less than 7.5 cm or less than 7 cm or less than 6.5 cm or less than 6cm or less than 5.5cm or less than 5cm or less than 4.5cm.
  • the installation space that can be provided for an energy source, in particular an electric battery, in particular a lithium-ion battery is therefore very small.
  • Such electric lock devices are usually only operated a few times a year, in particular in many cases only once every few years (more than 2 years).
  • the present solution makes it possible to significantly reduce the power consumption by switching off a large number of electrical consumers or by transferring a large number of electrical consumers to an idle state.
  • Deactivated describes a state in which the respective device in a defined period of time, in particular 1 second or 1 minute or 1 hour or 1 day, less than 20%, in particular less than 10% or less than 5% or less than 1% or consumes less than 0.5% or less than 0.05% of the electrical energy required in normal operation, in particular in the same period of time, of the respective device.
  • the senor device and the control device can also be connected to one another by means of a power supply connection.
  • the sensor device can preferably be activated by the control device at predetermined time intervals for a predefined period of time.
  • the senor device is permanently active, in particular is connected directly to the energy source via a power connection.
  • the sensor device and the control device are preferably only connected to one another via a signal and/or data connection.
  • the control device can be equipped with one or more, in particular all, of the devices: actuator for converting the electric lock device from a closed configuration into an open configuration or from an open configuration into a closed configuration, the near-field data transmission device, the memory unit and/or the processor device via a or more signal and / or data connection / s be connected.
  • one or more, in particular all, of the device/s: actuator for converting the electric lock device from a closed configuration into an open configuration or from an open configuration into a closed configuration, the near-field data transmission device, the storage unit and/or of the processor device are each directly or indirectly connected to the energy source.
  • the actuator for transferring the electrical is therefore preferred Lock device from a closed configuration to an open configuration or from an open configuration to a closed configuration directly or indirectly connected to the energy source and/or the near-field data transmission device is preferably directly or indirectly connected to the energy source and/or the storage unit is preferably directly or indirectly connected connected to the energy source and/or the processor device is preferably connected directly or indirectly to the energy source.
  • actuator for converting the electric lock device from a closed configuration into an open configuration or from an open configuration into a closed configuration is/are connected to the control device via one or more signal and/or data connection(s) and via one or more power connection(s).
  • the actuator for transferring the electric lock device from a closed configuration to an open configuration or from an open configuration to a closed configuration is therefore preferred directly or indirectly via one or more signal and/or data connection(s) and/or a power connection to the control device and/or the near-field data transmission device is preferably connected directly or indirectly via one or more signal and/or data connection(s) and/or a power connection to the control device and/or the storage unit is preferably directly or indirectly connected via one or more signal and/or or data connection(s) and/or a power connection to the control device and/or the processor device is preferably directly or indirectly connected to the control device via one or more signal and/or data connection(s) and/or a power connection tied.
  • the control device is preferably an ultra-low power unit or ultra-low power processor.
  • An ultra low power unit preferably consists of few components. Basically, it preferably consists of just a quartz or better a real-time clock as a clock generator and a few logic components that can perform a defined action, e.g. if an IO port changes from high to low because a sensor has hit.
  • An ultra-low power unit can already be built into a processor as a "sub-module".
  • An example of such a processor is the ESP32 (https://www.macnica.eu/de/knowledge- base/hi-q-news/2018-06-15-das-ultra-low-power-management-des-esp32 ).
  • At least the actuator and the near-field data transmission device are in the idle state deactivated, preferably at least the actuator, the near-field data transmission device and the memory unit are deactivated in the idle state.
  • This embodiment is advantageous because the actuator and the near-field data transmission device cause a significant proportion of the total power consumption in the operating state and therefore switching them off or switching them to the idle state significantly relieves the load on the energy source.
  • the actuator In the idle state, therefore, preferably less than the energy required to operate the actuator is provided to the actuator and/or the energy required to operate the near-field data transmission device is provided to the near-field data transmission device and/or the energy required to operate the memory unit is provided to the memory unit and/or the energy required to operate the processor device provided to the processor device.
  • an elongate body having a first end and a second end spaced apart from the first end in the longitudinal direction of the body, the first end having an actuating device for moving the body, wherein in the longitudinal direction the actuator, the near-field data transmission device, the memory unit, the processor device, the energy source, the control device, the sensor device and a locking device that can be moved by the actuator are arranged at a distance from the actuating device.
  • the actuator, the near-field data transmission device, the memory unit, the processor device, the sensor device and the energy source are connected at least indirectly and preferably directly to the base body, in particular forming a common assembly.
  • At least one locking element of the locking device is preferably provided in the area of the first end of the base body, in particular closer to the first end than to the second end of the base body.
  • the base body preferably forms a front cover for covering a container, in particular a safe, or has a front cover for covering the container, in particular the safe.
  • This embodiment is advantageous because the electric lock device can thereby have a very compact design. Furthermore, at least in a closed configuration, i.e. when the locking device locks a container, the electrical components are arranged inaccessible and therefore protected from the weather and vandalism.
  • the actuating device is designed for manually applying forces to the base body in order to move the base body relative to the environment.
  • This embodiment is advantageous because operators can directly interact mechanically with the electric lock device.
  • the actuating device is preferably freely accessible or not covered by another cover or protective device or flap or lid.
  • the sensor device has at least one acceleration sensor, the acceleration sensor being designed to output acceleration signals and/or acceleration data as a function of forces introduced via the actuating device.
  • This embodiment is advantageous because defined movements can be introduced into the electric lock device via the actuating device. Due to the fact that the sensor device forms an assembly together with the base body or the actuating device or is part of a joint assembly, movements that can be introduced into the base body via the actuating device can be detected by the sensor device.
  • the actuating device is plate-like, in particular flat and with a roughness RA ⁇ 25 pm, and preferably serves to manually initiate knocking impulses.
  • This embodiment is advantageous because due to the planar design of the actuating device, forces can be introduced into the electric lock device preferably exclusively in the longitudinal direction of the actuating device. This prevents vandalism or incorrect operation to a high degree.
  • control device is configured to activate one or more or all of the deactivated devices depending on a predetermined code, the code consisting of at least one sequence of acceleration signals and/or acceleration data, the control device for checking the Acceleration signals and/or acceleration data emitted by the acceleration sensor can be evaluated.
  • This embodiment is advantageous because the electric lock device can be switched from the idle mode to the operating mode by means of a predefined header sequence. This is also advantageous since the operator does not need any additional mechanical keys, which means that complex key management with regard to the mechanical keys can be dispensed with, which means that high costs can be avoided, particularly in an overall system with a large number of locking devices. Furthermore, the current valid knocking sequence of an operator in advance or via a mobile device, such as a tablet PC, laptop, smartwatch or mobile phone, electronically transmittable.
  • the tapping sequence can be, for example, short-short-short-long-long-short or short-medium-long-short-medium-long.
  • “Short”, “medium” and “long” stand for the time intervals between two shocks (knock impulses).
  • the parameter vibration strength can be included, which can be defined, for example, by “weak”, “medium” and “strong”. "Weak”, “medium strong” and “strong” each stand for a vibration strength (knock impulse strength), in particular in a strength range. From this, for example, tapping sequences such as strong-weak-strong-strong-medium can be implemented.
  • the parameters "time” and “strength” can be combined, whereby more complex tapping sequences such as weak/medium-strong/medium-strong/long can be defined.
  • the sensor device has at least one position sensor, in particular a gyroscope, for detecting one or more rotary movements.
  • a position sensor in particular a gyroscope
  • This embodiment is advantageous because it allows rotations of the electric lock device to be detected. These rotations can preferably be detected in addition to or as an alternative to the vibrations (knock impulses).
  • the actuating device has at least one lever element, in particular a handle; for at least partial rotation of the base body and is preferably used for manual initiation of rotational movements.
  • This embodiment is advantageous because it allows the lock device to be rotated about its longitudinal axis. This can be done in addition to or as an alternative to the vibrations (knock impulses).
  • the control device is configured to activate one or more or all of the deactivated devices depending on a predetermined code.
  • the code has or consists of at least one sequence of position signals and/or position data, it being possible for the control device to evaluate position signals and/or position data output by the position sensor to check the code.
  • This embodiment is advantageous because the electric lock device can be transferred from the idle mode to the operating mode by means of a predefined rotation sequence. This is also advantageous since the operator does not need any additional mechanical keys, which means that complex key management with regard to the mechanical keys can be dispensed with, which means that high costs can be avoided, particularly in an overall system with a large number of locking devices.
  • the currently valid rotation sequence electronically transmittable to an operator in advance or via a mobile terminal such as a tablet PC, laptop, smartwatch or mobile phone.
  • the rotation sequence can be, for example, 30° left - 40° right - 30° left or 90° left - defined pause - 10° left - 20° right - defined pause - 80° right.
  • a period of time which is defined by a minimum duration and/or a maximum duration is preferably assessed as a “defined break”.
  • the electric lock device can also have the acceleration sensors for detecting vibrations (knocking impulses). Then, for example, combined rotation/tapping sequences such as “30° left, weak/medium, long, 40° right” are possible.
  • the near-field data transmission device can be activated by the control device as a result of checking the code, with the near-field data transmission device being able to receive signals and/or data for opening the lock device, with the near-field data transmission device for sending and receiving signals and/or data via radio, in particular Bluetooth, WLAN, ZigBee, Z-Wave or NFC.
  • This embodiment is advantageous because the near-field data transmission device for receiving the opening commands is preferably only activated when the correct sequence has been detected. This leads to a very safe and cost-effective method, since the operator must first know the sequence (wake-up sequence, i.e. rotation sequence and/or knock sequence) and then have a mobile terminal that must be configured to send the opening commands.
  • At least one directional antenna is provided, the directional antenna for transmitting energy / data and / or signals to a preferably passive NFC tag, in particular RFID tag, and / or for receiving Energy / data and / or signals from the RFID tag is provided.
  • the directional antenna is particularly preferably connected to the processor device. Data and/or signals from the NFC tag, in particular RFID tag, can preferably be fed to the processor device via the directional antenna up to a maximum distance between the NFC tag, in particular the RFID tag, and the directional antenna, with the maximum distance preferably being less than 30mm, in particular less than 20mm or less than 10mm.
  • the data and/or signals from the NFC tag in particular the RFID tag, preferably represent at least position signals and/or position data, with the position signals and/or position data preferably representing a target alignment of the lock device and/or the data and/or signals from the NFC tag, in particular the RFID tag, at least represent installation data, with the installation data assigning the Lock device to the NFC tag, especially RFID tag, can be evaluated.
  • This solution is advantageous because it ensures that the locking device is always correctly aligned in the operating state. Furthermore, it can be checked whether the lock device is installed at all.
  • an elongate body having a first end and a second end spaced from the first end in the longitudinal direction of the body.
  • the actuator, the near-field data transmission device, the memory unit, the processor device, the locking device, the energy source and the directional antenna are preferably connected at least indirectly and preferably directly to the base body, in particular these devices form a common assembly.
  • the directional antenna is particularly preferably arranged for the transmission of energy and/or data and/or signals in the radial direction of the base body.
  • At least one locking element of the locking device is preferably provided in the region of the first end of the base body, in particular at a closer distance from the first end than from the second end of the base body.
  • the base body preferably forms a front cover for covering a container, in particular a safe, or has a front cover for covering the container, in particular the safe.
  • the first end, in particular the front cover has an actuating device for moving the base body, with the actuator, the near-field data transmission device, the memory unit, the processor device, the energy source, the directional antenna and the locking device being arranged at a distance from the actuating device in the longitudinal direction.
  • This embodiment is advantageous because a movement of the base body also causes a movement of the directional antenna, whereby a defined alignment of the Components of the lock device is specified compared to the environment.
  • the directional antenna is an inductive element.
  • the directional antenna is preferably arranged or formed in conductor tracks of the circuit board.
  • the directional antenna is integrated into or arranged on the peripheral wall of the base body.
  • the antennas of the lock body or the lock device and the NFC tag, in particular the RFID tag are particularly preferably inductive elements (so-called air coils), which are not only technically (frequency) but also geometrically matched to one another, so that a Data transfer between these two can take place.
  • the antennas are at a defined angle, in particular less than +/- 45°, in particular less than +/- 30° or less than +/- 20° or less than + /- 10° or less than +/- 5° or less than +/- 2° to each other. In the ideal case, the antennas lie completely flat on top of each other.
  • the locking element is designed as a locking pin.
  • the directional antenna is arranged at a defined angle to the locking pin, wherein the directional antenna is oriented in an operating state in a position that dictates that the locking pin is displaceable in a direction which is from a vertical downward oriented direction is different, in particular by at least +/- 5 ° or at least +/- 10 0 or +/- 15 ° or +/- 20 0 different.
  • a standard lock body or lock device for tubular safes will usually always have one or more locking devices, in particular one or more locking elements, such as one or more locking pins, which protrude from the lock body or lock device in the locked state and engage in a groove provided in the Lock cylinder "snaps in". Since tubular safes are usually attached to/in the facades of buildings, they are often exposed to the weather. Splash water/leaks or condensation can cause moisture to collect in the cylinder or in the groove (lowest point). If the lock body has accidentally been inserted in such a way that the locking pin is pointing directly downwards, freezing temperatures can cause the moisture in the groove to freeze the locking pin. If you now want to open the lock, this is only possible with increased effort, which can lead to damage to the lock (in classic locking cylinders, the key usually breaks off).
  • the groove for engaging the locking pin is always at a defined distance from the front panel and has a defined width and depth when converting raw safes designed for classic locking cylinders, it is possible to use a tool to construct that uses the groove as a guide to position the NFC tag, in particular the RFID tag, in the cylinder at a defined distance from the groove/to the front. If it is also provided that the positioning device can be fixed at a defined angle to the transverse axis of the cylinder, then the NFC tag, especially the RFID tag, can not only be attached at the correct depth, but also in exactly the right position, that the lock body must be inserted in the desired position for the lock to lock.
  • the near-field data transmission device can be controlled by the processor device to transmit target position data when the processor device receives position signals and/or position data that represent a target alignment of the lock device.
  • This embodiment is advantageous because in all other cases the additional consumption of electrical energy, e.g. by the near-field data transmission device, can be avoided.
  • locking commands for locking the lock device in response to the target position data transmitted by the near-field data transmission device, locking commands for locking the lock device can be received by the near-field data transmission device, wherein the actuator can be controlled by the processor device as a function of the received locking commands for locking the locking device.
  • a closure sensor in particular a touch sensor or a light barrier, is provided for monitoring the closed configuration.
  • Closure signals and/or closure data can preferably be generated by the closure sensor.
  • the locking signals and/or locking data preferably represent the presence of the locking element in the bolt receptacle in one configuration and/or the locking signals and/or locking data represent the presence of the locking element outside the locking bolt receptacle in a further configuration.
  • This embodiment is advantageous because it ensures that the lock device is actually transferred to an operating state (locking of the container).
  • the near-field data transmission device can be controlled by the processor device to transmit target position data, in particular when the processor device receives position signals and/or position data Represent lock device and when the processor device receives locking signals and / or locking data of the locking sensor in the configuration in which the locking signals and / or locking data represent the presence of the locking element in the bolt receptacle.
  • This embodiment is advantageous because several parameters are monitored, which are supplied by different sensors or
  • Detection devices are detected, whereby a bypass is not possible or only with great effort.
  • the electric lock device preferably has a receiving device for receiving at least one holding device for holding at least one object, in particular at least one mechanical key. Furthermore, the electric lock device preferably has at least one detection device for detecting the presence of the at least one holding device in or on the receiving device and for generating detection signals and/or detection data depending on the detected presence. Furthermore, the electric lock device preferably has at least one energy source other than a fixed current connection for operating at least the actuator, the near-field data transmission device, the memory unit, the detection device and/or the processor device.
  • This solution is advantageous because it can be detected whether the holding device is present and/or correctly positioned. This makes it possible to prevent a container, in particular a safe, such as a key safe, from being closed again if the holding device is either not available and/or not positioned correctly. This ensures that an operator does not forget to secure the holding device again.
  • the receiving device forms a receiving area with a defined shape for limiting the ability to insert holding devices onto holding devices that have a corresponding shape, and/or the receiving device forms a receiving area, with the receiving area being positively and/or non-positively locking and / or field-locking holding of the holding device is configured.
  • This embodiment is advantageous because preferably only holding devices of defined design can be coupled to the receiving area. It can thus be prevented that different holding devices, e.g. different devices, can be interchanged.
  • the detection device is arranged in the area of the recording area, in particular arranged adjacent to the recording area.
  • the detection device is preferred for Transmission of energy, data and/or signals to the processor device is at least indirectly and preferably directly connected to the processor device. This embodiment is advantageous because it enables the electric lock device to determine very precisely whether the holding device is positioned or arranged in the receiving device.
  • an elongate base body having a first end and a second end spaced apart from the first end in the longitudinal direction of the base body, the actuator, the near-field data transmission device, the memory unit, the processor device, the locking device, the energy source, the recording device and the detection device are connected at least indirectly, and preferably directly, to the base body, in particular forming a common assembly.
  • the first end of the base body preferably has a cover, in particular a front cover, wherein the cover in an operating configuration faces the environment on the one hand and is oriented towards the interior of the container on the other hand, the detection device being arranged or formed in the longitudinal direction at a distance from the front cover .
  • the receiving device preferably forms the second end at least partially. This embodiment is advantageous because the position of the receiving device results in a defined positioning of the holding device in the container, in particular in the safe, in particular the key safe.
  • the detection device is a Hall sensor.
  • This embodiment is advantageous because it enables a magnetic field of a magnet arranged on the holding device or a magnetic field of a magnet provided as part of the holding device to be detected and evaluated.
  • the magnet preferably forms at least partially and preferably mostly or completely a counterpart to the receiving area of the receiving device.
  • the Hall sensor generates a magnetic field signal and/or magnetic field data as a function of a detected magnetic field and transmits these to the processor device.
  • the magnetic field signals and/or magnetic field data preferably indicate whether the detected magnetic field has defined properties or has properties that deviate from the defined properties. This embodiment is advantageous because even greater security can be achieved as a result.
  • a plurality of holding devices can preferably have different magnetic properties, in particular the magnetic field properties a specific holding device or a specific group of holding devices can be deposited.
  • the detection device is a directional antenna for receiving object signals and/or object data.
  • the object signals and/or object data can preferably be generated by an NFC tag, in particular an RFID tag, arranged or generated on or in the holding device.
  • This embodiment is advantageous since the object signals and/or object data can differ from holding device to holding device.
  • the directional antenna for receiving object signals and/or object data is aligned in the axial direction of the base body.
  • This embodiment is advantageous because it means that an NFC tag, in particular an RFID tag, arranged as an extension of the base body can be read out very precisely on the holding device. Furthermore, due to its positioning in the container, the directional antenna cannot easily be supplied with fraudulent signals from outside the container.
  • the processor device can control the near-field data transmission device for transmitting object data, in particular when the processor device receives object data and/or object signals which represent a defined holding device. Additionally or alternatively, the near-field data transmission device can be controlled to transmit object data when the processor device receives magnetic field signals and/or magnetic field data that represent a defined magnetic field.
  • This embodiment is advantageous because the near-field data transmission device is preferably only activated if signals and/or data are detected correctly or in a defined manner /or data match sufficiently the near-field data transmission device is not controlled. It is thus ensured that no object data and/or object signals and/or magnetic field signals and/or magnetic field data are transmitted which do not allow actuation of the actuator device. This ensures that no additional electricity is consumed in this case.
  • locking commands for locking the locking device in response to the object data transmitted by the near-field data transmission device or magnetic data from the near-field data transmission device locking commands for locking the locking device can be received, wherein the actuator can be controlled by the processor device depending on the received locking commands for locking the locking device.
  • This embodiment is advantageous because the lock device can be converted into a closed configuration as a function of the comparison made by the processor device.
  • the lock device according to the invention preferably has at least one sensor device for detecting at least one movement of the lock device and for generating sensor signals and/or sensor data as a function of the detected movement.
  • the lock device according to the invention preferably has at least one energy source other than a fixed current connection for operating at least the actuator, the near-field data transmission device, the memory unit (18), the processor device and/or the sensor device.
  • the processor device preferably compares the sensor signals and/or sensor data of the sensor device with defined sensor signals and/or defined sensor data.
  • the defined sensor signals and/or defined sensor data preferably represent a movement or a group of permissible movements and/or an impermissible movement or a group of impermissible movements.
  • An alarm function can preferably be triggered by the processor device if it is determined by the comparison that the sensor signals and/or sensor data represent movements that deviate from permissible movements and/or correspond to impermissible movements.
  • This solution is advantageous because it enables unauthorized operation, in particular burglary or vandalism, to be determined.
  • the impermissible movement or the group of impermissible movements represents vibrations or shocks resulting from the locking device being acted upon by a tool, in particular a drill or a hammer or a chisel.
  • the detection of an impermissible movement could consist in the electronic lock device recognizing when the lock body is moved by an angle within a unit of time which, due to the anatomy of the human wrist, cannot be realized without technical aids .
  • the same sensors can also be used, for example, to detect whether the lock body is being turned very quickly or at a constant frequency. This could also be due to the use of technical aids.
  • Built-in acceleration or shock sensors can be used to draw conclusions about the permissibility of the frequency and the impulse of a movement. Strong impulses »100N and a low frequency can indicate the use of a conventional hammer. Weaker impulses ⁇ 100N at high frequency can indicate the use of an impact drill.
  • a KI model for matching the sensor signals and/or sensor data of the sensor device with the defined sensor signals and/or defined sensor data can be executed by the processor device.
  • pre-trained Kl models are recommended.
  • the sensor data recorded by locks is provided with the additional information as to whether an access attempt has actually taken place (possibly the type of access attempt) or not.
  • an AI system now designs a model and trains it on the basis of the data presented.
  • the trained AI system can recognize patterns in the recorded data, in particular in the interaction of different sensors, which indicate whether an unauthorized access attempt is taking place. This pre-trained pattern recognition can then be loaded into the lock electronics and continuously evaluate the recorded sensor data.
  • the processor device can store the sensor signals and/or sensor data in the memory unit. Further data, in particular the time at which the sensor signal acquisition and/or sensor data acquisition began and/or the end of the sensor signal acquisition and/or sensor data acquisition and/or date, can preferably be acquired by the processor device and stored in the memory unit. This embodiment is advantageous because the unauthorized access can be documented very precisely, which means that further security mechanisms become possible and/or criminal prosecution is possible.
  • a closure sensor in particular a touch sensor or a light barrier, is provided for monitoring the closed configuration.
  • Locking signals and/or locking data can preferably be generated by the locking sensor, with the locking signals and/or locking data in a locking configuration representing the presence of the locking element in the locking position and/or with the locking signals and/or locking data representing a position deviating from the locking position in a manipulation configuration .
  • the locking element In the closed position, the locking element is preferably in an end position in the bolt receptacle arranged.
  • the position of the locking element deviates from the closed position at least by a minimum amount.
  • the minimum amount is preferably greater than or equal to 0.01 mm or greater than or equal to 0.1 mm or greater than or equal to 0.5 mm or greater than or equal to 1 mm or greater than or equal to 2 mm or greater than or equal to 5 mm. This embodiment is advantageous since an illegal access can be detected very early and countermeasures can thus be initiated early.
  • the alarm function that can be triggered by the processor device can be used to control the actuator for transferring the locking element from the manipulation configuration to the locking configuration, in particular if the locking sensor can determine a deviation from the locking configuration or a manipulation configuration.
  • This embodiment is advantageous because the activation of the actuator makes illegal access more difficult.
  • a locking element can preferably be extended further by the actuator in the manipulation configuration than in a locking configuration.
  • the sensor device has at least one acceleration sensor, the acceleration sensor being designed to output acceleration signals and/or acceleration data as a function of forces introduced into the lock device, in particular during unauthorized access.
  • the output of an alarm signal or at least one alarm signal or more than one alarm signal is dependent on the electric lock device and/or the container due to the alarm function that can be triggered by the processor device can be effected by the sensor signals and/or sensor data. This embodiment is advantageous because the alarm signals can be used to deter third parties from the unauthorized access.
  • the object mentioned above is also achieved according to the invention by an opening device according to claim 38 .
  • the opening device is preferably a closure door, a closure cover or a closure flap, for installation in a container having at least the electronic lock device described herein.
  • This solution is advantageous because existing containers, in particular safes, such as key safes built into masonry, can be converted with the opening device, thereby saving resources by integrating the respective safe into a server-based system is possible. In particular, there is no need for costly removals of the safe body from the masonry and the installation of a new safe body in the masonry.
  • the above-mentioned object is also achieved according to the invention by a container described herein, in particular a container according to claim 39.
  • the container is preferably a safe, in particular a key safe, and particularly preferably has an electronic lock device described herein or an opening device described herein.
  • the above-mentioned object is achieved according to the invention according to claim 40 by a method for converting a container that can be locked with a physical key, in particular a safe, to a container, in particular a safe, equipped with electrical components.
  • the method according to the invention preferably has at least the following steps:
  • an opening device namely a closure door, a closure lid or a closure flap
  • the opening device preferably having a lock mechanism, the lock mechanism being transferable from a closed configuration to an open configuration with the physical key, and the lock mechanism being unlocked with the physical key the open configuration can be converted into the closed configuration.
  • the lock device according to the invention preferably has a near-field data transmission device for receiving data from at least one in a defined distance range from the electronic lock device temporarily located mobile terminal and for sending data, in particular access data, to the at least one mobile terminal temporarily located in a defined distance range from the electronic lock device, wherein the near-field data transmission device has at least one near-field data transmission antenna for receiving and/or transmitting the data.
  • the lock device according to the invention preferably has a storage unit for at least temporarily storing time data and/or access data.
  • the time data preferably have at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data preferably have at least authorization data and identification data.
  • the authorization data preferably define as a function of which identification data the actuator converts the lock device from the closed configuration into the open configuration.
  • the identification data preferably specifies an association with the mobile terminal device.
  • the lock device according to the invention preferably has a processor device for comparing the authorization data and the identification data. In the case of a positive comparison, the actuator can preferably be controlled by the processor device to open the lock device, with a positive comparison representing a defined match of the compared data.
  • At least one energy source other than a fixed current connection is preferably provided for operating at least the actuator, the near-field data transmission device, the memory unit and/or the processor device. The energy source can be used additionally or alternatively to operate the sensor device and/or the detection device.
  • the lock device preferably has at least one directional antenna, the directional antenna being provided for data and/or signal exchange with the preferably passive N FC tag, in particular the RFID tag, the directional antenna being connected to the processor device, with up to at a maximum distance between the NFC tag, in particular the RFID tag, and the directional antenna, data and/or signals from the NFC tag, in particular the RFID tag, can be fed to the processor device via the directional antenna, the maximum distance being less than 10 mm, wherein the data and/or signals from the NFC tag, in particular an RFID tag, represent at least position signals and/or position data, wherein the position signals and/or position data represent a target alignment of the lock device and/or wherein the data and/or signals from NFC tag, in particular RFID tag, at least represent installation data, with a Zuor through the installation data dnation of the lock device to the NFC tag, in particular RFID tag, can be evaluated.
  • the above-mentioned object is also achieved according to the invention by a method for actuating an electronic
  • Providing an electronic lock device described herein providing a mobile terminal device, the mobile terminal device having a near-field data transmission means for data exchange with the near-field data transmission device of the container, the mobile terminal device having a far-field data transmission means, in particular LTE, for data exchange with a server device, the mobile terminal device having a processor unit for running a control application, the mobile terminal having a storage device for storing lock reconfiguration data and lock operating data.
  • the lock operating data are preferably transmitted by the near-field data transmission device to the near-field data transmission means of the mobile terminal for forwarding to the server device.
  • the mobile terminal preferably receives the lock reconfiguration data from the server device via the far-field data transmission means.
  • the lock reconfiguration data is preferably generated in response to the lock operating data transmitted to the server device by means of the near-field data transmission means.
  • the lock operating data preferably have at least time data and access data.
  • the method according to the invention preferably has the step of inserting the holding device into the receiving device.
  • the method according to the invention preferably has the step of detecting the presence of the holding device in the receiving device.
  • the method according to the invention preferably has the step of outputting object signals and/or object data.
  • the object signals and/or object data preferably represent the presence of the holding device in the recording device and preferably the object signals and/or object data additionally or alternatively represent object identification signals and/or object identification data, with a defined holding device or a defined group of holding devices being identified by the object identification signals and/or object identification data is represented.
  • the method according to the invention preferably has the step of transmitting object signals and/or object data by the near-field data transmission device to the near-field data transmission means, in particular when the processor device receives object signals and/or object data that represent the presence of the holding device in the receiving device.
  • the method according to the invention preferably has the step of transmitting locking commands for locking the lock device by the near-field data transmission means to the Near field data transmission device.
  • the actuator is preferably controlled by the processor device as a function of the received locking commands for locking the closure device.
  • the object signals and/or object data can, for example, be compared with object reference data in the lock device and/or in the mobile end device and/or by a server device. If the comparison takes place in the lock device and/or in the mobile terminal device, the result of the comparison can then be transmitted to the server device. In the case of a positive comparison, i.e. a sufficient match, locking commands for locking the closure device are preferably transmitted to the processor device, in particular from the server device and/or from the mobile terminal device. Alternatively, it is also possible that only the information that the specific lock is closed or locked is stored on the mobile terminal device and/or the server device.
  • the above object is also achieved by a method for actuating an electronic lock device, in particular for retrofitting a container, in particular a lock device described herein, or a container with an electric lock device, a lock device described herein.
  • the method preferably has at least the following steps:
  • the mobile terminal having a near-field data transmission means for data exchange with the near-field data transmission device of the container, the mobile terminal preferably having a far-field data transmission means, in particular LTE, for data exchange with a server device, and the mobile terminal preferably having a processor unit for executing a control application .
  • the mobile terminal preferably has a storage unit for storing lock reconfiguration data and lock operating data.
  • the lock operating data are preferably transmitted by the near-field data transmission device to the near-field data transmission means of the mobile terminal for forwarding to the server device.
  • the mobile terminal preferably receives the lock reconfiguration data from the server device via the far-field data transmission means.
  • the lock reconfiguration data is particularly preferably generated in response to the lock operating data transmitted to the server device by means of the near-field data transmission means.
  • the lock operating data preferably have at least time data and access data. Furthermore, that shows The method prefers the step of manually moving at least part of the lock device until signals and/or data are transmitted from the NFC tag, in particular the RFID tag, to the processor device via the directional antenna.
  • the method preferably has the step of transmitting target position data by the near-field data transmission device to the near-field data transmission means, in particular when the processor device receives position signals and/or position data that represent a target alignment of the lock device. Furthermore, the method preferably has the step of transmitting locking commands for locking the lock device by the near-field data transmission means to the near-field data transmission device, with the actuator preferably being controlled by the processor device as a function of the received locking commands for locking the locking device.
  • the target position data can, for example, be compared with target position reference data in the lock device and/or in the mobile terminal device and/or by a server device. If the comparison takes place in the lock device and/or in the mobile terminal device, the result of the comparison can then be transmitted to the server device. In the case of a positive comparison, i.e. a sufficient match, locking commands for locking the closure device are preferably transmitted to the processor device, in particular from the server device and/or from the mobile terminal device.
  • the above-mentioned object is achieved by a method for converting a container that can be locked with a physical key, in particular a safe, to a container, in particular a safe, equipped with electrical components.
  • This method preferably has at least the following steps:
  • an opening device namely a closure door, a closure lid or a closure flap
  • the opening device preferably having a lock mechanism, the lock mechanism being transferable from a closed configuration to an open configuration with the physical key, and the lock mechanism being unlocked with the physical key the open configuration can be converted into the closed configuration, introducing a positioning template into the container, with an NFC tag, in particular an RFID tag, being arranged on the positioning template, with the NFC tag, in particular an RFID tag, being attached by the positioning template to a is positioned in the container at a predefined location, attaching the NFC tag, in particular an RFID tag, in the container at the predefined location, arranging a lock device as described herein on the container.
  • a lock device comprising:
  • the above-mentioned object is also achieved according to the invention by a method for actuating an electronic lock device, in particular for retrofitting a container or a container with an electric lock device, in particular a lock device described herein.
  • the method preferably has at least the following steps: providing an electronic lock device as described herein, in particular according to one of the claims, providing a mobile terminal device, the mobile terminal device having near-field data transmission means for data exchange with the near-field data transmission device of the container, the mobile terminal device having far-field data transmission means , in particular LTE, for data exchange with a server device, the mobile terminal device having a processor unit for executing a control application, the mobile terminal device having a storage device for storing lock reconfiguration data and lock operating data, the lock operating data being transmitted by the near-field data transmission device to the server device the near-field data transmission means of the mobile terminal are transmitted and wherein the mobile terminal locks receives new configuration data from the server device via the far-field data transmission means, the lock reconfiguration data being generated in response to the lock operating data transmitted to the server device by means of the near-field data transmission means, the lock operating data comprising at least time data and access data. Further preferably comprising the steps: manually moving at least part of the locking device, activating the near-field data transmission
  • the object mentioned above is also achieved by a method for operating an electronic lock device described herein, in particular for retrofitting a container, or for operating an electric lock device of a container described herein.
  • the method preferably has at least the following steps: providing an electronic lock device as described herein, providing a mobile terminal, the mobile terminal preferably having a near-field data transmission means for data exchange with the near-field data transmission device of the container, the mobile terminal preferably having a far-field data transmission means, in particular LTE, for Having data exchange with a server device, wherein the mobile terminal has a processor unit for executing a control application, wherein the mobile terminal has a
  • the lock operating data are preferably transmitted by the near-field data transmission device to the near-field data transmission means of the mobile terminal for forwarding to the server device.
  • the mobile terminal preferably receives the lock reconfiguration data from the server device via the far-field data transmission means.
  • the lock reconfiguration data is preferably generated in response to the lock operating data transmitted to the server device by means of the near-field data transmission means.
  • the lock operating data preferably have at least time data and access data.
  • the method preferably has the step of detecting movements of the electric lock device by the sensor device.
  • the method preferably has the step of outputting sensor signals and/or sensor data, the sensor signals and/or sensor data representing the movements.
  • the method preferably has the step of analyzing the sensor signals and/or sensor data.
  • the method preferably has the step of triggering an alarm function.
  • identification data provided by the server device is provided in the memory device of the mobile terminal device, with the identification data being transmitted to the mobile terminal device together with or with the lock reconfiguration data or as a separate data record.
  • the identification data are preferably transmitted to the near-field data transmission device together with specific device data of the mobile terminal as a result of an access authorization request using the near-field data transmission means.
  • At least the identification data is preferably stored in the memory unit and compared with the authorization data present in the memory unit. Depending on a comparison result obtained from the comparison, it is preferably determined whether the lock device remains in the locked state or is converted into an open state.
  • a specific set of lock operating data is preferably stored in modified form by the processor device of the lock device in the memory unit, in particular at least after this set of lock operating data has been transmitted to the mobile terminal device.
  • the lock reconfiguration data of the processor device of the lock device preferably specify which data, in particular which specific set of lock data, is deleted from the memory unit.
  • the processor device of the lock device preferably deletes the data from the memory unit as a function of the lock reconfiguration data.
  • the lock reconfiguration data preferably includes authorization data.
  • the lock reconfiguration data preferably has an instruction to the To replace processor device of the lock device on the held in the memory unit authorization data by the authorization data of the lock reconfiguration data and / or expand.
  • the system preferably has at least a large number of locking devices described herein, in particular locking devices according to one of Claims 1 to 37.
  • the system according to the invention preferably has a large number of mobile terminals, each mobile terminal having a near-field data transmission means for data exchange with the near-field data transmission devices of the lock devices.
  • Each mobile terminal preferably also has a far-field data transmission means, in particular LTE, for data exchange with a server device.
  • each mobile terminal preferably has a processor unit for executing a control application and a memory device for storing lock reconfiguration data and lock operating data.
  • the lock operating data are preferably transmitted by the near-field data transmission device to the near-field data transmission means of the respective mobile terminal device for forwarding to the server device.
  • the lock operating data preferably have at least time data and access data.
  • the time data preferably have at least data on the last opening time and/or at least data on the last closing time.
  • the system preferably has at least one server device, in particular a cloud server device.
  • the server device preferably receives the lock operating data from the respective mobile terminal and particularly preferably generates lock reconfiguration data after receiving the lock operating data.
  • the server device preferably sends this to the mobile terminal from which it received the lock operating data or to another mobile terminal that is assigned to the lock device, or to a group of mobile devices, with all mobile devices assigned to the group being assigned to the lock device .
  • FIG. 1 shows a first schematic example of an electric lock device according to the invention
  • FIG. 2 shows a second schematic example of an electric lock device according to the invention
  • FIG. 3a-3c schematic sectional views to illustrate the installation of an electric lock device in a container, in particular in a key safe
  • FIG. 4 schematic representation of an installation device for positioning an NFC tag in the container, in particular the key safe
  • FIG. 5 shows a third schematic example of an electric lock device according to the invention.
  • FIG. 6 shows a fourth schematic example of an electric lock device according to the invention.
  • FIG. 7 shows a fifth schematic example of an electric lock device according to the invention.
  • FIG. 1 an exemplary example of a lock device 10 according to the invention is shown.
  • the electric lock device 10 shown here has an electrically operable actuator 12 for transferring the electric lock device 10 from a closed configuration into an open configuration.
  • the actuator 12 can cause at least one locking element 17 to form a locking device
  • a bolt receptacle (on the lock device side) is moved to an area outside the bolt receptacle.
  • the actuator can be provided for transferring the electric lock device 10 from an open configuration into a closed configuration.
  • the actuator 12 can cause the at least one locking element 17 of the locking device to be moved from the area outside the bolt receptacle, in particular from the locking element receptacle 60 (on the container side) into the bolt receptacle (on the lock device side).
  • Lock device 10 also has a near-field data transmission device 14 (and an antenna 15 connected to it) for receiving data from at least one mobile terminal device 16 that is temporarily located within a defined distance range from electronic lock device 10 and for sending data, in particular access data, to the at least a mobile terminal device 16 temporarily located within a defined distance range from the electronic lock device 10 .
  • Reference number 18 designates a storage unit for at least temporarily storing time data and/or access data and/or data of a sensor device and/or detection device.
  • the time data include at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data have at least authorization data and identification data.
  • the authorization data define as a function of which identification data the actuator 12 transfers the lock device 10 from the closed configuration to the open configuration, and the identification data specify an association with the mobile end device 16 .
  • a processor device 20 is provided for comparing the authorization data and the identification data. In the event of a positive comparison, the actuator 12 can be controlled by the processor device 20 to open the lock device 10, with a positive comparison preferably representing a defined match of the compared data. In the event of a positive comparison, the actuator 12 can be controlled by the processor device 20 to open the lock device 10, with a positive comparison representing a defined match of the compared data.
  • Reference number 23 denotes at least one sensor device for detecting at least one movement of the lock device 10 and for generating sensor signals and/or sensor data as a function of the movement detected.
  • the lock device 10 has at least one energy source 22 other than a fixed current connection for operating at least the actuator 12, the near-field data transmission device 14, the memory unit 18, the processor device 20 and/or the sensor device.
  • at least one control device 21 for activating one or more device(s) deactivated in an idle state, the device deactivated in the idle state being at least one or more of the following devices: the actuator 12, the near-field data transmission device 14, the memory unit 18 and/or the processor device 20.
  • the control device 21 is at least accessible via a signal and/or data connection connected to the sensor device 23, wherein sensor data or sensor signals generated by the sensor device 23 can be transmitted to the control device 21 via the signal and/or data connection. At least one deactivated device can be activated by the control device 21 as a function of the sensor data or sensor signals.
  • At least the actuator 12 and the near-field data transmission device 14 are deactivated in the idle state, preferably at least the actuator 12, the near-field data transmission device 14 and the memory unit 18 are deactivated in the idle state.
  • the electric lock device has an elongate base body 4, the elongate base body 4 having a first end 5 and a second end 6 spaced apart from the first end 5 in the longitudinal direction of the base body 4, the first end 5 having an actuating device for moving the base body 4, the actuator 12, the near-field data transmission device 14, the memory unit 18, the processor device 20, the energy source 22, the control device 21, the sensor device 23 and a locking device 17, in particular a locking element, which can be moved by the actuator 12, are arranged at a distance from the actuating device in the longitudinal direction.
  • the actuator 12, the near-field data transmission device 14, the memory unit 18, the processor device 20, the sensor device 23 and the energy source 22 are connected at least indirectly, and preferably directly, to the base body 4; in particular, these devices together form a common assembly.
  • At least one locking element 17 of the locking device is preferably provided in the region of the first end 5 of the base body 4, in particular at a closer distance from the first end 5 than from the second end 6 of the base body 4.
  • the base body 4 has a front cover 7 for covering a container 1, in particular a safe.
  • the actuating device is designed for manually applying forces to the base body 4 in order to move the base body 4 relative to the environment.
  • the sensor device 23 has at least one acceleration sensor.
  • the acceleration sensor is designed to output acceleration signals and/or acceleration data as a function of forces introduced via the actuating device.
  • the actuator is plate-like, in particular flat and with roughness RA ⁇ 25pm, and is preferably used for manually initiating knocking impulses.
  • the control device 21 is configured to activate one or more or all of the deactivated devices depending on a predetermined code.
  • the code consists of at least one sequence of acceleration signals and/or acceleration data, it being possible for the control device 21 to evaluate the acceleration signals and/or acceleration data output by the acceleration sensor in order to check the code.
  • the sensor device 23 can have at least one position sensor, in particular a gyroscope, for detecting one or more rotary movements of the base body 4 .
  • the actuating device has at least one lever element (not shown) for at least partial rotation of the base body 4 and is preferably used for manually initiating rotational movements.
  • the control device 21 is configured to activate one or more or all of the deactivated devices depending on a predetermined code.
  • the code consists of at least one sequence of position signals and/or position data, with position signals and/or position data output by the position sensor being able to be evaluated by the control device 21 for checking the code.
  • the control device 21 can activate the near-field data transmission device 14 or cause it to be activated.
  • Signals and/or data for opening the lock device 10 can be received by means of the near-field data transmission device 14, with the near-field data transmission device 14 being designed to send and receive signals and/or data by radio, in particular Bluetooth, WLAN, ZigBee or NFC.
  • the basis for this solution consists of a battery-powered electronic lock.
  • all of the electronics together with the battery are preferably integrated into the closure cap and thus form the electric lock device 10 according to the invention.
  • a major advantage of this solution is that a battery life of the electronic lock or dr lock device 10 of 10 years and more can be achieved. This is done by disabling a large number of components or putting them into "deep sleep", which disables all non-essential functions in order to achieve a power consumption in the nA range.
  • we have to actively wake up the lock if we want to communicate with it. This means that the lock device 10 has to be actively “woken up”.
  • the lock device 10 preferably has no button or switch in the front panel, since such an element can always be the target of attempted break-ins or simply vandalism. And if the switch or button is destroyed, then the lock or the lock device 10 can no longer be opened because it can no longer be woken up.
  • the first solution consists of an acceleration sensor or shock sensor integrated in the cap. With this it is possible to give the lock a signal to wake up by knocking on the cap - analogous to knocking on a door. It is also conceivable that a certain sequence has to be tapped (a kind of coding) for the lock to wake up from deep sleep.
  • a sensor for position detection is provided for the second solution. It can thus be determined whether the lock device 10 is rotated in the cylinder or container 1 . To wake up the lock device 10, one can turn it 45 degrees to the left or right, for example, using a small handle on the front panel. A coded sequence can also be evaluated here, if necessary, in order to wake up the lock device 10 .
  • the electronics start and after a few milliseconds a connection can be established with the lock device (and a mobile end device 16) using near-field radio, for example, or a signal can be given to open it.
  • near-field radio for example, a near-field data transmission device
  • access codes can also be "morse" with the coding described above or via an actuating device (handle or front panel) similar to a safe rotary lock using "left, middle, right”. positions a code can be entered.
  • a detection device 96 can preferably also be supplied with energy from the energy source 22, in particular at least temporarily.
  • a receiving device 92 for receiving at least one holding device 90 for holding at least one object 2, in particular at least one mechanical key, can preferably be provided. Furthermore, the at least one Detection device 96 for detecting the presence of the at least one holding device 90 in or on the receiving device 92 and for generating detection signals and/or detection data depending on the detected presence. (see Fig. 6 or Fig. 7)
  • At least one directional antenna 70 is provided, the directional antenna 70 for transmitting energy/data and/or signals to a preferably passive NFC tag 72, in particular an RFID tag, and/or for receiving energy / Data and / or signals provided by the RFID tag.
  • the directional antenna 70 is preferably connected to the processor device 20, with data and/or signals from the NFC tag 72, in particular the RFID tag, being transmitted up to a maximum distance between the NFC tag, in particular the RFID tag, and the directional antenna 70 the directional antenna 70 of the processor device 20 can be routed.
  • the maximum distance is preferably less than 30 mm, in particular less than 20 mm or less than 10 mm, with the data and/or signals from the NFC tag 72, in particular an RFID tag, representing at least position signals and/or position data, with the position signals and /or position data represents a target orientation of the lock device 10 and/or the data and/or signals from the NFC tag 72, in particular the RFID tag, represent at least installation data, the installation data being used to assign the lock device 10 to the NFC tag 72 , In particular, an RFID tag can be evaluated. (see Fig. 2 or Fig. 7)
  • processor device 20 compares the sensor signals and/or sensor data of sensor device 23 with defined sensor signals and/or defined sensor data, with the defined sensor signals and/or defined sensor data indicating a movement or a group of permissible movements and/or an impermissible movement or represent a group of impermissible movements, with an alarm function being able to be triggered by processor device 20 if the comparison determines that the sensor signals and/or sensor data represent movements that deviate from permissible movements and/or correspond to impermissible movements (cf. 5 and 7)
  • FIG. 2 another exemplary example of a lock device 10 according to the invention is shown.
  • the electronic lock device 10 is used to lock a container 1, in particular to retrofit a key safe.
  • the electric lock device 10 shown here has an electrically operable actuator 12 for transferring the electric lock device 10 from a closed configuration into an open configuration.
  • the actuator 12 can cause at least one locking element 17 to form a locking device a bolt receptacle (on the lock device side) is moved to an area outside the bolt receptacle.
  • the actuator can be provided for transferring the electric lock device 10 from an open configuration into a closed configuration.
  • the actuator 12 can cause the at least one locking element 17 of the locking device to be moved from the area outside the bolt receptacle, in particular from the locking element receptacle 60 (on the container side) into the bolt receptacle (on the lock device side).
  • Lock device 10 also has a near-field data transmission device 14 (and an antenna 15 connected to it) for receiving data from at least one mobile terminal device 16 that is temporarily located within a defined distance range from electronic lock device 10 and for sending data, in particular access data, to the at least a mobile terminal device 16 temporarily located within a defined distance range from the electronic lock device 10 .
  • Reference number 18 designates a storage unit for at least temporarily storing time data and/or access data and/or data of a sensor device and/or detection device.
  • the time data include at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data have at least authorization data and identification data.
  • the authorization data define as a function of which identification data the actuator 12 transfers the lock device 10 from the closed configuration to the open configuration, and the identification data specify an association with the mobile end device 16 .
  • a processor device 20 is provided for comparing the authorization data and the identification data. In the event of a positive comparison, the actuator 12 can be controlled by the processor device 20 to open the lock device 10, with a positive comparison preferably representing a defined match of the compared data.
  • the lock device shown has at least one energy source 22 other than a fixed current connection for operating at least the actuator 12 , the near-field data transmission device 14 , the memory unit 18 and/or the processor device 20 .
  • the reference number 80 denotes at least one directional antenna, the directional antenna 80 for transmitting energy/data and/or signals to a preferably passive NFC tag 82, in particular an RFID tag, and/or for receiving energy/data - Is provided and / or signals from the RFID tag, the directional antenna 80 is connected to the processor device 20, wherein up to a maximum distance between the NFC tag 82, in particular RFID tag, and the directional antenna 80 data and / or signals from the NFC tag 82, in particular an RFID tag, via the directional antenna 80 of the processor device 20 can be routed, the maximum distance preferably being less than 30 mm, in particular less than 20 mm or less than 10 mm, the data and/or signals from NFC tag 82, in particular RFID tag, representing at least position signals and/or position data, whereby by the position signals and/or position data represents a target alignment of lock device 10 and/or the data and/or signals from NFC tag 82, in particular an RFID tag, represent at least installation data, with the installation data being used
  • the lock device 10 has an elongate base body 4, the elongate base body 4 having a first end 5 and a second end 6 spaced apart from the first end 5 in the longitudinal direction of the base body 4, the actuator 12, the near-field data transmission device 14, the storage unit 18, the Processor device 20, the locking device 17, the energy source 22 and the directional antenna 80 are connected at least indirectly, and preferably directly, to the base body 4, in particular forming a common assembly, with the directional antenna 80 for transmitting energy and/or data and/or or signals in the radial direction of the base body 4 is arranged. In the region of the first end 5 of the base body 4, in particular closer to the first end 5 than to the second end 6 of the base body 4, at least one locking element 17 of the locking device is provided.
  • the base body 4 forms a front cover 7 for covering a container 1, in particular a safe, or has a front cover 7 for covering the container 1, in particular the safe.
  • the first end 5, in particular the front cover 7, represents an actuating device for moving the base body 4, with the actuator 12, the near-field data transmission device 14, the memory unit 18, the processor device 20, the energy source 22, the directional antenna 80 and the locking device 17 are arranged
  • the directional antenna 80 is in the form of an inductive element, with the directional antenna 80 being able to be arranged or embodied in conductor tracks of the circuit board. Alternatively, the directional antenna 80 can be integrated into the peripheral wall of the base body 4 or arranged thereon.
  • the locking element 17 is designed as a locking pin and the directional antenna 80 is arranged at a defined angle to the locking pin 17, the directional antenna 80 being aligned in an operating state in a position by which is specified that the locking pin 17 is displaceable in a direction which differs from a direction oriented vertically downwards, in particular by at least +/- 5° or at least +/-10 ° or at least +/- 15° or at least + /-20 0 is different.
  • the near-field data transmission device 14 can be controlled by the processor device 20 to transmit target position data when the processor device 20 receives position signals and/or position data that represent a target alignment of the lock device 10 .
  • locking commands for locking lock device 10 can be received by near-field data transmission device 14, wherein actuator 12 can be controlled by processor device 20 as a function of the received locking commands for locking lock device 10.
  • a closure sensor 62, 64 in particular a touch sensor 62 or a light barrier 64, is provided for monitoring the closed configuration, it being possible for closure signals and/or closure data to be generated by closure sensor 62, 64, the closure signals and/or closure data in one configuration indicating the presence of the locking element 17 in the bolt receptacle (on the container side) and/or wherein the closure signals and/or closure data in a further configuration represent the presence of the locking element outside the bolt receptacle.
  • Processor device 20 can control near-field data transmission device 14 to transmit target position data when processor device 20 receives position signals and/or position data that represent a target orientation of lock device 10 and when processor device 20 receives locking signals and/or locking data from locking sensor 62, 64 in the configuration , in which the locking signals and/or locking data represent the presence of the locking element 17 in the bolt receptacle.
  • the present embodiment is advantageous because it can be used to determine whether the lock device is in the associated cylinder or receptacle 1 before it is locked.
  • This embodiment can particularly preferably be used as a “retrofit” solution, as a result of which an upgrade of the cylinders or containers 1 is possible without complex technical modifications to the existing, permanently installed cylinders. As a rule, there is also not much space in the cylinders or containers 1, which is why the solution is particularly preferably very small.
  • the present solution works with NFC technology, in particular RFID technology.
  • a passive NFC tag in particular an RFID tag, is glued into the cylinder or the container 1, preferably about 30 mm behind the front edge.
  • the tag is preferably only a few tenths of a millimeter thick and is particularly preferably protected against simple mechanical damage with a resistant coating, in particular made of a polymer material.
  • An NFC antenna in particular an RFID antenna, is integrated in the lock device and positioned in such a way that the NFC tag, in particular the RFID tag, can only be read when the lock device 10 is inserted in the cylinder or container 1 .
  • the locking device 10 can send the signal to an app, e.g. via local radio technology, that the locking device 10 is now ready to be locked. As long as the tag cannot be read by the lock device 10, it refuses the closing command.
  • the app Since the app is either connected directly to the server 38, which monitors the usage data, or synchronizes this data at a later point in time, it can be tracked centrally who successfully closed the lock device 10 and when.
  • the NFC tag in particular the RFID tag
  • the antenna in the lock device 10 must be aligned correctly in order to read the tag, it is helpful to place a corresponding mark on the lock device 10 as to how it must be inserted. For example, if the tag is attached to the top of the cylinder or container 1, a mark for “up” can be placed on the front panel z so that the user knows which orientation the lock device can use to close the container 1. An optical or acoustic feedback from the lock device 10 as soon as the correct position has been found and the tag can be read makes this even easier.
  • the NFC field, in particular the RFID field, or the antenna can be adjusted very well in the defined environment of the cylinder or the container 1, but many parameters can influence the exact position in which the tag can be read, it becomes safe Situations arise in which the tag can already be read, but the lock device 10 is not yet fully inserted in the cylinder or container 1. If the locking device 10 is not yet fully inserted in the cylinder or the container 1, the locking bolt cannot engage and the locking device 10 is not locked. In such a case, the supposedly locked lock device 10 could be removed again with little effort, since the bolt 17 is not engaged. However, since the locking device 10 not only evaluates the NFC tag, in particular the RFID tag, but also has sensors 62, 64 (eg buttons) that detect whether the locking bolt 17 has engaged, corresponding warnings can be generated in this case.
  • sensors 62, 64 eg buttons
  • each electric lock device described in this document preferably has one or at least one output device, in particular for the optical and/or acoustic output of signals and/or information.
  • the lock device 10 can also be configured in such a way that it only works in precisely this cylinder or container 1 . This is a major advantage for inventory taking, for example.
  • At least one sensor device 23 (cf. FIGS. 1 and 7) can preferably also be supplied with energy by the energy source 22, in particular at least temporarily.
  • the lock device 10 can have at least one control device 21 (cf. FIGS. 1 and 6) for activating one or more device(s) that are deactivated in an idle state.
  • the device deactivated in the idle state is preferably at least one or more of the following devices: actuator 12, near-field data transmission device 14, memory unit 18 and/or processor device 20.
  • Control device 21 is preferably connected at least via a signal and/or data connection connected to the sensor device 23.
  • Sensor data or sensor signals generated by sensor device 23 can preferably be transmitted to control device 21 via the signal and/or data connection.
  • At least one deactivated device can be activated by the control device 21, preferably depending on the sensor data or sensor signals (cf. FIG. 1 or 7).
  • the processor device 20 compares the sensor signals and/or sensor data of the sensor device 23 with defined sensor signals and/or defined sensor data movement or a group of permissible movements and/or an impermissible movement or a group of impermissible movements, an alarm function being able to be triggered by processor device 20 if the comparison determines that the sensor signals and/or sensor data represent movements that are permissible movements deviate and/or correspond to the impermissible movements (cf. Fig. 5 or Fig. 7)
  • a detection device 96 can preferably also be supplied with energy from the energy source 22, in particular at least temporarily.
  • a receiving device 92 for receiving at least one holding device 90 for holding at least one object 2, in particular at least one mechanical key, can preferably be provided.
  • the at least one detection device 96 can be provided for detecting the presence of the at least one holding device 90 in or on the receiving device 92 and for generating detection signals and/or detection data depending on the detected presence. (see Fig. 6 or Fig. 7)
  • FIG. 3a shows a container 1, in particular a key safe, which is permanently installed in a wall 66, in particular a stone wall, in particular a brick wall or a house wall.
  • the container 1 has an opening into which the lock device 10 according to the invention can be inserted.
  • the container 1 has a container wall forming the inner boundary surface, through which preferably at least one locking element receptacle (container side) or a groove 60, in particular a circumferential groove, in particular a completely circumferential groove, for receiving one or at least one locking pin 17 of the lock device 10 .
  • the reference numbers 62 and 64 preferably identify optical sensors and/or contact sensors for detecting the presence of a locking element 17 in the locking element receptacle 60.
  • 3b shows the lock device 10 in an installed state or in an operating configuration or in a locking configuration, i.e. the locking element 18 is inserted into the locking element receptacle 60.
  • 3 c shows an illustration according to which a directed antenna 70 is arranged or formed on the lock device 10 and according to which an N FC tag, in particular an RFID tag, is arranged or formed on the container 1 .
  • the NFC tag and the directional antenna 70 are aligned in such a way that they only transmit signals and/or data and/or energy in a correct installation position of the lock device 10 in the container 1 can exchange.
  • the lock device 10 thus preferably sends a signal and/or data to a mobile terminal device 16 when the directional antenna 70 and the NFC tag 72 are arranged in a sufficiently matching position, whereby a user or an operator can be informed when the the Lock device 10 is correctly positioned.
  • FIG. 3 schematically shows a sectional representation of the representation shown in FIG. 3c.
  • Fig. 4 shows a lever device 74 for attaching NFC tags in containers, in particular key safes, with a groove 60, in particular a circumferential groove 60.
  • the lever device 74 preferably has an installation recess 75 for insertion into the groove 60 of the key safe.
  • the installation depth is predetermined by the interaction of the installation recess and the groove 60 .
  • a lever element 76 is mounted on a pivot point 77, with a short lever arm having a holding element for holding the NFC tag on one side of pivot point 77 and a longer lever arm on the other side of pivot point 77 compared to the short lever arm.
  • the longer lever arm is preferably spring-loaded (cf. spring element 78).
  • the lever device 74 has a first outer ring 78 and a second outer ring 79, the first and the second outer ring 78, 79 remaining outside the container 1.
  • the first outer ring 78 preferably mostly or completely encloses the second outer ring 79.
  • Reference number 98 designates a device for aligning the first ring 78, in particular a spirit level.
  • the second outer ring 79 can preferably be moved in rotation, as a result of which the lever element 76 and the pivot point 77 move on a circular path inside the container 1 . In this way, in particular, an angular position can be set in which the NFC tag is to be glued to the container wall.
  • FIG. 5 another exemplary example of a lock device 10 according to the invention is shown.
  • the electronic lock device 10 is used to lock a container 1, in particular to retrofit a key safe 1.
  • the electric lock device 10 shown here has an electrically operable actuator 12 for transferring the electric lock device 10 from a closed configuration into an open configuration.
  • the actuator 12 can cause at least one locking element 17 of a locking device to be moved out of a bolt receptacle (on the lock device side) into an area outside the bolt receptacle.
  • the actuator can be provided for transferring the electric lock device 10 from an open configuration into a closed configuration. From the actuator 12 can be brought about that the at least one locking element 17 of the locking device from the area outside Bolt receptacle, in particular from the locking element receptacle 60 (container side), is moved into the bolt receptacle (lock device side).
  • Lock device 10 also has a near-field data transmission device 14 (and an antenna 15 connected to it) for receiving data from at least one mobile terminal device 16 that is temporarily located within a defined distance range from electronic lock device 10 and for sending data, in particular access data, to the at least a mobile terminal device 16 temporarily located within a defined distance range from the electronic lock device 10 .
  • Reference number 18 designates a storage unit for at least temporarily storing time data and/or access data and/or data of a sensor device and/or detection device.
  • the time data include at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data have at least authorization data and identification data.
  • the authorization data define as a function of which identification data the actuator 12 transfers the lock device 10 from the closed configuration to the open configuration, and the identification data specify an association with the mobile end device 16 .
  • a processor device 20 is provided for comparing the authorization data and the identification data. In the event of a positive comparison, the actuator 12 can be controlled by the processor device 20 to open the lock device 10, with a positive comparison preferably representing a defined match of the compared data.
  • the lock device 10 shown preferably has at least one sensor device 23 for detecting at least one movement of the lock device 10 and for generating sensor signals and/or sensor data as a function of the detected movement. Furthermore, the lock device 10 has at least one energy source 22 other than a fixed current connection for operating at least the actuator 12, the near-field data transmission device 14, the memory unit 18, the processor device 20 and/or the sensor device 23.
  • the processor device 20 compares the sensor signals and/or sensor data from the sensor device 23 with defined sensor signals and/or defined sensor data.
  • the defined sensor signals and/or defined sensor data represent a movement or a group of permissible movements and/or an impermissible movement or a group of impermissible movements, with an alarm function being able to be triggered by the processor device 20 if it is determined by the comparison that the sensor signals and/or sensor data representing movements, which deviate from permissible movements and/or correspond to the impermissible movements.
  • the impermissible movement or group of impermissible movements represent vibrations or shocks that result from the locking device 10 being subjected to a tool, in particular a drill or a hammer or a chisel.
  • a Kl model is preferably used to compare the sensor signals and/or sensor data of sensor device 23 with the defined sensor signals and/or defined sensor data and executed by processor device 20 .
  • the sensor signals and/or sensor data can be stored by the processor device 20 in the memory unit or memory device 18 . Further data, in particular the time at which sensor signal acquisition and/or sensor data acquisition began and/or the end of sensor signal acquisition and/or sensor data acquisition and/or the date, can be acquired by processor device 20 and stored in storage unit 18 .
  • a locking sensor 62, 64 in particular a touch sensor 62 or a light barrier 64, is provided for monitoring the closed configuration, with locking signals and/or locking data being able to be generated by the locking sensor, with the locking signals and/or locking data in a locking configuration indicating the presence of locking element 17 represent in the closed position and/or wherein the lock signals and/or lock data in a manipulation configuration represent a position deviating from the closed position.
  • the alarm function that can be triggered by the processor device 20 can be used to control the actuator for transferring the locking element 17 from the manipulation configuration to the locking configuration if the locking sensor 62, 64 can determine a deviation from the locking configuration or a manipulation configuration, in particular without a correct opening command was received by the near-field data transmission device 14.
  • the sensor device 23 has at least one acceleration sensor, the acceleration sensor being designed to output acceleration signals and/or acceleration data as a function of forces introduced into the lock device 10 .
  • the alarm function that can be triggered by the processor device 20 can cause an alarm signal to be output, in particular via an optical and/or acoustic signal source of the electric lock device and/or the container, as a function of the sensor signals and/or sensor data.
  • Typical vibration patterns can be detected by means of the shock or movement sensor, in particular the acceleration sensor, which indicate an attempt to drill open or prize open a lock.
  • the shock or movement sensor in particular the acceleration sensor, which indicate an attempt to drill open or prize open a lock.
  • pre-trained Kl models are available for this purpose, which of course only have to be executed if one of the Sensors struck and the lock device 10, in particular by a control device 21 (similar to Fig. 1), woke up from deep sleep (to save power).
  • the lock device 10 can draw attention to itself via an optical and acoustic alarm in order to dissuade the attacker from his intention.
  • all data relating to the access attempt (date, time, etc.) can be stored locally and transmitted to the server 38 with the next synchronization.
  • the position detection sensor (if provided) can also be used to detect unauthorized access. Since, limited by human anatomy, the hand can only rotate slightly more than 180 degrees, it can be assumed that if a continuous movement of the locking device 10 of more than 180 degrees is detected, it is not from a human hand is performed. It can then be assumed that an attempt is being made to fold/retract the lock bolt 17 by exercising a continuous rotary movement (e.g. using a cordless screwdriver) and by pulling or pushing.
  • a continuous rotary movement e.g. using a cordless screwdriver
  • the electronics of the lock device 10 can not only sound the alarm as described above and document the attempt. In such an attack, the electronics can even work actively against the attempt.
  • the motor or actuator 12 which moves the bolt, can try to compensate for the movement (the forced folding in) and reset the bolt push/drive to the closed position until the “fully closed” condition is reached.
  • the lock device 10 can have at least one control device 21 for activating one or more device(s) that are deactivated in an idle state.
  • the device deactivated in the idle state is preferably at least one or more of the following devices: actuator 12, near-field data transmission device 14, memory unit 18 and/or processor device 20.
  • Control device 21 is preferably connected at least via a signal and/or data connection connected to the sensor device 23.
  • Sensor data or sensor signals generated by sensor device 23 can preferably be transmitted to control device 21 via the signal and/or data connection. From the control device 21 is preferred depending on the Sensor data or sensor signals at least one deactivated device can be activated (cf.
  • a detection device 96 can preferably also be supplied with energy from the energy source 22, in particular at least temporarily.
  • a receiving device 92 for receiving at least one holding device 90 for holding at least one object 2, in particular at least one mechanical key, can preferably be provided.
  • the at least one detection device 96 can be provided for detecting the presence of the at least one holding device 90 in or on the receiving device 92 and for generating detection signals and/or detection data depending on the detected presence. (see Fig. 6 and Fig. 7)
  • At least one directional antenna is provided, the directional antenna being used for transmitting energy/data and/or signals to a preferably passive NFC tag, in particular an RFID tag, and/or for receiving energy/data and/or signals from the RFID tag is provided.
  • the directional antenna is preferably connected to the processor device, data and/or signals from the NFC tag, in particular RFID tag, being transmitted via the directional antenna up to a maximum distance between the NFC tag, in particular the RFID tag, and the directional antenna Processor device can be fed.
  • the maximum distance is preferably less than 30 mm, in particular less than 20 mm or less than 10 mm, with the data and/or signals from the NFC tag, in particular an RFID tag, representing at least position signals and/or position data, with the position signals and/or or position data represents a target alignment of the lock device and/or the data and/or signals from the NFC tag, in particular an RFID tag, represent at least installation data, with the installation data being used to assign the lock device to the NFC tag, in particular an RFID tag , is evaluable. (see Fig. 2 and Fig. 7)
  • FIG. 6 another exemplary example of a lock device 10 according to the invention is shown.
  • the electronic lock device 10 is used to lock a container 1, in particular to retrofit a key safe.
  • the electric lock device 10 shown here has an electrically operable actuator 12 for transferring the electric lock device 10 from a closed configuration into an open configuration.
  • the actuator 12 can cause at least one locking element 17 to form a locking device a bolt receptacle (on the lock device side) is moved to an area outside the bolt receptacle.
  • the actuator can be provided for transferring the electric lock device 10 from an open configuration into a closed configuration.
  • the actuator 12 can cause the at least one locking element 17 of the locking device to be moved from the area outside the bolt receptacle, in particular from the locking element receptacle 60 (on the container side) into the bolt receptacle (on the lock device side).
  • Lock device 10 also has a near-field data transmission device 14 (and an antenna 15 connected to it) for receiving data from at least one mobile terminal device 16 that is temporarily located within a defined distance range from electronic lock device 10 and for sending data, in particular access data, to the at least a mobile terminal device 16 temporarily located within a defined distance range from the electronic lock device 10 .
  • Reference number 18 designates a storage unit for at least temporarily storing time data and/or access data and/or data of a sensor device and/or detection device.
  • the time data include at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data have at least authorization data and identification data.
  • the authorization data define as a function of which identification data the actuator 12 transfers the lock device 10 from the closed configuration to the open configuration, and the identification data specify an association with the mobile end device 16 .
  • a processor device 20 is provided for comparing the authorization data and the identification data. In the event of a positive comparison, the actuator 12 can be controlled by the processor device 20 to open the lock device 10, with a positive comparison preferably representing a defined match of the compared data.
  • the lock device 10 has a receiving device 92 for receiving at least one holding device 90 for holding at least one object 2, in particular at least one mechanical key.
  • the lock device 10 has at least one detection device 96 for detecting the presence of the at least one holding device 90 in or on the receiving device 92 and for generating detection signals and/or detection data depending on the detected presence.
  • the lock device 10 has at least one energy source 22 different from a fixed current connection for operating at least the actuator 12, the Near-field data transmission device 14, the storage unit 18, the detection device 96 and/or the processor device 20.
  • the receiving device 92bi ides a defined receiving area for limiting the ability to insert coupling pieces 94 from holding devices 90 to holding devices 90 which have a coupling piece 94 with a corresponding shape . Additionally or alternatively, the receiving device 92 forms a receiving area, wherein the receiving area 92 is designed to hold the holding device 90, in particular the coupling piece 94, in a form-fitting and/or force-fitting and/or field-fitting manner.
  • the receiving device 92 is preferably designed as a metal plate or metal element and the holding device 90 is preferably magnetic, in particular so strongly magnetic that the holding device 90 can be arranged or fastened to the receiving device 92 via a field circuit.
  • a detection device 96 is arranged in the area of receiving area 92, in particular arranged adjacent to receiving area 92, detection device 96 being connected at least indirectly and preferably directly to processor device 20 in order to transmit energy, data and/or signals to processor device 20.
  • the lock device 10 has an elongate base body 4 .
  • the elongate base body 4 has a first end 5 and a second end 6 spaced apart from the first end 5 in the longitudinal direction of the base body 4 .
  • the actuator 12, the near-field data transmission device 14, the memory unit 18, the processor device 20, the locking device 17, the energy source 22, the receiving device 92 and the detection device 96 are connected at least indirectly, and preferably directly, to the base body 4, in particular forming a common assembly out.
  • the first end 5 has a front cover 7, with the front cover 7 in an operating configuration facing the environment on the one hand and oriented in the direction of the interior of the container 1 on the other hand, the detection device 96 being arranged or formed at a distance from the front cover 7 in the longitudinal direction and wherein the receiving device 92 forms the second end 6 at least partially.
  • the detection device 96 is particularly preferably designed as a Hall sensor.
  • the Hall sensor Depending on a detected magnetic field, the Hall sensor generates a magnetic field signal and/or magnetic field data and transmits this to processor device 20, the magnetic field signals and/or magnetic field data indicating whether the detected magnetic field has defined properties or has properties that deviate from the defined properties.
  • the detection device 96 is a directional antenna for receiving object signals and/or object data, wherein the object signals and/or object data can be generated by an NFC tag, in particular an RFID tag, arranged or produced on or in the holding device 90 .
  • the directional antenna 96 is for receiving object signals and/or object data in the axial direction of the base body 4 aligned.
  • the processor device 20 can control the near-field data transmission device 14 to transmit object data when the processor device 20 receives object data and/or object signals that represent a defined holding device 92 .
  • the near-field data transmission device 14 can be controlled to transmit object data if the processor device 20 receives magnetic field signals and/or magnetic field data that represent a defined magnetic field.
  • locking commands for locking the lock device 10 can be received by the near-field data transmission device 14, with the actuator 12 being able to be controlled by the processor device 20 as a function of the received locking commands for locking the lock device 10.
  • the present solution thus describes a specific key holder/key fob with the holding device 90 .
  • the objects to be protected are firmly (non-detachably) attached to these.
  • the key fob has a magnetic holder with which it can be fixed on the back 6 of the lock device 10 .
  • the magnet preferably does not only have the function of fixing the key fob 90 on the back 6 .
  • a Hall sensor in the lock device 10 is used to check whether the key fob or the holding device 90 is attached to the rear wall or whether it is currently not present.
  • the key fob or the holding device 90 (on the magnet side) can be given a specific shape, the exact correspondence of which can then be found on the back 6 of the lock device 10 .
  • the field strength of the magnet can be monitored if necessary. So if a weaker or stronger magnet than the one actually intended is used, then this can be detected.
  • the key fob 90 can be equipped with an NFC tag, in particular an RFID tag (this can be done analogously to the one described above Cylinder recognition are implemented). Then the key fob 90 is only recognized as being present if the corresponding tag can be read by the lock device 10 .
  • a data exchange mechanism is used to notify the server, in particular indirectly via the mobile terminal 16, as to whether the object 2 to be protected is present or not.
  • a sensor device 23 can preferably also be supplied with energy from the energy source 22, in particular at least temporarily.
  • the lock device 10 can have at least one control device 21 for activating one or more device(s) that are deactivated in an idle state.
  • the device deactivated in the idle state is preferably at least one or more of the following devices: actuator 12, near-field data transmission device 14, memory unit 18 and/or processor device 20.
  • Control device 21 is preferably connected at least via a signal and/or data connection connected to the sensor device 23.
  • Sensor data or sensor signals generated by sensor device 23 can preferably be transmitted to control device 21 via the signal and/or data connection.
  • At least one deactivated device can be activated by the control device 21, preferably depending on the sensor data or sensor signals (cf. FIGS. 1 and 7).
  • processor device 20 compares the sensor signals and/or sensor data of sensor device 23 with defined sensor signals and/or defined sensor data, with the defined sensor signals and/or defined sensor data indicating a movement or a group of permissible movements and/or an impermissible movement or represent a group of impermissible movements, with an alarm function being able to be triggered by processor device 20 if the comparison determines that the sensor signals and/or sensor data represent movements that deviate from permissible movements and/or correspond to impermissible movements (cf. 5 and 7)
  • At least one directional antenna 70 is provided, the directional antenna 70 for transmitting energy/data and/or signals to a preferably passive NFC tag 72, in particular an RFID tag, and/or for receiving energy / Data and / or signals provided by the RFID tag.
  • the directional antenna 70 is preferably connected to the processor device 20, with data and/or signals from the NFC tag 72, in particular the RFID tag, being transmitted up to a maximum distance between the NFC tag, in particular the RFID tag, and the directional antenna 70 the directional antenna 70 of the processor device 20 can be fed.
  • the maximum distance is preferably less than 30 mm, in particular less than 20 mm or less than 10 mm, with the data and/or signals from the NFC tag 72, in particular an RFID tag, representing at least position signals and/or position data, with the position signals and /or position data represents a target orientation of the lock device 10 and/or the data and/or signals from the NFC tag 72, in particular the RFID tag, represent at least installation data, the installation data being used to assign the lock device 10 to the NFC tag 72 , In particular, an RFID tag can be evaluated. (see Fig. 2 and Fig. 7)
  • FIG. 7 shows a particularly preferred example of an electric lock device 10 according to the invention.
  • This embodiment has several of the devices and/or functions explained in relation to the embodiments explained in FIGS. Therefore, reference is made to these figures.
  • An electronic lock device for locking a container, in particular for retrofitting a key safe, therefore preferably has at least one electrically operable actuator for transferring the electric lock device from a closed configuration into an open configuration, it being possible for the actuator to cause at least one locking element of a locking device is moved out of a bolt receptacle into an area outside the bolt receptacle, or for transferring the electric lock device from an open configuration into a closed configuration, it being possible for the actuator to cause the at least one locking element of the locking device to move from the area outside the bolt receptacle into the bolt receptacle is moved.
  • the lock device preferably has a near-field data transmission device for receiving data from at least one mobile terminal device that is temporarily located within a defined distance range from the electronic lock device and for sending data, in particular access data, to the at least one mobile terminal device that is located within a defined distance range from the electronic lock device temporarily located mobile terminal, wherein the near-field data transmission device has at least one near-field data transmission antenna for receiving and / or transmitting the data.
  • the lock device according to the invention preferably has a storage unit for at least temporarily storing time data and/or access data. The time data preferably have at least data on the last opening time (reaching the open configuration) and/or at least data on the last closing time (reaching the closed configuration).
  • the access data preferably have at least authorization data and identification data.
  • the authorization data preferably define as a function of which identification data the actuator converts the lock device from the closed configuration into the open configuration.
  • the identification data preferably specifies an association with the mobile terminal device.
  • the lock device according to the invention can have one or more of the features and/or functions proposed by the present document, in particular in combination with one another.
  • the present invention can also relate to a system.
  • This system preferably has at least a large number of locking devices 1 described in the present document.
  • the system also has a large number of mobile terminals 16, with each mobile terminal 16 preferably having a near-field data transmission means 34 for data exchange with the near-field data transmission devices 14 of the lock devices 1, and each mobile terminal also preferably having a far-field data transmission means 36, in particular LTE, for data exchange with a server device 38 on.
  • each mobile terminal preferably has a processor unit 40 for executing a control application and a memory unit 42 for storing lock reconfiguration data and lock operating data.
  • the lock operating data are preferably transmitted by the near-field data transmission device 14 for forwarding to the server device 38 to the near-field data transmission means 34 of the respective mobile terminal 16 and the lock operating data preferably have at least time data and access data.
  • the time data preferably have at least data on the last opening time and/or at least data on the last closing time.
  • At least one server device 38 is particularly preferably provided, with the server device 38 receiving the lock operating data from the respective mobile terminal device 16 and, after receiving the lock operating data, generating lock reconfiguration data and sending this to the mobile terminal device 16, from which it received the lock operating data has received or sends it to another mobile terminal device 16 that is assigned to the lock device 1, or to a group of mobile devices 16, all of the mobile devices 16 assigned to the group being assigned to the lock device 1.
  • FIGS 8 to 11 show a purely schematic example of a sequence of the method according to the invention for actuating, in particular opening and/or closing, a lock device 10, in particular a safe, such as a key safe.
  • an electric lock device 10 in particular for locking a container without a permanent internet connection, is provided, wherein the container, in particular an electric one closing the container
  • Lock device 10 having a near-field communication device and thereby specifies a near-field communication range.
  • At least one mobile end device 16 is provided, in particular a large number of mobile end devices, in particular more than 5 per 100 km2 or more than or up to 10 per 100 km2 or more than or up to 15 per 100 km2 or more than or up to 25 per 100km2 or more than or up to 50 per 100km2 or more than or up to 100 per 100km2 or more than or up to 200 per 100km2 or more than or up to 500 per 100km2.
  • the mobile terminal device 16 has a near-field data transmission means 34 for data exchange with the near-field data transmission device 14 of the electric lock device 10, and it also preferably has a particularly preferred wireless far-field data transmission means 36, in particular GSM, UMTS, LTE, etc., for data exchange with a server 38.
  • a wireless far-field data transmission means 36 in particular GSM, UMTS, LTE, etc.
  • a transmission infrastructure in particular one or more transmission stations, in particular transmission masts, is used according to the invention.
  • the far-field data transmission means 36 transmits and preferably receives data at the same time or at different times or at times at the same time.
  • the far-field data transmission means 36 receives the received data via the transmission infrastructure, with the transmission infrastructure receiving data from a server or a server device 38, in particular a cloud server.
  • the transmitted data are transmitted from the far-field data transmission device 36 to the transmission infrastructure for forwarding to the server or the server device 38 .
  • the mobile terminal 16 has a processor unit 40 (or processor device) for executing a control application, and the mobile terminal 16 also has a memory unit 42 (or memory device) for storing data, in particular lock reconfiguration data and lock operating data. All data that is transmitted from the central server unit or from the lock unit to the mobile application and is (temporarily) stored there is preferably protected from external access by encryption, in particular by local encryption. This means that preferably neither the user of the application himself nor a third party can directly access the data stored in the mobile application, in particular not by reading out the physical memory of the mobile device.
  • the encryption method and/or the exact parameters of the encryption are preferably centrally configured by the administrator of the server unit and transmitted from there to the mobile application.
  • FIG. 9 shows schematically that the mobile terminal receives access data from a server or a server device, with the access data being transmitted via the transmission infrastructure.
  • the user rights and/or the lock configurations, and preferably the transmission of all relevant sensor data or other data from the lock units, is/are preferably managed by one or more operators/administrators.
  • FIG. 10 shows schematically that the mobile terminal 16 transmits the access data to the lock device via the near-field data transmission device.
  • the lock operating data are then transmitted by the near-field data transmission device 14 to the near-field data transmission means 34 of the mobile terminal device 16 for forwarding to the server device. It can be seen purely schematically that the mobile terminal device 16 is outside the range of the transmission infrastructure or cannot set up a mobile data connection to the Internet.
  • Fig. 11 shows schematically that the mobile terminal device 16, as soon as it is back in the coverage area of the transmission infrastructure or as a result of a defined triggering event (only if there is an existing data connection to the Internet), in particular a keystroke and/or a location data comparison and/or a time comparison, sends lock operating data to the Server or the server device transmitted.
  • a defined triggering event only if there is an existing data connection to the Internet
  • a keystroke and/or a location data comparison and/or a time comparison sends lock operating data to the Server or the server device transmitted.
  • the mobile terminal 16 receives the lock reconfiguration data from the server 38 via the far-field data transmission means 36, the lock reconfiguration data being generated in response to the lock operating data transmitted to the server 38 by means of the near-field data transmission means 34, the lock operating data having at least time data and access data.
  • Figures 8 to 11 thus show a method for opening an electric lock device 10.
  • the method has at least the following steps: providing an electric lock device 10, providing at least one mobile terminal device 16, the mobile terminal device 16 having a near-field data transmission means 34 for data exchange with the Near-field data transmission device 14 of electric lock device 10, mobile terminal 16 having far-field data transmission means 36, in particular LTE, for data exchange with a server 38, mobile terminal 16 having a processor unit 40 for executing a control application, mobile terminal 16 having a memory unit 42 for storing lock reconfiguration data and lock operating data, the lock operating data being transmitted by the near-field data transmission device 14 to the near-field data transmission device 34 for forwarding to the server device 38 mobile terminal 16 and wherein the mobile terminal 16 receives the lock reconfiguration data from the server 38 via the far-field data transmission means 36, the lock reconfiguration data being generated in response to the lock operating data transmitted to the server 38 by means of the near-field data transmission means 34, the lock operating data having at least time data and access data .
  • FIG. 12 shows a schematic sequence of the method according to the invention, this sequence having a large number of additional or alternative steps.
  • the steps S1-S25 shown include:
  • the operator/administrator creates a lock unit 10 with a unique identifier on the central server unit 38 and, if necessary, links it to a lock group.
  • the operator/administrator creates a user/service person on the central server unit 38 or provides a defined user group with the option of registering themselves on the central server unit 38 (self-service).
  • the user loads the necessary software from an app store or another online storage location onto his mobile device or mobile end device (e.g. smartphone). In principle, this can be done from anywhere in the world.
  • his mobile device or mobile end device e.g. smartphone
  • the user registers with the central server unit 38 via his app. To do this, he uses known access data (as created by the operator/administrator in step 1) or he registers in the case of self-service and chooses his own access data accordingly.
  • the central server unit 38 checks whether this user or the group(s) in which the user is assigned have access rights to one or more locks or lock groups. If access rights are present, they are preferably transmitted in encrypted form to the mobile unit or the mobile terminal 16 (possibly with additional information present).
  • the access rights can also be subject to time restrictions. For example, an access right can expire automatically after 24 hours if there is no further synchronization between the mobile unit 16 and the central server unit 38 during this period.
  • the system clocks in particular are also compared, so that deviations in the clocks can be taken into account in each case. 56.
  • the access data and additional information received from the mobile unit 16 are temporarily stored in encrypted form locally in a “virtual key ring”.
  • the mobile unit 16 regularly checks whether an access right still exists and, if necessary, deletes all access rights that have already expired.
  • the mobile unit 16 will either automatically (in the background) establish a connection to the lock device, or after manual input in the mobile unit (“Connect button").
  • the connection between the mobile unit 16 and the lock device can be further encrypted beyond the encryption contained in the transmission standard.
  • the lock device 10 When establishing the connection to the mobile unit 16, the lock device 10 transmits a unique identifier to the mobile unit 16. If necessary, further information can also be transmitted (e.g. belonging to a specific lock group).
  • the mobile unit 16 checks whether there are access rights in the local memory for this lock device 10 or the lock group. A connection to the central server unit 38 is not established.
  • an access right exists, it may be necessary (depending on the configuration by the operator/administrator) that additional keys are required to operate the lock device 10 (e.g. entering a pin, scanning a barcode, etc.) which are entered in the mobile unit and sent to the lock device 10 must be transferred. It may also be necessary for a connection to the central server unit 38 to be established, since the configuration specifies that the lock can only be opened when there is a connection between the mobile unit and the central server unit 38 in order to further increase security, since a active connection, the access rights between mobile and central unit are always synchronized.
  • the mobile unit 16 sends a signal to the lock device 10 (after a positive check) to open it and transmits the corresponding key.
  • the lock device 10 checks the key and will store both the connection attempt and the result of the check, as well as all transmitted information about the user or the mobile unit 16 in the internal temporary memory.
  • the lock device 10 releases the locking mechanism and will also store this event in the temporary memory. 514.
  • the mobile unit 16 now transmits data to the lock device 10 which have been linked to the access right in the central server unit 38 .
  • the information that data provided by the lock device can be received there and now deleted locally.
  • changes to the local configuration of the software of the lock device 10 can also be transmitted.
  • the lock device 10 will delete from the local memory the data received from the central unit and perform all other necessary operations.
  • the lock device 10 now transmits all data from the temporary memory (log data on accesses, access attempts, as well as all stored sensor data to the mobile unit 16. All data that have already been marked for deletion are also transmitted, but receipt by the central server unit 38 has not yet been confirmed.
  • the mobile unit 16 receives the data from the lock device 10 and stores it in a protected area. Receipt is preferably acknowledged.
  • the lock device 10 will now mark all transmitted data with additional information (mark for deletion), but will not delete it yet, since it is not yet certain that this data has also been received on the server unit 38. If necessary, data that has been transmitted several times is enriched with further information.
  • the mobile unit 16 will now attempt to contact the central server unit 38 at the next possible time or at a configured time and to transmit the data transmitted from the lock device 10 there.
  • the acknowledged data is now deleted from the mobile unit's 16 temporary memory.
  • the central server entity now updates the access right to the specific lock with the information that the defined data has been received and can be deleted locally (taking into account the information which data has already been deleted from the entity).
  • the right of access is now synchronized with all mobile units 16 that have access to the specific lock or to the associated group of locks or the lock device 10 .
  • a method for asymmetrical or indirect transmission of data between a transmitter and a receiver is thus disclosed.
  • sensor data e.g.
  • sensor data that is collected at locations where there is no internet connection or no connection to an alternative suitable transmission network temporarily or permanently can be transmitted to a central server.
  • Such "offline situations" occur in dead spots, underground, under water, etc.
  • the solution according to the invention is preferably based on the method, also described herein, for the secure assignment of unambiguous access rights without the use of specialized hardware and without an existing Internet connection.
  • a mobile application that runs on a device, in particular a server and/or several mobile devices, which is connected to a server device, in particular a central server, via a mobile data connection and from which (similar to the method described above) access Can receive keys and hold them locally.
  • the mobile device or mobile end device 16 must be brought close to the electric lock device 10 so that the near-field transmission means 34 of the mobile Terminal 16 can receive raw or processed or partially processed sensor data from one or more sensors arranged on or in the electric lock device 10 .
  • the sensor data can be transmitted to the near-field data transmission means 34 of the mobile terminal device 16 via the near-field data transmission device of the electric lock device 10 .
  • the sensor or the sensor device and/or detection device is provided with or coupled to or connected to an electronic device, in particular the processor device 20, which processes the data made available by the sensor device and/or detection device, in particular in a configurable manner, locally, in particular in a storage unit 18.
  • the mobile device 16 If the mobile device 16 comes within range of the near-field data transmission device 14, it authenticates itself, preferably using the access key, to the electric lock device 10, in particular the processor device 20, and requests the content or defined data of the data held or cached in the local memory, in particular time and/or sensor data and/or detection data.
  • the processor device 20 accepts the access and the request, the transfer requested data to the mobile device 16 (e.g. Bluetooth or NFC or WLAN).
  • the mobile terminal device 16 After checking the completeness and correctness of the transmitted data, the mobile terminal device 16 preferably sends a delete signal or delete data, which triggers the deletion of at least part of the locally stored or cached data, in particular the sensor data and/or the detection data and/or time data (temporary memory emptied). Otherwise, the transmission is preferentially requested again.
  • Configuration changes can also be transmitted to the electric lock device 10 via the same mechanism and the local times (lock device 10 and mobile device) can be synchronized.
  • the electric lock device 10 and the sensor or sensors arranged or provided therein preferably work completely independently and collect or collect data until the next access by the mobile application.
  • the lock device data in particular the data generated by the sensor(s), can thus be transmitted in full to a central unit, in particular the server device 38, even without a permanent Internet connection, by upstream transmission to a mobile terminal device 16.
  • a method for the asymmetric or indirect transmission of data between a transmitter (mobile terminal 16) and a receiver (lock device 10) is provided, wherein after the data structure, the mobile terminal 16 also receives data from the electric lock device 10 or the electric lock device 10 data to the mobile terminal 16 sends.
  • Locking element holder (container side)
  • Touch sensor optical sensor in particular light barrier

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

La présente invention concerne un dispositif de serrure (10) électrique qui comprend au moins un dispositif de détection destiné à détecter au moins un mouvement du dispositif de serrure (10) et à générer des signaux de détection et/ou des données de détection en fonction du mouvement détecté, au moins une source d'énergie (22), autre qu'une connexion électrique fixe, servant à faire fonctionner au moins l'actionneur (12), le dispositif de transmission de données en champ proche (14), l'unité de stockage (18), le dispositif processeur (20) et/ou le dispositif de détection, ainsi qu'au moins un dispositif de commande destiné à activer un ou plusieurs dispositifs désactivés au repos, le dispositif désactivé au repos étant au moins un ou plusieurs des dispositifs suivants : l'actionneur (12), le dispositif de transmission de données en champ proche (14), l'unité de stockage (18) et/ou le dispositif processeur (20).
EP21839982.2A 2020-12-18 2021-12-16 Dispositif de serrure électronique, en particulier d'un coffre-fort à clé, et procédé pour faire fonctionner ce dispositif de serrure électrique Pending EP4264578A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102020216345.6A DE102020216345A1 (de) 2020-12-18 2020-12-18 Elektronische Schlossvorrichtung, insbesondere eines Schlüsseltresors, und Verfahren zum Betreiben der elektrischen Schlossvorrichtung
PCT/EP2021/086309 WO2022129411A2 (fr) 2020-12-18 2021-12-16 Dispositif de serrure électronique, en particulier d'un coffre-fort à clé, et procédé pour faire fonctionner ce dispositif de serrure électrique

Publications (1)

Publication Number Publication Date
EP4264578A2 true EP4264578A2 (fr) 2023-10-25

Family

ID=79287602

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21839982.2A Pending EP4264578A2 (fr) 2020-12-18 2021-12-16 Dispositif de serrure électronique, en particulier d'un coffre-fort à clé, et procédé pour faire fonctionner ce dispositif de serrure électrique

Country Status (4)

Country Link
US (1) US20240062603A1 (fr)
EP (1) EP4264578A2 (fr)
DE (1) DE102020216345A1 (fr)
WO (1) WO2022129411A2 (fr)

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006045195B3 (de) 2006-09-25 2008-04-30 Seccor High Security Gmbh Codeeingabeeinheit für elektronische Schließzylinder
US20090167526A1 (en) * 2007-12-31 2009-07-02 Todd Graves Lockbox tamper detection
US9447609B2 (en) * 2013-03-15 2016-09-20 August Home, Inc. Mobile device that detects tappings/vibrations which are used to lock or unlock a door
US9133647B2 (en) * 2013-10-11 2015-09-15 Nexkey, Inc. NFC or BLE based contactless lock with charge monitoring of its energy storage
DE102013111429A1 (de) * 2013-10-16 2015-04-16 Lock Your World Gmbh & Co. Kg Verfahren zum Betreiben eines Schließsystems sowie Schließsystem
US20160042582A1 (en) * 2014-08-08 2016-02-11 RPH Engineering Electronic locking system
DE102015113243B4 (de) 2015-08-11 2023-10-12 Schulte-Schlagbaum Aktiengesellschaft Drahtlos mit einer Zentraleinheit kommunizierendes Schranktürschloss
EP3566214A1 (fr) 2017-01-04 2019-11-13 Knox Associates, Inc. DBA Knox Company Armoire de stockage électronique
WO2019068021A1 (fr) * 2017-09-28 2019-04-04 Gate Labs Inc. Systèmes d'accès et procédés d'utilisation
US10125519B1 (en) * 2017-12-05 2018-11-13 Noke, Inc. Wireless-enabled interchangeable locking core
US10783731B2 (en) * 2018-04-27 2020-09-22 Spectrum Brands, Inc. Wireless tag-based lock actuation systems and methods
DE102018123060A1 (de) * 2018-09-19 2020-03-19 ASTRA Gesellschaft für Asset Management mbH & Co. KG Verschlusselement und Rohrtresor mit einem solchen Verschlusselement
DE102019000559A1 (de) 2019-01-25 2020-07-30 Smart Access Solutions UG (haftungsbeschränkt) Behältnis, Verfahren und System zum Ermöglichen einer Offlinezugangskontrolle und zum Ermöglichen einer Offlinesensordatenübermittlung
US11132855B2 (en) * 2019-04-14 2021-09-28 Bassem ALHALABI Pattern recognition locking system and method of operation

Also Published As

Publication number Publication date
WO2022129411A3 (fr) 2022-09-29
WO2022129411A2 (fr) 2022-06-23
DE102020216345A1 (de) 2022-06-23
US20240062603A1 (en) 2024-02-22

Similar Documents

Publication Publication Date Title
EP3584770B1 (fr) Procédé de fonctionnement d'un système de fermeture, système de fermeture et coffre-fort tubulaire
EP2238576B1 (fr) Procédé et dispositif de commande du contrôle d'accès
DE102012221016B4 (de) Schließeinheit, Schließvorrichtung und Verfahren zum Entriegeln und/oder Verriegeln eines Schlosses
DE19603320C2 (de) Elektronisch programmierbares Schließsystem mit Schloß und Schlüssel
EP2304694A1 (fr) Procédé de fonctionnement d'un système de fermeture
EP2936469B1 (fr) Téléphone mobile pour la commande à distance d'une fonction d'un dispositif de sécurité d'un véhicule automobile
DE60125804T2 (de) Fernbedienbares türschloss
DE102007060810A1 (de) Anordnung, System und Verfahren zur drahtlosen Steuerung eines Gerätes
EP0877333B1 (fr) Appareil pour le transfert d'énergie sans fil et exécution d'une action
EP2460147B1 (fr) Dispositif de fermeture électronique
EP2717233B1 (fr) Dispositif d'identification d'un chat à des fins de commande d'une chatière électronique
EP3582192B1 (fr) Procédé de régulation d'un régime d'accès à un objet, unité de fermeture et système de fermeture
EP4264578A2 (fr) Dispositif de serrure électronique, en particulier d'un coffre-fort à clé, et procédé pour faire fonctionner ce dispositif de serrure électrique
EP3027827B1 (fr) Poignée de fenêtre, verrouillable de façon électromagnétique
WO2017157831A1 (fr) Système de déverrouillage d'une serrrure d'un espace à verrrouiller
DE102015118945A1 (de) Fernbedieneinheit für Gebäudeeinrichtungen und Torantriebsanordnung mit NFC-Nutzerschnittstelle
DE102015113243B4 (de) Drahtlos mit einer Zentraleinheit kommunizierendes Schranktürschloss
DE102004056987A1 (de) Schließvorrichtung und Schließanlage, umfassend wenigstens eine Schließvorrichtung
DE102008058660A1 (de) Zutrittskontrollsystem
DE20001663U1 (de) Anordnung zur fernbedienbaren Zentralverriegelung für Schlösser, insbesondere Möbelschlösser
DE102018129706A1 (de) Drahtloses Öffnungssystem
DE202016009153U1 (de) System zur Entriegelung eines Schlosses an einem abzusperrenden Raum
AT13608U1 (de) Verfahren und Vorrichtung zur Steuerung der Zutrittskontrolle
EP3133559A2 (fr) Systeme de fermeture de batiment
DE202010016268U1 (de) Transponder mit Eingabevorrichtung, Zeicheneingabe-Verriegelungsvorrichtung und Zeicheneingabe-Schloss

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20230704

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)