-
The present disclosure relates to a method of managing access for a managed residential building as well as to devices for managing access for a managed residential building. Specifically, the present disclosure relates to a computer-implemented method of managing access for a managed residential building, further to a data processing apparatus, and a lock apparatus, and a mobile device, each configured to at least partially perform said method. Moreover, the present disclosure relates to a computer program product for execution of said method on a data processing apparatus.
-
Computer-implemented methods of managing access for a managed residential building, and respective devices, are known with respect to managing electronic locks of private doors and common doors in a managed residential building. For example, a system of the present applicant is known, the system being called Resivo. Within an access management platform, the so-called Resivo Admin Portal, managers or administrators of managed residential buildings can assign access rights to certain persons, for example when a rental agreement of new tenants starts. Thereby, the complexity of change of tenants, for example with respect to apartment handovers, is reduced. No time-consuming key management is necessary since a fully digital access management is possible with no physical keys anymore, but with the help of digital keys using credentials that, when being presented to an electronic lock, allow the entrance through the respective door including the electronic lock.
-
However, according to the known system, it is necessary that a person to be granted access to the managed residential building always needs to have a private area (such as an apartment) assigned before a transmission of credentials to the possession of the person can take place. Accordingly, the known system's flexibility is limited in the sense that the person can only be granted access to both, a private door (or several private doors) as well as a common door (or several common doors), at the same time.
-
Nevertheless, there are situations when a manager or an administrator would like to give permission to a future tenant to already be able to enter the managed residential building in terms of being able to enter common areas of the managed residential building already, however, without being able to enter the private area (such as the apartment) yet. For example, this is of interest when the official starting date of the rental agreement has not arrived yet but, nevertheless, the tenant should be able to enter already a common area such as a garage or such even before the start of the rental agreement. In these cases, a time-consuming personal meeting between the manager or administrator, or for example a caretaker, usually needs to take place in order to enable the tenant to enter such common area already in advance, prior to the actual start of the rental agreement. Also, the known system is limited regarding managed residential buildings that do not yet have private doors with electronic locks. Then, the use of the described management system is not possible since electronically accessible private doors with respective credentials need to be assigned to a person if it is wished to assign to the person a credential (digital key) for a common door.
-
In view of the aforementioned, it is an object of the present invention to provide an improved computer-implemented method of managing access for a managed residential building, as well as to provide an improved respective data processing apparatus, by means of which a more flexible access management of new tenants is made possible. In addition, it is an object of the present invention to provide an improved lock apparatus, as well as an improved mobile device, as well as an improved computer program product, by means of which a more flexible access management of new tenants is supported.
-
According to the present disclosure, these objects are achieved through the features of the independent claims. In addition, further advantageous embodiments follow from the dependent claims and the description.
-
In detail, the above-mentioned object of a more flexible access management of new tenants is achieved particularly, according to the present disclosure, by a computer-implemented method of managing access for a managed residential building, the managed residential building having at least one or more common door(s) including an electronic lock (each including an electronic lock), and the managed residential building having at least one private door. The suggested computer-implemented method is also applicable for managing access for several managed residential buildings, for example a managed residential area, wherein the managed residential area at least comprises a first managed residential building and a second managed residential building, or even more managed residential buildings. According to the suggested computer-implemented method, the common door controls (or the common doors control) access to a common area of the managed residential building, and the at least one private door controls access to a private area allocated to a first person according to a rental agreement information. In case of several common doors, each common door could provide an entrance to a specific individual common area, for example a first common door to a first common area and a second common door to a different second common area, or several common doors could also provide an entrance to the same common area, such as a shared common area (for example a single room or a single common area that can be entered through the several common doors at two different points). According to the suggested computer-implemented method, the first person initially, at a starting point in time, does not yet have any electronic access rights for the common area of the managed residential building. In particular, the first person initially does not yet have any electronic access rights for the managed residential buildings, thereby not being able to enter electronically the managed residential buildings at all. Furthermore, it could be the case that, in particular, the first person initially does not yet have any access rights for the managed residential buildings, thereby not being able to enter the managed residential buildings at all. The suggested computer-implemented method is being performed by an access management platform and comprises at least the following steps:
- receiving a pre-access activation request to assign an electronic pre-access credential to the first person, wherein the electronic pre-access credential grants the first person, at a pre-access point in time, only the right to open the common door (the common doors) for accessing the common area; and
- generating the electronic pre-access credential associated with an identifier of the first person; and
- transmitting the electronic pre-access credential to the electronic lock of the common door (of the common doors), thereby, at the pre-access point in time, configuring the electronic lock of the common door (each electronic lock of the common doors) to unlock if the electronic pre-access credential is provided by a mobile device of the first person; and
- sending an application-installation invitation to the mobile device of the first person, thereby enabling the first person to install and activate a mobile application through which the electronic pre-access credential is receivable and/or storable.
-
With respect to a data processing apparatus, the above-mentioned object is achieved by a suggested data processing apparatus configured to perform the suggested computer-implemented method as described before or hereinafter (for example according to any one of the claims 1 to 11). The suggested data processing apparatus comprises the access management platform or is configured to communicate with the access management platform.
-
An essential advantage of the present invention is that a higher flexibility is gained when managing a single or a plurality of managed residential buildings due to a management process being applicable to several different situations. The reason is that a new tenant who shall enter the building according to his rental agreement does not have to be allocated with a private door including an electronic lock anymore in order to receive a permission to enter common doors. Due to the fact that a single access right only with respect to common doors can be granted to the first person, the first person does not have to be given overall permissions (including for example the permission to enter electronically controlled private doors as well) for being able to enter the managed residential building at all. Hence, in a situation where the managed residential building simply has electronic locks in connection with common doors, but no electronic locks (at least no electronic locks according to the same manageable system) in connection with private doors, the access management platform can be used to provide the first person with the exclusive access right of only being able to unlock common doors. Accordingly, the first person as a new tenant can easily be given automatically and from a distance the right to be able to enter the managed residential building. Advantageously, even in the case that private doors and common doors include electronic locks and are manageable via the access management platform, the present invention can facilitate the management process in that a permission to enter, at the pre-access point in time, is only given to the first person with respect to the common doors whereas the private door or doors are not accessible yet. Thereby, the first person could already enter the managed residential building but not yet its private area. This can be of interest during a time after having signed a rental agreement but before the beginning of the contract period, for example even while previous tenants are still living in the later-rented private area.
-
The features and advantages described above and below in the context of the suggested computer-implemented method being performed by an access management platform (for example according to any one of the claims 1 to 11) can be transferred in an appropriate manner to the suggested data processing apparatus (for example according to claim 12). In particular, the computer-implemented method can be configured to be performed by the suggested and described data processing apparatus. The suggested and described data processing apparatus is in turn preferably configured to execute the suggested computer-implemented method. In this respect, the features and specific advantages relating to the suggested data processing apparatus or the respective suggested computer-implemented method are regularly described collectively only once. Features described in connection with the computer-implemented method can be included accordingly in an appropriate manner in claims relating to the data processing apparatus and vice versa.
-
By way of example, also several private doors either controlling access to one private area, such as several doors providing entrance to one apartment, or controlling access to several private areas (such as for example two different apartments on different floors or to an apartment and a personal garage) can be provided and allocated to the first person according to the rental agreement information. Furthermore, also several common areas might exist, such as the hall of the building with the common door in terms of the main entrance door and additionally a garage with a separate common door and additionally a fitness room with another common door. The access rights might be granted to the first person with respect to all common doors or only with respect to a selection of common doors, as well as (at the later full-access point in time) with respect to all private doors or only with respect to a selection of private doors.
-
In particular, the access management platform is an online web application, moreover in particular not a mobile application. For example, the Resivo Admin Portal of the applicant can be used as access management platform.
-
In particular, the pre-access activation request can be entered in the access management platform, for example by a manager managing the relevant rental agreement information.
-
In particular, by generating the electronic pre-access credential (and later optionally the electronic full-access credential) associated with an identifier of the first person, an unambiguous allocation of credentials to the identity of a person (the tenants) can be achieved.
-
In particular, the application-installation invitation can be sent to the mobile device of the first person via e-mail communication. Particularly, the e-mail then has the invitation link with the help of which the mobile application can be installed by the first person on its mobile device. The mobile application for example can be the Resivo Home App of the applicant. Advantageously, when installing the mobile application, the first person automatically can also have stored the the electronic pre-access credential (and optionally the electronic full-access credential) on its mobile device within said mobile application.
-
In an embodiment, the at least one private door includes an electronic lock.
-
In an embodiment, the computer-implemented method further comprises at least the following steps:
- receiving a full-access activation request to assign an electronic full-access credential to the first person, wherein the electronic full-access credential grants the first person the right to open the common door (doors) for accessing the common area and the right to open the at least one private door for accessing the at least one private area;
- generating the electronic full-access credential associated with the identifier of the first person;
- transmitting the electronic full-access credential to the electronic lock of the common door (doors) and to the electronic lock of the first person's private door, thereby, at a full-access point in time after the pre-access point in time, configuring the electronic locks (of the common door(s) and the private door(s)) to unlock if the electronic full-access credential is provided by a mobile device of the first person;
- sending the electronic full-access credential to the mobile device of the first person using the mobile application installed thereon.
-
Advantageously, the first person, after already being able to enter common areas, then can be given the permission to also enter the private area.
-
In an embodiment, the computer-implemented method further comprises at least the following step:
transmitting the electronic pre-access credential also to the electronic lock of the first person's private door, thereby, at a full-access point in time after the pre-access point in time, configuring also the electronic lock of the first person's private door to unlock if the electronic pre-access credential is provided by the mobile device of the first person.
-
Advantageously, with the use of the same credential, the first person then can be allowed to enter not only the common area but also the private area.
-
Preferably, in an embodiment, before the step of transmitting the electronic pre-access credential also to the electronic lock of the first person's private door, the following step is performed:
receiving an extension for full-access request to adapt the electronic pre-access credential for the first person, thereby initiating the granting process of the right to open additionally to the first common door (doors) also the at least one private door.
-
Advantageously, within the access management platform, the extension of the access rights for the first person for being able to also enter private areas after already being able to enter common areas needs to be actively performed by, for example, a manager.
-
In an embodiment, the computer-implemented method further comprises at least the following step:
predefining the pre-access point in time (and/or predefining the full-access point in time) under a predetermined condition related to the rental agreement information, in particular according to a date of a start of a rental agreement, and/or in particular according to a confirmation of payment, for example a confirmation of payment of a rent and/or of a deposit.
-
Advantageously, via the predefinition of the pre-access point in time, the manager can control in advance within the access management platform, from which point of time on an access should be possible. Moreover preferably, an additional point of time, via the predefined full-access point in time, can be determined as to when the first person (tenant) can also additionally enter its private area. Advantageously, these point of times, from which on an access to certain areas is possible, can be made dependent on pre-conditions, such as if the tenant has paid a deposit or as when the actual rental agreement will start. Additionally or alternatively, the definition of point of times can be made within the access management platform already at the beginning.
-
In an embodiment, the electronic lock) is (or the electronic locks are) configured to communicate via a communication network with the access management platform, preferably reciprocally.
-
In an embodiment, the computer-implemented method further comprises at least the following steps:
- storing the electronic pre-access credential and/or storing the electronic full-access credential in an access management platform whitelist; and
- verifying if a used electronic pre-access credential, and/or verifying if a used electronic full-access credential, being transmitted from the electronic lock (locks), corresponds (correspond) to the electronic pre-access credential (and/or the electronic full-access credential) stored in the access management platform whitelist;
wherein the step of transmitting the pre-access credential (and/or transmitting the electronic full-access credential) to the electronic lock(s) and configuring the electronic lock(s) only is executed if the step of verification is positive.
-
Advantageously, the credential(s) can be stored preferably only online within the access management platform, thereby guaranteeing a high level of security. Credential(s) within the whitelist online, can then be credential(s) who have access to the respective common area (or even private area). In case the credential(s) is (are) not stored within the lock(s), then a fraudulent use in terms of trying to get possession of the credential(s) by accessing the lock(s) can be made relevantly more difficult.
-
In an embodiment, the computer-implemented method further comprises at least the following steps:
- receiving entrance execution data via the communication network from the electronic lock(s), and/or receiving entrance execution data via a communication network from the mobile application; and
- storing the entrance execution data, the entrance execution data comprising:
- a time of entrance information about when the electronic lock(s) is or has been opened (are or have been opened); and/or
- a user information about which electronic pre-access credential (and/or which electronic full-access credential) is or has been used (are or have been used) to open the electronic lock(s); and/or
- a medium information about which mobile device and/or about which mobile application is or has been used (are or have been used) to open the electronic lock(s).
-
Advantageously, a control of the uses of the doors, for example as to who is opening doors when and by which medium, can be provided, thereby for example being able to draw conclusion when something extraordinary happened in common areas. For example, a damage in a common area or even with respect of a common door, which possibly could have been caused by a plurality of persons (tenants) could be better analysed with respect to a potential person responsible for the damage. In case a communication network between the mobile application and the access management platform is used, then it could be a different or even the same communication network, as being used between the access management platform and the electronic lock(s).
-
In an embodiment, the step of transmitting the pre-access credential and/or the step of transmitting the electronic full-access credential to the electronic lock(s) is executed via a direct communication via the communication network.
-
Advantageously, online doors or locks can be provided enabling a communication via the communication network.
-
In an embodiment, the step of transmitting the pre-access credential and/or the step of transmitting the electronic full-access credential to the electronic lock(s) is executed via an indirect communication by the step of:
transmitting, at a first point in time, the pre-access credential (and/or the electronic full-access credential) to a manager's mobile device, in particular of a caretaker, thereby leading to a necessity of transmitting, at a second point in time after the first point in time, the pre-access credential (and/or the electronic full-access credential) from the manager's mobile device to the electronic lock(s).
-
Advantageously, even offline doors or locks can be used according to the suggested method. In particular, the manager or caretaker could use a management app, such as a so-called utility app, which is not available for the tenants (first person). The manager or caretaker then could provide the credential(s) to the lock(s) so that no direct online connection between the access management platform and the respective lock(s) would be needed for this step.
-
In an embodiment, the pre-access credential and/or the electronic full-access credential is (are) encrypted, preferably using asymmetric encryption.
-
An example for the asymmetric encryption is the Elliptic Curve Cryptography. Advantageously, the credential(s) is (are) configured as being not readable by the mobile device (or the mobile application) of the first person, but being only readable by the electronic lock(s) and/or the access management platform. In particular, especially with respect to the suggested systems and methods, the credential(s) is (are) transmitted in encrypted form from the access management platform to the mobile device (in particular the mobile application). The credential(s) also remain(s) stored in an encrypted manner on the mobile device. The credential(s) is (are) then also transmitted in encrypted form to the electronic lock at the moment of intention of access. Only at the electronic look, the credential(s) then is (are) decrypted in order to make the access decision by the verifying step.
-
In an embodiment, the computer-implemented method further comprises the step of deactivating the right to open the common door(s) and/or to open the at least one private door, preferably by:
- deleting the electronic pre-access credential and/or the electronic full-access credential from a whitelist; and/or
- storing the electronic pre-access credential and/or the electronic full-access credential on a blacklist, wherein the blacklist is assigned with priority in comparison to the whitelist; and/or
- transmitting the electronic pre-access credential and/or the electronic full-access credential to the electronic lock of the common door(s) and/or of the at least one private door, thereby configuring the electronic lock(s) not to unlock anymore if the electronic pre-access credential and/or the electronic full-access credential is provided by the mobile device of the first person.
-
Advantageously, in case of a lost or stolen mobile device of the first person with the credential(s) being stored thereon or in case of wishing not to grant access anymore to the first person, the suggested method guarantees a simple and fast way of adapting the access rights by invalidating previous access right.
-
With respect to a lock apparatus, the above-mentioned object is achieved by a suggested lock apparatus configured to at least partially perform the suggested computer-implemented method as described before or hereinafter (for example according to any one of the claims 1 to 11), when interacting with the access management platform or when interacting with the suggested data processing apparatus. The suggested lock apparatus comprises the electronic lock and is configured to lock and unlock the common door.
-
In addition, according to an independent aspect of the invention, a method of managing access for a managed residential building is suggested, the managed residential building having at least a common door including an electronic lock or having several common doors each including an electronic lock, and the managed residential building having at least one private door, the common door controls (or, respectively, the common doors control) access to a common area of the managed residential building, and the at least one private door controls access to a private area allocated to a first person according to a rental agreement information, wherein the first person initially, at a starting point in time, does not yet have any electronic access rights for the common area of the managed residential building, the method being performed by a lock apparatus and comprising at least the following steps:
- receiving an electronic pre-access credential of the first person, wherein the electronic pre-access credential grants the first person, at a pre-access point in time, only the right to open the common door(s) for accessing the common area;
- configuring the electronic lock of the common door(s) to unlock if the electronic pre-access credential is provided by a mobile device of the first person.
-
In addition, according to an independent aspect of the invention, a lock apparatus is suggested, configured to at least partially perform the suggested method of managing access for a managed residential building being performed by a lock apparatus as described before or hereinafter, wherein the lock apparatus comprises the electronic lock and is configured to lock and unlock the common door.
-
The features and advantages described above and below in the context of the suggested method being performed by a lock apparatus can be transferred in an appropriate manner to the suggested lock apparatus. In particular, the method can be configured to be performed by the suggested and described lock apparatus. The suggested and described lock apparatus is in turn preferably configured to execute the suggested method. In this respect, the features and specific advantages relating to the suggested lock apparatus or the respective suggested method are regularly described collectively only once. Features described in connection with the method can be included accordingly in an appropriate manner in claims relating to the lock apparatus and vice versa.
-
In an embodiment, the lock apparatus comprises a whitelist for storing the electronic pre-access credential and/or the electronic full-access credential. In an embodiment of the method being performed by a lock apparatus, the method further comprises the step of storing the electronic pre-access credential and/or the electronic full-access credential in a whitelist.
-
Advantageously, the credential(s) can be stored, after being transmitted to the electronic lock, in said whitelist, thereby the whitelist being responsible for keeping all the credential(s) granting persons the right to open the respective door(s). Storing can advantageously take place offline.
-
In addition, according to an independent aspect of the invention, a system is suggested, comprising the suggested data processing apparatus as described before or hereinafter (for example according to claim 12), and the suggested lock apparatus as described before or hereinafter, the data processing apparatus and the lock apparatus being in interactive connection with each other, preferably thereby performing the suggested computer-implemented method being performed by a access management platform as described before or hereinafter (for example according to any one of the claims 1 to 11), and/or preferably thereby performing the suggested method being performed by a lock apparatus as described before or hereinafter.
-
With respect to a mobile device, the above-mentioned object is achieved by a suggested mobile device configured to at least partially perform the suggested computer-implemented method as described before or hereinafter (for example according to any one of the claims 1 to 11), when interacting with the access management platform or when interacting with the suggested data processing apparatus. The suggested mobile device comprises the mobile application having stored the electronic pre-access credential.
-
In addition, according to an independent aspect of the invention, a computer-implemented method of managing access for a managed residential building is suggested, the managed residential building having at least a common door including an electronic lock or having several common doors each including an electronic lock, and the managed residential building having at least one private door, the common door controls (or, respectively, the common doors control) access to a common area of the managed residential building, and the at least one private door controls access to a private area allocated to a first person according to a rental agreement information, wherein the first person initially, at a starting point in time, does not yet have any electronic access rights for the common area of the managed residential building, the method being performed by a mobile device and comprising at least the following steps:
- receiving an application-installation invitation;
- installing and activating a mobile application;
- receiving and/or storing, through the mobile application, an electronic pre-access credential for the first person, wherein the electronic pre-access credential grants the first person, at a pre-access point in time, only the right to open the common door(s) for accessing the common area when being provided to the electronic lock of the common door(s).
-
In addition, according to an independent aspect of the invention, a mobile device is suggested, configured to at least partially perform the suggested computer-implemented method of managing access for a managed residential building being performed by a mobile device as described before or hereinafter, wherein the mobile device comprises the mobile application having stored the electronic pre-access credential.
-
The features and advantages described above and below in the context of the suggested computer-implemented method being performed by a mobile device can be transferred in an appropriate manner to the suggested mobile device. In particular, the computer-implemented method can be configured to be performed by the suggested and described mobile device. The suggested and described mobile device is in turn preferably configured to execute the suggested computer-implemented method. In this respect, the features and specific advantages relating to the suggested mobile device or the respective suggested computer-implemented method are regularly described collectively only once. Features described in connection with the computer-implemented method can be included accordingly in an appropriate manner in claims relating to the mobile device and vice versa.
-
In an embodiment of the mobile device and/or of the lock apparatus, the mobile device and/or the lock apparatus comprise a wireless communication interface, preferably a short range communication interface, the wireless communication interface of the lock apparatus being configured to receive the electronic pre-access credential and/or the electronic full-access credential, preferably being sent from the mobile application; the wireless communication interface of the mobile device being configured to send the electronic pre-access credential and/or the electronic full-access credential, preferably to the lock apparatus or the electronic lock. In an embodiment of the method being performed by a lock apparatus or of the computer-implemented method being performed mobile device, the method, correspondingly, further comprises the step of receiving or sending the electronic pre-access credential and/or the electronic full-access credential via a wireless communication interface, preferably a short range communication interface. In particular, the wireless communication interface performs steps of sending and/or receiving the personal access right identifier via bluetooth low energy (BLE) technology. Advantageously, common mobile devices of the tenants, with bluetooth technology, can be used to unlock and lock door(s), preferably with the help of the mobile application. Preferably. the wireless communication interface of the lock apparatus is configured to process a via bluetooth low energy (BLE) technology received signal further in a following verifying step only if a predetermined threshold value of a signal strength, in particular of a received signal strength indicator (RSSI), is reached. Further preferably, the predetermined threshold value of a signal strength can be adapted, in particular via the access management platform. Advantageously, bluetooth technology can be used for the entrance into respective doors. However, due to the fact that different mobile devices (or even the same type of mobile devices) generate bluetooth signals of different strengths, a threshold value can be used to adapt the proximity of the used mobile device to the electronic lock, thereby avoiding opening unwished doors if any what so low signal strength were sufficient to initiate a verifying step of the transmitted credential(s) in the electronic lock. Advantageously, the threshold value can be even made dependent on the type of mobile device used and can be adapted, for example in the access management platform.
-
In addition, according to an independent aspect of the invention, a system is suggested, comprising the suggested data processing apparatus as described before or hereinafter (for example according to claim 12), and the suggested mobile device as described before or hereinafter, the data processing apparatus and the mobile device being in interactive connection with each other, preferably thereby performing the suggested computer-implemented method being performed by a access management platform as described before or hereinafter (for example according to any one of the claims 1 to 11), and/or preferably thereby performing the suggested computer-implemented method being performed by a mobile device as described before or hereinafter.
-
In addition, according to an independent aspect of the invention, a system is suggested, comprising the suggested mobile device as described before or hereinafter, and the suggested lock apparatus as described before or hereinafter, the mobile device and the lock apparatus being in interactive connection with each other, preferably thereby performing the suggested computer-implemented method being performed by a mobile device as described before or hereinafter, and/or preferably thereby performing the suggested method being performed by a lock apparatus as described before or hereinafter.
-
With respect to a computer program product, the above-mentioned object is achieved by a suggested computer program product comprising commands which, when the computer program product is executed by a processor of a data processing apparatus, preferably of the suggested data processing apparatus, cause the data processing apparatus to perform the steps of the suggested computer-implemented method performed by the access management platform as described before or hereinafter (for example according to any one of the claims 1 to 11).
-
In addition, according to an independent aspect of the invention, a computer-readable medium is suggested, on which the suggested computer program product as described before or hereinafter is stored.
-
In addition, according to an independent aspect of the invention, a system is suggested, comprising the suggested data processing apparatus as described before or hereinafter, the suggested lock apparatus as described before or hereinafter, and the suggested mobile device as described before or hereinafter, the data processing apparatus, the lock apparatus, and the mobile device being in interactive connection with each other, preferably thereby performing the suggested computer-implemented method being performed by a access management platform as described before or hereinafter (for example according to any one of the claims 1 to 11), and/or preferably thereby performing the suggested method being performed by a lock apparatus as described before or hereinafter, and/or preferably thereby performing the suggested computer-implemented method being performed by a mobile device as described before or hereinafter.
-
In an embodiment, the data processing apparatus or the lock apparatus comprise a blacklist for storing the electronic pre-access credential and/or the electronic full-access credential. In an embodiment of the computer-implemented method being performed by the access management platform or of the method being performed by a lock apparatus, the method further comprises the step of storing the electronic pre-access credential and/or the electronic full-access credential in a blacklist. Advantageously, a blacklist can be used to overrule the entries within a whitelist, thereby causing that a credential (credentials) listed in the blacklist does not have the access right to open the respective lock anymore. Writing a credential (credentials) into a blacklist can be a way of the before-described deactivating of a credential.
-
In general, the suggested methods for managing access for a managed residential building are also applicable for managing access for several managed residential buildings, for example a managed residential area, as described with respect to the suggested computer-implemented method being performed by an access management platform. Furthermore, the explanations with respect to said suggested computer-implemented method being performed by an access management platform which explanations deal with the use of several common doors or, respectively, deal with initially non-existing access rights of the first person also apply to the further presented suggested methods for managing access for a managed residential building.
-
The present disclosure will be explained in more detail, by way of an example, with reference to the drawings in which:
- Figure 1:
- shows a schematic view of a managed residential area, including managed residential buildings;
- Figure 2:
- shows a block diagram illustrating schematically a system of managing access for the managed residential building;
- Figure 3:
- shows a block diagram illustrating schematically an exemplary sequence of steps for managing the access for the managed residential building;
- Figure 4:
- shows a block diagram illustrating schematically an exemplary sequence of the steps of additionally assigning a full-access;
- Figure 5:
- shows a block diagram illustrating schematically an exemplary sequence of the steps of additionally assigning a full-access, as an alternative to Fig. 4; and
- Figure 6:
- shows a block diagram illustrating schematically several exemplary steps of the suggested methods.
-
Figure 1 schematically shows a managed residential area 1. The managed residential area 1 comprises in this example two managed residential buildings 2 and 3. The managed residential area 1 may be a private site on which the two managed residential buildings 2 and 3 are located, the private site having an entrance in the form of a common door 4, for example an access gate to the private site. The managed residential buildings 2 and 3 are managed for example by an owner or an administrator and the managed residential buildings 2 and 3 for example have apartments for being rented to private persons.
-
In addition to the common door 4 for entering the general area of the private site, there are two further common doors 5 and 6 as main entrance doors to the respective managed residential buildings 2 or 3. Moreover, in the depicted scenery, there are also two private doors 7 and 8, which are the entrances to private rooms such as apartments of tenants indicated by dashed lines and being located within the managed residential building 2. Furthermore, within the managed residential building 2, another common door 9 is present, which is the entrance to another general room represented by the dashed lines below and being accessible not only for one person (tenant) but for different persons (different tenants) within the managed residential building 2. In general, the common doors 4, 5, 6, and 9 control access to common areas 10, 11, 12, and 13 whereas the private doors 7 and 8 control access to private areas 14 and 15.
-
In the depicted scenery, by way of an example, it is assumed that all the doors include electronic locks. However, for the suggested method, it could be the case that only one or several common door(s) 4, 5, 6, and/or 9 include(s) (an) electronic lock(s) wherein the private door(s) does (do) not have (an) electronic lock(s).
-
By way of an example, the common area 10 could be the private site, such as a secured area, of the owner of the managed residential area 1, and the common area 10 should accordingly be accessible to all tenants. The first managed residential building 2 could have the common area 11 in terms of the entry hall of the building, as well as an additional common area 13 in terms a fitness room. Furthermore, the second managed residential building 3 could have the common area 12, being the entire building itself, in terms of a garage. Additionally, the two private rooms 14 and 15 could be two different private apartments, one for a first person in terms of a first tenant and the other one for another tenant. In the described scenery, both tenants should receive access rights to the common areas 10 and 11 whereas the common areas 12 and 13 could be individually allocated according to the rental agreements as well as the private area 14 is allocated to one tenant and the private area 15 to the other tenant. In such a scenery, the suggested methods, devices and systems could apply for only the managed residential building 2, which at least has a common area 11 or 13 and a private area 14 or 15. Also, the suggested methods, devices and systems could apply for both managed residential buildings 2 and 3 together (as common doors 5, 6, and 9, as well as private doors 7, and 8 are present as well). Also, the suggested methods, devices and systems could apply for the entire managed residential are 1, including managed residential buildings 2 and 3.
-
The suggested methods, devices and systems provide advantages for example when a change of tenant takes place and is to be managed with regard to giving the tenants the permission from a distance to enter common areas 10, 11, 12, 13 and/or private areas 14, 15. In particular, with the help of the suggested methods, devices and systems, it is possible to give an access right to a first person, at least initially, only with respect to one or several common door(s) 4, 5, 6, 9, even if the private area 14 and/or 15 remains non-accessible for the first person yet. This could be of interest in cases when a new tenant should be given permission to enter common areas 10, 11, 12, or 13 already even if the official start of the rental agreement has not started yet, resulting in the fact that the owner does not want to give to the first person access rights with regard to the rented private area 14 and/or 15. It could be also the case that the official date of the rental agreement has started already but the deposit has not been paid yet by the first person or another requirement has not fulfilled yet, and, accordingly, the owner does not want to give a permission to the first person yet to enter the private area 14 and/or 15. Another use case is that the managed residential building 2 itself only comprises electronic locks with respect to the common doors 5 and/or 9, but not with respect to at least the rented private area 14 or 15 and its respective private door 7 or 8.
-
Figure 2 schematically shows a system of managing access for the managed residential building 2. For the sake of a better view, the private door 8 is left out in the illustration according to Figure 2. However, within the depicted managed residential building 2 (depicted with the help of a dashed box), the three doors in terms of the common doors 5 and 9, as well as the private door 7 are depicted, each door 5, 7 and 9 comprising a lock apparatus 16 including an electronic lock. The suggested system and especially the suggested computer-implemented method could also work and has the described advantages if the private door 7 did not have an electronic lock but a solely mechanic lock.
-
The managed residential building 2 is in the possession of the owner and might be managed by the owner or for example by an administrator. Said possession is schematically depicted with the help of the outer dash-dotted box. Furthermore, according to the depicted system, the owner or administrator is in control of a data processing apparatus 17, forming part of or being in interactive communication with the cloud 18. The cloud 18 or the data processing apparatus 17 comprises an access management platform, with the help of which platform the computer-implemented method of managing access for the managed residential building 2 can be performed. An example for such access management platform is the -called Resivo Admin Portal as a web application of the recent applicant dormakaba.
-
Within the possession of a first person, hereinafter also referred to a new tenant, a mobile device 19 is depicted as well. With the help of the mobile device 19, in particular with a mobile application installed thereon, the new tenant is able to open the common doors 5 and 9, and, at a later point of time, the private door 7 to his/her apartment as well, when given the respective permission. An example for such mobile application is the so-called Resivo Home App of the recent applicant dormakaba.
-
The data processing apparatus 17 is configured to communicate via a communication network 20 with the lock apparatuses 16 of the common doors 5 and 9 (indicated by the double arrow), and furthermore optionally with the lock apparatus 16 of the private door 7 (indicated by the dashed double arrow) by another communication network or, as depicted, by the same communication network 20. Moreover, the data processing apparatus 17 is configured to communicate via a communication network 21 (which could also be the same communication network 20 as mentioned before) with the mobile device 19 of the new tenant. The connection between the data processing apparatus 17 and the mobile device 19 usually is unidirectional as depicted with the help of the single arrow, thereby allowing the data processing apparatus 21 to send information to the mobile device 19 but not allowing the mobile device 19 to initiate a communication directly with the data processing apparatus 17. Furthermore, a communication connection, namely a short range communication connection, exists between the mobile device 19 of the new tenant as well as the lock apparatuses at least of a common door 5, in the recent case, also of the common door 9 (indicated by the single arrows) and the private door 7 (indicated by the single dashed arrow).
-
The short range communication connections 22 are realised via bluetooth low energy technology, with the help of a bluetooth low energy transmitter module, which is integrated in the mobile device 19 of the new tenant, as well as with the help of bluetooth low energy receiver modules integrated in the lock apparatuses 16.
-
Accordingly, the mobile device 19 and/or the lock apparatuses 16 can comprise a wireless communication interface, preferably a short range communication interface, the wireless communication interface of the lock apparatus being configured to receive the electronic pre-access credential and/or the electronic full-access credential, preferably being sent from the mobile application; the wireless communication interface of the mobile device 19 being configured to send the electronic pre-access credential and/or the electronic full-access credential, preferably to the lock apparatuses 16 or the electronic lock. In particular, the wireless communication interface performs steps of sending and/or receiving the personal access right identifier via bluetooth low energy (BLE) technology. Advantageously, common mobile devices 19 of the tenants, with bluetooth technology, can be used to unlock and lock door(s), preferably with the help of the mobile application. Preferably. the wireless communication interface of the lock apparatus is configured to process a via bluetooth low energy (BLE) technology received signal further in a following verifying step only if a predetermined threshold value of a signal strength, in particular of a received signal strength indicator (RSSI), is reached. Further preferably, the predetermined threshold value of a signal strength can be adapted, in particular via the access management platform. Advantageously, bluetooth technology can be used for the entrance into respective doors. However, due to the fact that different mobile devices 19 (or even the same type of mobile devices) generate bluetooth signals of different strengths, a threshold value can be used to adapt the proximity of the used mobile device to the electronic lock, thereby avoiding opening unwished doors if any what so low signal strength were sufficient to initiate a verifying step of the transmitted credential(s) in the electronic lock. Advantageously, the threshold value can be even made dependent on the type of mobile device 19 used and can be adapted, for example in the access management platform.
-
The shown lock apparatuses 16 are configured as so-called connected or on-line devices due to the arrangement of the communication network 20, with the help of which an on-line communication, for example with the data processing apparatus 17, can take place. However, it is also possible according to the present disclosure, to realise the lock apparatuses 16 as so-called off-line or stand-alone devices. Then the necessary communication, for example, of the data processing apparatus 16 with the lock apparatuses 16 could be realised also as short range communication connection, preferably still wireless, as for example by bluetooth low energy technology as mentioned with respect to the short range communication connections 22. Then, the owner or administrator or a delegated person such as a caretaker could conduct the necessary communication between the data processing apparatus 17 and the lock apparatuses 16 in an indirect manner, for example with the help of an administrator's mobile device being able to communicate with the data processing apparatus 17, preferably on-line, as well as with the lock apparatuses 16 off-line as described. The administrator or caretaker could therefore use a different mobile application, such as the so-called Utility App of the recent applicant dormakaba (cf. Figure 6 and steps S12.1 and S12.2 later).
-
In general, the communication networks 20 could comprise a mobile radio network, such as GSM (Global System for Mobile Communication), UMTS (Universal Mobile Telephone System), WLAN (Wireless Local Area Network) or the like. Optionally, the communication networks 20 could also comprise a wire based network, such as provided by LAN (Local Area Network), an Ethernet connection or an USB connection or the like, and/or the Internet as preferred on-line connection medium. In general, as an alternative to the described bluetooth communication connection as the short range communication connections 22, the short range communication connections 22 could also be implemented as a radio-based communication interface, such as RFID communication interfaces (Radio Frequency Identifier), so-called NFC interfaces (Near Field Communication), optical interfaces like infrared or visual communication interfaces. Preferred however is the interface arranged as bluetooth low energy interface.
-
In the following paragraphs, described with more specific reference to Figures 3 to 6, possible sequences of steps performed within the methods in order to manage access rights according to the present disclosure are depicted.
-
Figure 3 shows a timing diagram illustrating an exemplary sequence of steps for managing the access for the managed residential building 2 for the new tenant (the first person 23). The first person initially at a starting point in time (as indicated by reference S0) does not yet have any electronic access rights for the common area 11 or 13. Then, in the access management platform, for example by an entry of an administrator, a pre-access activation request is received within step S1.1.
-
The pre-access activation request is done in order to assign an electronic pre-access credential to the first person 23. The electronic pre-access credential, therefore, is configured to grant the first person 23, at a pre-access point in time, only the right to open the common doors 5 and 9 for accessing the common areas 11 and 13. At a later point in time, for example the so-called full-access point in time, furthermore, an access right can be assigned to the first person 23 also being able to open the private door 7 or 8.
-
In step 1.2, the electronic pre-access credential associated is generated in the access management platform (or, respectively, in the data processing apparatus 17 or, respectively, in the cloud 18) with an identifier of the first person 23, thereby resulting in an unambiguous credential and electronic key for the first person 23.
-
In step S2.1, the electronic pre-access credential is transmitted to the electronic locks of both common doors 5 and 9. The transmitting could take place at the same time and is, according to the example depicted in Figure 2, conducted via the communication network 20. By transmitting the electronic pre-access credential, the electronic locks of the lock apparatuses 16 of the common doors 5 and 9 are configured, at the pre-access point in time, to unlock if the electronic pre-access credential is provided by the mobile device 19 of the first person 23, which configuration step is depicted by the reference S2.2.
-
In step S3, the access management platform (or, respectively, in the data processing apparatus 17 or, respectively, in the cloud 18) send an application-installation invitation to the mobile device 19 of the first person 23. The sending is preferably made via the communication network 20 on-line, for example via an e-mail sent to the first person 23. Within the e-mail, a link can be included, enabling the first person 23 to, by following the link, download the mobile application, such as the Reviso Home App. Thereby, the first person 23 is enabled to then install and activate within step S3.1 the mobile application. Through this mobile application, the electronic pre-access credential is receivable and storable within step S3.2. For example, the individual version of the mobile application could permit the first person 23 to automatically download and store the personal electronic pre-access credential which has before been generated in the access management platform (step S1.2).
-
Figure 4 shows a timing diagram illustrating an exemplary sequence of the steps of additionally giving the first person 23 a full-access, also to the private area 14 by enabling the first person 23 to be able to unlock the private door 7. The sequence of steps is practically the same as the before described with respect to the diagram of Figure 3, only with additional method steps. Accordingly, hereinafter, said additional steps will only be described.
-
In the depicted embodiment, after the steps S3.1 and S3.2 which lead to possession of the electronic pre-access credential for the first person 23 and, accordingly, the respective access right to enter the common areas 11 and 13 accessible via the common doors 5 and 9, the step S4.1 is performed by the suggested computer-implemented method. Thereby, a full-access activation request to assign an electronic full-access credential to the first person 23 is received. The electronic full-access credential finally can grant the first person 23 the right to open the common doors 5 and 9 for accessing the common area 11 and 13, but additionally also the right to open the first private door 7 for accessing the private area 14, such as the new tenant's apartment.
-
In step S4.2, the electronic full-access credential associated is generated with the (before-already-used) identifier of the first person 23.
-
Thereafter, the electronic full-access credential is transmitted to the electronic locks of the common doors 5 and 9 and also to the electronic lock of the first person's private door 7, thereby, at a full-access point in time after the pre-access point in time, configuring (step S5.2) the electronic locks to unlock if the electronic full-access credential is provided by the mobile device 19 of the first person 23.
-
It is also possible that the electronic full-access credential would only be transmitted to the first person's private door 7, since the common doors 5 and 9, or, respectively, their corresponding electronic locks or lock apparatuses 16 already have the electronic pre-access credential which still could guarantee the possibility to enter the respective common doors 5 and 9.
-
It is also possible, that the steps S4.1, S4.2, S5.1, and S5.2 (only some of them or even all) are already performed before, for example also already with the generation and transmission of the electronic pre-access credential. However, according to the present disclosure, the full-access credential at least is not sent or at least cannot be used by the first person 23 to open private doors 7 or 8 at the beginning already. First, solely any of the common doors 5, 9, or 4, or 6 can be opened by the first person 23, and then, afterwards, the permission to open also private doors 7 and/or 8 might be given to the first person 23. Despite of generating or even transmitting the electronic full-access credential already, the ability to open said private doors 7 or 8 could be still hold back, for example, by not yet sending the electronic full-access credential to the first person 23. Accordingly, the full-access point in time could also be the moment when the electronic full-access credential is sent to the first person 23.
-
However, according to the method depicted in Figure 4, the electronic full-access credential is sent in step S6 to the mobile device 19 of the first person 23 using the mobile application installed thereon. Thereby, the electronic full-access credential is received and stored (step S6.1) in the mobile application, enabling the first person 23 to open also the private door 7 when presenting the electronic full-access credential to the private door's electronic lock (lock apparatus 16).
-
Figure 5 shows a timing diagram illustrating an exemplary sequence of the steps of additionally giving the first person 23 a full-access, also to the private area 14 by enabling the first person 23 to be able to unlock the private door 7, as an alternative to the sequence of steps as shown in Figure 4. The sequence of steps is practically the same as the before described with respect to the diagram of Figure 3, only with additional method steps. Accordingly, hereinafter, said additional steps will only be described.
-
In the depicted embodiment, after the steps S3.1 and S3.2 which lead to possession of the electronic pre-access credential for the first person 23 and, accordingly, the respective access right to enter the common areas 11 and 13 accessible via the common doors 5 and 9, the step S7.1 is performed by the suggested computer-implemented method. In step 7.1, the electronic pre-access credential before generated and already transmitted to the first person 23 is also transmitted to the electronic lock of the first person's private door 7, thereby, at a respective full-access point in time after the pre-access point in time, configuring (step S7.2) also the electronic lock of the first person's private door 7 to unlock if the electronic pre-access credential is provided by the mobile device 19 of the first person 23. Accordingly, the first person 23 then also has the right to open the private door 7 for accessing the private area 14, such as the new tenant's apartment.
-
Preferably, in an embodiment not depicted, before the step S7.1 of transmitting the electronic pre-access credential also to the electronic lock of the first person's private door 7, the following step could be performed: receiving an extension for full-access request to adapt the electronic pre-access credential for the first person 23, thereby initiating the granting process of the right to open additionally to the common door(s) 5, 9 also the at least one private door 7.
-
Figure 6 shows a timing diagram illustrating several exemplary steps which can be part of the suggested sequences of steps for managing access to the managed residential building 2. Hereinafter, only the additional steps in comparison to the before described sequences are described. The steps can be combined with the before described embodiments. Moreover, the steps newly described with respect to Figure 6 do not need to be all combined. Also, single steps can be provided or combined with respect to the suggested embodiments. In the embodiment according to Figure 6, in comparison to the before described embodiment, the first person 23 is only to be allowed to open the common door 5 (and not anymore the common door 9), only by way of an example.
-
In step S8, the pre-access point in time and/or the full-access point in time can be predefined within the access management platform. The predefinition results in a predetermined condition related to the rental agreement information, in particular according to a date of a start of a rental agreement and/or according to a confirmation of payment, such as a payment of a rent and/or a deposit. Then, the first person 23 could be given the permission to access either the common area 11 or even the private are 7, according to the depicted embodiment, under said condition that a deposit has been paid for example. Advantageously, the first person 23 can be given via only one entry within the access management platform the access right from a first date on to common area 11 and from a second date on to the private area 7.
-
In step S9, the electronic pre-access credential (and/or according to another embodiment the electronic full-access credential) is stored in an access management platform whitelist. Furthermore, in step S10, it is verified if a used electronic pre-access credential (and/or a used electronic full-access credential) being transmitted from the electronic lock(s), corresponds to the electronic pre-access credential (and/or the electronic full-access credential) stored in the access management platform whitelist. Then, the step of transmitting (step S2.1, or S5.1, or S7.1) the pre-access credential (and/or the electronic full-access credential) to the electronic lock(s) and configuring (S2.1; S5.1; S6.1) the electronic lock(s) only is executed if the step of verification (step S10) is positive. Correspondingly, the steps depending on a positive verification have been depicted with dashed arrows and boxes in Figure 6. Accordingly, a storage of the credentials in the electronic locks does not have to take place. However, a online lock apparatus 16 needs to be provided or at least a lock apparatus 16 being able to permanently connect to the access management platform under a request of a person to enter the respective door.
-
In step 11.1, by way of an example, entrance execution data is received via the communication network 20 from the electronic lock(s) and/or via a communication network 21 from the mobile application. Then, the entrance execution data is stored (step 11.2.) in the access management platform. The entrance execution data can comprise a time of entrance information about when the electronic lock(s) is or has (are or have) been opened; and/or a user information about which electronic pre-access credential and/or which electronic full-access credential is or has been used to open the electronic lock(s); and/or a medium information about which mobile device 23 and/or which mobile application is or has been used to open the electronic lock(s).
-
In general, the credential could also be added to a blacklist (not depicted) of the access management platform or of the electronic locks, wherein credentials entered in the blacklist have priority in comparison to credentials listed in the whitelist in a manner that a credential being in the blacklist cannot lead to opening the respective door. Thereby, even if the first person 23 lost his mobile device 19, an abuse of the lost credentials can be avoided.
-
In general, the presented steps S2.1, S5.1 and/or S7.1 in terms of transmitting the pre-access credential and/or the electronic full-access credential to the electronic lock(s) can be executed via a direct communication via the communication network 20. Nevertheless, another option is that the steps S2.1, S5.1 and/or S7.1 in terms of transmitting the pre-access credential and/or the electronic full-access credential to the electronic lock(s) can be executed via an indirect communication by the step of: transmitting (step S12.1), at a first point in time, the pre-access credential (and/or the electronic full-access credential) to a manager's mobile device, in the particular example the mobile device 24 of the caretaker 25, thereby leading to a necessity of transmitting (in step S12.2), at a second point in time after the first point in time, the pre-access credential (and/or the electronic full-access credential) from the manager's mobile device 24 to the electronic lock(s). This alternative of an indirect transfer of the credentials is depicted in Figure 6 with the help of dotted arrows. For the indirect transmission, the so-called Utility App of the recent applicant can for example be used on the mobile device 24 of the caretaker 25.
-
In general, the pre-access credential and/or the electronic full-access credential can be encrypted, preferably using asymmetric encryption. An example for the asymmetric encryption is the Elliptic Curve Cryptography. Advantageously, the credential(s) is (are) configured as being not readable by the mobile device 19 (or the mobile application) of the first person 23, but being only readable by the electronic lock(s) and/or the access management platform. In particular, especially with respect to the suggested systems and methods, the credential(s) can be transmitted in encrypted form from the access management platform to the mobile device 19 (in particular the mobile application). The credential(s) also remain(s) stored in an encrypted manner on the mobile device 19. The credential(s) can then be also transmitted in encrypted form to the electronic lock at the moment of intention of access. Only at the electronic look, the credential(s) then is (are) decrypted in order to make the access decision by the verifying step.
-
In an embodiment, not depicted, the computer-implemented method further comprises the step of deactivating the right to open the common door(s) 4, 5, 6, and/or 9 and/or to open the private doors 7 and/or 8, preferably by:
- deleting the electronic pre-access credential and/or the electronic full-access credential from the whitelist; and/or
- storing the electronic pre-access credential and/or the electronic full-access credential on the blacklist, wherein the blacklist is assigned with priority in comparison to the whitelist; and/or
- transmitting the electronic pre-access credential and/or the electronic full-access credential to the electronic lock of the common door(s) 4, 5, 6, and/or 9 and/or of the private door 7 and(or 8, thereby configuring the electronic lock(s) not to unlock anymore if the electronic pre-access credential and/or the electronic full-access credential is provided by the mobile device 19 of the first person 23.
-
It should be noted that, in the description, the sequence of the steps has been presented in a specific order, one skilled in the art will understand, however, that the order of at least some of the steps could be altered, without deviating from the scope of the disclosure.
Reference numerals:
-
- 1
- managed residential area
- 2, 3
- managed residential buildings
- 4, 5, 6, 9
- common door
- 7, 8
- private door
- 10, 11, 12, 13
- common area
- 14, 15
- private area
- 16
- lock apparatus
- 17
- data processing apparatus
- 18
- cloud
- 19
- mobile device
- 20, 21
- communication network
- 22
- short range communication connection
- 23
- first person
- 24
- mobile device (of caretaker)
- 25
- caretaker