WO2005054609A1 - Locking system and method for locking system - Google Patents

Locking system and method for locking system Download PDF

Info

Publication number
WO2005054609A1
WO2005054609A1 PCT/FI2004/000684 FI2004000684W WO2005054609A1 WO 2005054609 A1 WO2005054609 A1 WO 2005054609A1 FI 2004000684 W FI2004000684 W FI 2004000684W WO 2005054609 A1 WO2005054609 A1 WO 2005054609A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
wireless link
key
receiver
energy
Prior art date
Application number
PCT/FI2004/000684
Other languages
French (fr)
Inventor
Kimmo Siitari
Juha Murtola
Original Assignee
Abloy Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Abloy Oy filed Critical Abloy Oy
Publication of WO2005054609A1 publication Critical patent/WO2005054609A1/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • E05B47/0012Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with rotary electromotors
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0057Feeding
    • E05B2047/0058Feeding by batteries
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0065Saving energy
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00793Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by Hertzian waves

Definitions

  • the invention relates to a locking system, in which a wireless link is used for data transmission for instance between a key and a lock.
  • the invention refers to a system utilizing radio waves.
  • Electro-mechanical locks are generally connected by cables to an external power source and control systems. Electric locking systems are used especially in localities requiring passage control, such as in banks, business firms and other major localities. In private homes the use of electro-mechanical locking is still relatively unusual.
  • the electro-mechanical locking system will, however, gain more ground also in private homes, as it has considerable advantages compared to a mechanical system.
  • Various kinds of surveillance and control systems for homes and buildings as well as networks are becoming more and more common (e.g. COBA standard, Connected Open Building). In these systems, lighting, heating, water and electricity consumption as well as other issues related to the building can be monitored and controlled through the network of the system. It is thus natural that also the locking systems in homes or buildings are connected to the surveillance and control system already in use. This requires means not only for data transmission but also for supplying the necessary energy between the surveillance and control system and the locking. In addition, it is required that the systems can be installed reliably and at a reasonable cost.
  • an infrared link For wireless data transmission there are at least two generally used methods: an infrared link (IR link) or a radio frequency transmitter/receiver link.
  • the disadvantages of the IR link are, among other things, the visual communica- tion required between the transmitter and the receiver (e.g. the key and the lock), and the susceptibility of the lenses to dirt and dust as well as the narrowness of the IR link beam, which requires for instance that the IR-key is directed toward the lock.
  • an IR link is not the best possible communication means, as the dust, snow etc. possibly collected on the doors might cause communication problems.
  • radio frequency transmitter/receiver system is a more natural choice for wireless data transmission.
  • the transmitter is on the same side as the key, whereas the receiver is located on the same side as the lock.
  • duplex systems which are often necessary, both sides are provided with a receiver and a transmitter, whereby data transmission is possible in both directions.
  • One of the advantages of the systems based on radio waves is that no visual communication is required and the directing of the transmitter and the receiver is not that crucial as in the case of an IR key.
  • suitable solutions and standards for instance Bluetooth, Zigbee and Zensys.
  • Using a battery in the lock requires low consumption of the lock's energy both when the lock is in an active mode (i.e. it is being released or closed) and also during its period of inactivity (i.e. in a so-called sleep mode), when the lock is in an energy saving mode waiting for an opening command for instance from a key.
  • the energy consumption of the system is quite high, as energy is required for producing the mechanical action of an actuator (electric motor or the like).
  • the operating time of the actuator is easily of the order of 200 ms (1 00 ms for unlocking and 1 00 ms for locking).
  • the power consumption of the processor and other electronics of the lock is generally quite low (usually a few mA) compared to the power consumption of the actuator. Even if the wireless link of the system were duplex, the energy consumption of the actual data transmission (the energy required by the transmitter of the wireless link) is relatively low compared to the energy consumption of the actuator, as the power consumption of the transmitter is typically in the approximate order of 1 5 mA.
  • the supply voltage and the transmission time may be for instance about 5 V and 20 ms, respectively.
  • a so-called polling function of the lock i.e. the monitoring of the lock environment, is also related to the sleep mode. Owing to the polling the lock is ready to react, if somebody wants release the locking by using a wireless key, for instance.
  • the energy consumption during the listening/polling by the receiver of the wireless link is a problem.
  • the time for reacting to the opening command cannot be too long (in practise, not much longer than a second), as people are not willing to stand in front of the door waiting for the door to open. Since it is also impossible to foresee the moment someone wants to release the lock, one cannot use a clock, counter or another similar arrangement for awaking the lock and its electronics.
  • the receiver needs to be active for instance once in a second and for as long as it takes to detect a potential opening command coming from a key.
  • the transmitter in conjunction with the lock needs to poll the environment once in a second or even more frequently. If there is for instance no key with a message (e.g.
  • the lock needs to go back to the energy saving mode and wake up again after a second in order to listen to (poll) the environment. Even if the listening time of the transmitter was only 20 ms at intervals of one second, it makes altogether a significant daily energy amount thus discharging the energy source of the lock, e.g. the battery of the lock, even if the lock was not opened once.
  • the energy consumption is 1 0 joules per day, for instance, if the power consumption in the active mode is 200 mA, one unlocking/locking takes 200 ms, the lock is released/closed 50 times a day and the supply voltage is 5 V, whereas the energy consumption is about 85 joules a day, if the reaction time of the listening/polling by the wireless link is 1 s, the listening time 20 ms, the power consumption 1 0 mA during the listening and the supply voltage 5 V.
  • the conclusion is that a significant part of the energy consumption of the lock provided with a wireless link consists of the energy consumed in the polling by the receiver.
  • a practical requirement is that a battery should in normal use last a relatively long time (preferably for years), whereby the battery needs to be sufficiently large or an energy source outside the lock needs to be used, i.e. wires outside the lock, which is something one often wants to get rid of, as already mentioned in the above.
  • An object of the invention is to minimise the disadvantages of the above- discussed prior art solutions.
  • the object is achieved in a way described in the claims.
  • the idea of the invention is to awake the receiver or transceiver of the wireless link of the lock, being in conjunction with the lock, only if the lock needs to be informed of something, e.g. opening/closing of the door, and which accordingly awakes the electronics of the lock. In this case the polling function of the wireless link is not necessary.
  • the invention decreases the energy consumption in an energy saving mode to a considerable extent.
  • the transition at a random moment of time from the energy saving mode (sleep mode) to an active mode is fast. It is a random moment of time from the viewpoint of the lock, as it cannot foresee the moment a key user wants to release the lock. The random moment of time is thus the moment, at which a key user uses a key to release the lock.
  • the invention refers thus to a locking system, in which a wireless link is used for data transmission.
  • the system comprises at least one lock, one key and one receiver or transceiver of the wireless link of the lock being in communication with the lock.
  • the key comprises a transmitter or a transceiver, an en- ergy source, from which the necessary energy is drawn at a random moment of time for transmitting key-specific data to the wireless link of the lock as well as the necessary energy for activating the wireless link of the lock.
  • the energy required by the wireless link of the lock is transmitted to the receiver of the wireless link simultaneously with the data.
  • the simultaneousness means that the data may be transmitted either precisely at the same time as the energy required by the link, or the respective transmission times differ slightly from one another (the energy transmission for instance starts slightly before the data transmission). What is essential is that no unnecessarily long delay is caused for the user.
  • There is a second energy source available for the lock for drawing the necessary energy for activating the lock and for its operations in response to the message transmitted by the receiver of the activated link.
  • the invention also refers to a locking system of the same kind as the above- mentioned locking system comprising at least one passage control system and one transmitter/receiver of the wireless link included in the passage control system.
  • the key preferably comprises a remote identifier.
  • the transmitter/receiver of the wireless link included in the passage control system comprises an energy source, from which the necessary energy is drawn at a random moment of time for transmitting an opening command to the wireless link of the lock and the necessary energy for activating the receiver of the wireless link of the lock.
  • the opening command is based on the data received from the key.
  • the opening command and the energy are transmitted simultaneously to the receiver of the wireless link.
  • There is a second energy source available for the lock for drawing the necessary energy for activating the lock and for its operations. It is also possible to realise the invention as a combination of the above systems, whereby the energy required by the wireless link is drawn from the energy source of the key or from the transceiver of the passage control system.
  • the invention also refers to a method for a locking system, in which a wireless link is used for data transmission.
  • the key which comprises an energy source and a switch, is activated to an operating mode in response to the turning-on of the switch taking place at a random moment of time.
  • the key-specific data and the required energy are transmitted to the wireless link of the lock for energising and activating the wireless link of the lock.
  • the wireless link of the lock is energised in response to the received energy and activated in response to the received data and the energising.
  • the lock comprising a second energy source is activated by transmitting a request from the link to the lock, whereby the necessary energy is drawn from the second energy source.
  • the key-specific data received by the wireless link is read and the read data is checked. In response to the checking a potential operation is performed taking the necessary energy from the second energy source.
  • Figure 1 shows an example of an embodiment according to the invention
  • Figure 2 shows an example of a second embodiment according to the invention
  • Figure 3 shows an example of a third embodiment according to the invention
  • Figure 4 shows an example of a flow diagram illustrating the method according to the invention.
  • FIG. 1 shows an example of the system according to the invention.
  • the lock 1 6 does not poll the environment via its wireless link 7 as in the prior art solutions.
  • the wireless link i.e. more precisely the receiver or transceiver of the wireless link
  • the idea is to draw the energy required by the wireless link, as in solutions based on electromagnetic induction, from a key 1 , i.e. from the energy source 5 of the key, which is usually a battery.
  • the wireless link 7 of the lock has been awakened, i.e. it has become active, the actual lock 1 6 is awakened.
  • the lock takes the necessary energy from the energy source 9 of its own, e.g. from a battery.
  • at least two different energy sources are utilised: the energy source of the key and the energy source of the lock.
  • the aim is to minimise the energy amount the lock takes from the battery.
  • the key 1 in the locking system according to the invention comprises a transmitter 3 (reader) of the wireless link, its antenna 2, an energy source 5, i.e. usually a battery, and an opening push-button 4.
  • the key comprises a small-scale memory 1 7, which may be integrated inside the wireless link.
  • the memory includes the marker of the key.
  • the wireless link 7 of the lock is a radio communication channel to the environment of the lock. In addition to the actuating member 7 itself, it comprises an antenna 6.
  • the actuator is usually an electronics circuit.
  • the energy (and data) 1 5 transmitted by the key via radio communication is received in the antenna 6, from which the actuator generates its own operational energy, i.e. its operational electricity.
  • the wireless link does not need an energy source of its own (e.g. a battery), but it may be a so-called passive unit as regards its operating principle.
  • the actuator of the link is in communication with the actual lock 1 6 via the link interface 8 of the lock, so that data can be transmitted to the lock from a key (or another data source) as well as an interrupt message.
  • the interrupt message is a command or request, by which the lock is told to interrupt the energy saving mode and go to an active mode.
  • the wireless link of the lock may also be included in the lock instead of being an external element in communication with the lock. Therefore the wireless link of the lock in conjunction with the lock refers in this description to a receiver or transceiver of the wireless link located either outside or inside the lock unit.
  • the lock comprises an electronics circuit 10, a memory 1 8, a power management unit 1 20 and possibly a processor 1 9 (in larger applications).
  • the memory stores key numbers, which indicate the keys authorized to release the lock.
  • the electronics circuit receives its energy from the energy source 9 of the lock.
  • the energy source is usually a battery, but it may also be another source, such as an electric conductor connection to the general electricity supply of the building.
  • the lock is provided with a control circuit 1 1 for actuator for controlling the operations of the actuator 1 2.
  • the actuator is in mechanical communication with the mechanical locking elements 1 3 (such as the dead bolt) of the lock, which are moved by the actuator for releasing or closing the lock.
  • the mechanical locking elements 1 3 such as the dead bolt
  • the controller 1 1 of the actuator and the battery 9 are illustrated outside the electronics circuit, but they could as well be integrated into the circuit, i.e. be parts of the lock.
  • the memory, the power management unit and the processor included in the circuit 1 0 could be separate elements outside the electronics circuit.
  • the key i.e. the reader of the wireless link acting as a transmitter awakes the wireless link of the lock by the energy preferably included in the data transmitted by it.
  • the link gets its energy from the energy of the data message.
  • the wireless link of the lock does not need any energy saving mode (sleep mode), as there is no need for it to wake up in order to react or listen. Polling according to prior art is thus not necessary.
  • a key transmits energy to the lock only if there is a need to release the lock by the key (i.e. the user of the key presses the opening push-button). The rest of the time the key electronics are totally de-energised or in a very low- current mode. Even if the power taken by the key from the battery in a transmission situation is fairly high (for instance about 0.5 W), the total energy consumption is low, as an individual key is used relatively seldom and the time required for a transmission of one opening command is short. The change and charging of the battery in a key is far easier to arrange than that of the battery located inside the actual lock, door or doorframe.
  • the lock (more precisely the lock electronics) instead is awakened by an interrupt command or request coming from the wireless link of the lock, which has already been activated by the energy included in the message from the key.
  • the lock is activated only if the lock needs to be used or informed of something.
  • the lock may also for some reason be activated by itself (for instance in emergency situations, which the locking system is able to detect independently) .
  • FIG. 2 shows an example of a second embodiment according to the invention.
  • the invention is put into practice by using an RFID sys- tem (Radio Frequency Identification) as a part of the locking system.
  • RFID is previously known technology for instance from electric identifying of items.
  • the RFID technology is, however, applied in a novel fashion.
  • RFID reader for instance bar code systems
  • RFID reader a sta- tionary or a movable reader
  • the reader may be in communication with external data networks or data systems.
  • the item or the package thereof is provided with a remote identifier (RFID remote identifier) .
  • RFID remote identifier The data on the item is located in the remote identifier, from which the reader can catch it and forward the read data to data systems.
  • An RFID system has also been used for passage control in buildings. People carry along a remote identifier (acting as an electric key), which contains specific data on the remote identifier. Similarly, the passage control appara- tus is provided with a reader (for instance at a door frame), which reads the data of the remote identifier, when it is taken into the vicinity of the reader. The passage control device checks the passage rights of the remote identifier on the basis of the read data.
  • the remote identifier is made an integrated part of the lock operation, especially of its data transmission and activation.
  • the transmitter 23 of a key 21 is in practise an RFID reader, but it now transmits its marker to the RFID remote identifier located in the actuator of the link 27 of the lock, after the opening push-button 24 of the key has been pressed.
  • the reading i.e. data transmission, is carried out via radio communication 21 7 through the antenna 22 of the key and the antenna 26 of the wireless link of the lock.
  • the RFID reader transmits energy and data on the key to the RFID remote identifier. The necessary energy is drawn from the energy source 25 of the key.
  • the key may be composed around the RFID reader.
  • the key is an RFID reader.
  • the shape of the key 21 in FIG. 2 illustrates such an example, where the necessary elements are located inside a common enclosure. It should, however, be mentioned that the key may also have a mechanical key section, as is shown in FIG. 1 .
  • the remote identifier in the link is passive, i.e. it has not an energy source of its own, but it takes the required energy from the energy transmitted by the reader.
  • the necessary input power is nowadays quite low, approximately of the order of a few ⁇ W's.
  • the actuator 27 of the link is in communication with the actual lock 21 8 via the link interface 28 of the lock, so that data can be transmitted to the lock from a key (or another data source) as well as interrupt information.
  • the electronics circuit 210 receives the data and the interrupt message from the interface and performs the awakening, i.e. activation, of the lock.
  • the energy is drawn from the lock's energy source 29 through a power management unit 21 4.
  • the power management unit is separated from the electronics circuit 21 0 of the lock, but it may also be connected to the circuit in question.
  • the power management unit takes care of the energy supply to the other parts of the lock, in other words the lock electronics including the processor thereof and the locking sensor 21 5 receive supply voltage VCC and the controller of the actuator and the actuator itself get supply voltage VDD. VCC and VDD may also be one and the same supply voltage.
  • the power management unit is also controlled by the processor's re- quest/command R to move the lock into an energy saving mode.
  • the memory of the key electronics stores key numbers, which indicate the keys authorized to release the lock.
  • the electronics circuit receives its energy from the energy source of the lock.
  • the energy source is usually a battery, but it may also be another source, such as an electric conductor connection to the general electricity supply of the building.
  • the lock is provided with a control circuit 21 1 for actuator for controlling the op- erations of the actuator 21 2.
  • the actuator is in mechanical communication with the mechanical locking elements 21 3 (such as the dead bolt) of the lock, which are moved by the actuator for releasing or closing the lock.
  • a locking sensor 21 5 controls the mode of the locking and transmits the mode data to the electronics of the lock.
  • the figure shows also a parallel alternative for releasing the lock through a mechanical element 21 6 (a key cylinder).
  • a so-called back- scatter modulation may be utilised.
  • the RFID reader may be either an independent device (i.e. the RFID reader is a key) or it may be arranged as a part of another device (for instance of a mobile phone).
  • the system shown in FIG. 2 operates on radio waves at a frequency of 869 MHz based on the RFID standard proposal ISO 1 8000-6 (but does not necessarily follow it precisely). A similar operation may also be performed e.g. at a frequency of 1 3,56 MHz and for instance by using magnetic induction, if so required. The range of the key, though, may then be less than one meter and the size of the antennas significantly larger.
  • a higher frequency may be used, for instance 2,45 GHz, for which there is also an RFID standard proposal ISO 1 8000-4. Then the size of the antennas will also be smaller. In the above-mentioned systems there is no need for a battery for the wireless link of the lock.
  • FIG. 3 shows an embodiment according to the invention comprising a pas- sage control apparatus (Access Control System) or the like.
  • the lock 21 8 and the wireless link 27 of the lock located at a door 1 4 are similar elements as those in FIG. 2 (software differences might occur).
  • the key 31 is now provided with an RFID remote identifier 33 (not with an RFID reader) and it is in communication 36 with the passage control system 31 0 through an RFID reader 38 included therein.
  • the separate RFID reader 38 included in the passage control system monitors its coverage area and is in communication with the keys within the area.
  • the communication may be link communication (e.g. radio communication), which is continuously turned on or link communication, which is intermittently turned on (e.g. at intervals of a few seconds). In practise, the communication exists between the antenna 32 of the key and the antenna 39 of the passage control reader.
  • the passage control system 31 0 transmits this information through the reader 38 to the RFID remote identifier of the wireless link of the lock, which forwards it to the lock, which is then released. That being the case, it is not necessarily the lock that makes the decision about releasing the lock, but that is the task of the passage control.
  • the passage control has the necessary information about the rights of the keys.
  • the lock can be provided with a lock- specific code, by which the opening requests intended for the lock can be distinguished from other opening requests.
  • the opening request needs to contain the lock specific-code.
  • the wireless links of the locks within the same coverage area receive the same opening request, but only the wireless link of the right lock awakes the lock electronics. It is thus advantageous to check the code in the link and not in the lock electronics in order to avoid unnecessary activation of the lock, whereby the energy source of the lock will neither be used in vain.
  • a duplex communication between the RFID reader (i.e. in practise the passage control apparatus) and the RFID remote identifier (i.e. in practise the lock) can be arranged by utilizing the above-mentioned backscat- ter modulation. Then the lock may wake up for instance by means of the dead locked interrupt of a locking sensor (or similarly by means of the mode data sensor of the lock, not shown in the figure), after which the lock electronics report this through the RFID remote identifier of the lock to the passage control apparatus by utilising for instance the above-mentioned back- scatter modulation. By using this method the lock may report for instance a potential burglary attempt to the system.
  • a duplex communication between the RFID reader of the passage control apparatus and the RFID remote identifier of the key can be arranged applying the same principle.
  • the cost of the keys is considerably lower and their size much smaller, as in this case the key is not an RFID reader, but a far simpler and less expensive RFID remote identifier. Since the remote identifier does not necessarily require a battery (i.e. it is a passive remote identifier), its op- erating life is practically unlimited. Also a battery may, however, be included in the key, whereby it is possible to add to the functions of the key. Thereby for instance an active or a semi-active RFID remote identifier are possible arrangements, as mentioned in the above.
  • One passage control apparatus may control several doors by one RFID reader, if its range is sufficiently wide.
  • several RFID readers may be connected to one passage control apparatus, whereby the range (cover- age area) of the system may be considerably widened.
  • the key is an RFID reader, it may be in direct communication with the lock, and if the key is an RFID re- mote identifier, it is in communication with the passage control system, which transmits the necessary data to the lock.
  • This embodiment requires an efficient anti-collision method (for instance a frequency or time division).
  • the wireless links in the locks and the transmitters in the keys are shown as one- circuit arrangements.
  • the wireless link of the lock in conjunction with the lock comprises one circuit unit and correspondingly, the transmitter of the key comprises one circuit unit.
  • the wireless link of the lock consists of several circuits, e.g. of two circuits, of which the first one is meant for awakening the lock and receiving the energy transmitted from the key or the passage control, and the second one is a circuit used for receiving and/or transmitting data.
  • the key may have two circuits (or even several circuits set up for a specific purpose), of which the first one transmits data and the second one energy.
  • FIG. 4 shows an example of a flow diagram illustrating the method according to the invention that is meant to use in a locking system wherein there exists an energy source both in the key and in the lock.
  • the lock electronics are in a low- current mode, i.e. in a sleep mode (or in some applications de-energised). During the sleep mode the energy is drawn from the energy source of the lock. In the initial situation of this example the lock is latched also by mechanical locking elements (i.e. the dead bolt is out).
  • the locked state does not require any operation of the actuator. In other words, the actuator does not consume any energy in the locked state.
  • the key When the aim is to release the lock, the key is activated 41 to an operating mode in response to the turning-on of the opening switch, i .e. to the pressing of the opening push-button. Then the electricity for the key is switched on. The energy is drawn from the energy source of the key.
  • an opening command/request is transmitted 42 from the key to the lock.
  • the opening command contains the marker of the key. At the same time the opening command contains enough energy for activating the wireless link of the lock. It is preferable to transmit the marker and the necessary energy together, but it is also possible to transmit the marker and the energy separately, for in- stance at different frequencies (through different channels).
  • the opening command/request should be understood so as to contain both the marker of the key and the necessary energy regardless of the technical realisation of the transmission.
  • the transmission energy is taken from the energy source of the key.
  • the wireless link of the lock is energised 43, i.e. an energy source is connected to the link.
  • the wireless link of the lock is activated, i.e. awakened, 44.
  • the activated link transmits an inter- rupt request or command to the lock electronics, whereby the sleep mode of the lock is interrupted and the lock wakes up.
  • the lock electronics are activated 45.
  • the activated lock reads 46 the opening command transmitted by the key, i.e. in practise the marker of the key, which the lock receives from the wireless link of the lock.
  • the activated lock takes the necessary energy from the lock's own energy source.
  • the read marker is checked 47 in order to verify the validity of the opening command.
  • the marker of the key is compared with the numbers stored in the lock memory and on the basis of the data in the memory it is verified whether the key indicated by the marker has a right to release the lock.
  • a potential operation is performed 4-8. If the key has a right to release the lock, the lock electronics take care of the releasing of the lock by means of the actuator. The energy is drawn from the power source of the lock. If the key does not have a right to release the lock, the door remains locked. In addition, it is possible to inform the centre of the locking system, if there is any, about the opening attempt.
  • the released lock goes back to the sleep mode preferably after a certain delay, i.e. the lock electronics become de-energised or almost de-energised. The wi reless link of the lock will become de-energised after the energy transmitted to it by the key has run out.
  • the lock goes back to the locking mode after a certain time from the opening. This may be realised so that af- ter a certain time from the opening of the lock the lock electronics may wake up automatically and close the lock by the help of the actuator. After this, the lock goes back to the sleep mode.
  • steps of the method according to FIG. 4 may be performed also in an- other order, if the embodiment of the invention so requires.
  • the key marker, the opening command or another marker may be checked already by the wireless link, and only in case the operation is legal and necessary, the lock electronics will be activated.
  • steps 46 and 47 of FIG. 4 are practised before step 45.
  • the wireless link of the lock con- tains the necessary data, i.e. the rights of the key.
  • the key does not communicate directly with the lock, but only through the passage control apparatus, which checks whether the key in question is entitled to open the door. If it is authorised to open the door, the passage control apparatus will transmit an opening command to the lock.
  • the lock that decides whether somebody is allowed to open the door, but that is the task of the passage control apparatus. Accordingly, the opening command from the key to the passage control apparatus is read and checked by the passage control apparatus.
  • steps 46 and 47 of FIG. 4 are practised before step 42.
  • the key-specific data transmitted to the wireless link of the lock refers to an opening command.
  • the embodiments according to the invention may also comprise various kinds of applications.
  • the wireless link of the lock may for instance check first the general code transmitted by the key, whereby it is verified that the key is included in the system (even if not allowed to release the lock) .
  • the general code it is ensured that something else (or a disturbance) operating at the same frequency does not unnecessarily awake the lock electronics.
  • the lock electronics may also transmit data (e.g. a random number) to the key via the wireless link, which data is transformed for instance by a code and returned back by the key.
  • This operation may be utilized for instance for encryption of data.
  • the operation requires that the link communication is duplex, i.e. there is a transceiver at both ends of the link. Thereby there are ei- ther respective channels in both directions or the same channel is used for transmitting data alternately to the lock and the key.
  • the operation may also be arranged by using backscatter modulation technology described in the above.
  • To allow the release of the lock may also be the task of the key, whereby its memory contains the data (markers or the like) on the locks that may be released by the key in question. In this case it is not necessary to store this data in the lock, whereby the operation of the lock will be simplified.
  • a key or a similar device which is located at a communication distance from the lock may also transmit energy (and data) continuously, or for instance by pulsing, to the wireless link of the lock, but if the right code (e.g. the opening command of the lock) is not received, the wireless link of the lock does not activate the lock electronics.
  • the energy of the lock battery is not used in vain.
  • This kind of situation may be preferable for instance in the case of an object provided with passage control, in which the passage control apparatus communicates with both the lock and the key. Then, there does not necessarily have to be an opening push-button in the key, but it has to be taken into account that the operating life of the energy source is shorter, if the key transmits energy continuously.
  • the key may also be in a low-current mode (sleep mode), and not totally de-energised.
  • the wireless link of the lock may be in a low-current sleep mode, but it does not poll the keys with its receiver. In this case the energy is drawn for instance from the battery of the lock.
  • the lock electronics may awaken the wireless link of the lock, if the lock electronics for instance want to communicate with similar kind of devices in the vicinity thereof (e.g. with the passage control apparatus provided with a wireless link), even if they would not have anything to communicate with the lock at that moment.
  • he wireless link of the lock may also take its energy for instance from the battery of the lock, and after the link has been activated, start using the energy coming through the wireless link of the passage control apparatus, key or another similar device.
  • the wireless link of the lock may initially use also the energy coming from the transmitter (e.g. from the key) and then start using the lock's own battery as an energy source.
  • the wireless link of the lock is only activated by the energy transmitted by the key and after that the energy required for the actual data transmission is drawn from the battery of the lock.
  • the energy may, instead of a battery, be also drawn from an accumulator, condenser or another similar energy storage.
  • the wireless link according to the invention may also be used in other applications, in which a device or system needs to be awakened from the energy saving mode quickly and by a small amount of energy without knowing in advance when the awakening is going to take place, and without polling.

Abstract

The present invention relates to a locking system, in which a wireless link is used for data transmission between a key and a lock. According to the invention the receiver or transceiver of the wireless link of the lock being in conjunction with the lock is awakened only if the lock needs to be informed of something, e.g. the door is being opened or closed, and which accordingly lock awakes the lock electronics. The wireless link of the lock is energized and activated by the energy transmitted by the key, whereby it may be a passive element. The required energy is drawn from the battery of the key. The energy for the lock electronics is drawn from the lock's own battery.

Description

LOCKING SYSTEM AND METHOD FOR LOCKING SYSTEM
Technical field
The invention relates to a locking system, in which a wireless link is used for data transmission for instance between a key and a lock. In particular, the invention refers to a system utilizing radio waves.
Prior art
Traditionally, the locking of doors has been realised either totally by means of mechanical locks or, as nowadays to an increasing extent, also by electromechanical locks, especially in larger buildings. Electro-mechanical locks are generally connected by cables to an external power source and control systems. Electric locking systems are used especially in localities requiring passage control, such as in banks, business firms and other major localities. In private homes the use of electro-mechanical locking is still relatively unusual.
The electro-mechanical locking system will, however, gain more ground also in private homes, as it has considerable advantages compared to a mechanical system. Various kinds of surveillance and control systems for homes and buildings as well as networks are becoming more and more common (e.g. COBA standard, Connected Open Building). In these systems, lighting, heating, water and electricity consumption as well as other issues related to the building can be monitored and controlled through the network of the system. It is thus natural that also the locking systems in homes or buildings are connected to the surveillance and control system already in use. This requires means not only for data transmission but also for supplying the necessary energy between the surveillance and control system and the locking. In addition, it is required that the systems can be installed reliably and at a reasonable cost. It is possible to reduce the initial costs of a locking system considerably, if cable lines could be totally eliminated. There are several methods for realising data transmission wirelessly. For supplying the energy required by the locking system one possibility is to start using a battery, accumulator or similar energy storage as an energy source for the lock. Then the lock no longer requires any cables.
Prior art solutions utilizing a wireless link are disclosed for instance in the following publications: WO 99/531 61 , WO 00/60374, US 2002/002441 8 and US 2002/0024420.
It is also known to use data transmission especially based on electromagnetic induction as described, for example, in the publication WO 97/44557. In that case, the distance of the data transmission remains to be short.
For wireless data transmission there are at least two generally used methods: an infrared link (IR link) or a radio frequency transmitter/receiver link. The disadvantages of the IR link are, among other things, the visual communica- tion required between the transmitter and the receiver (e.g. the key and the lock), and the susceptibility of the lenses to dirt and dust as well as the narrowness of the IR link beam, which requires for instance that the IR-key is directed toward the lock. In an entrance door to a private home, in particular, an IR link is not the best possible communication means, as the dust, snow etc. possibly collected on the doors might cause communication problems.
Due to the above a radio frequency transmitter/receiver system is a more natural choice for wireless data transmission. Then, for instance in a simplex wireless key system the transmitter is on the same side as the key, whereas the receiver is located on the same side as the lock. In duplex systems, which are often necessary, both sides are provided with a receiver and a transmitter, whereby data transmission is possible in both directions. One of the advantages of the systems based on radio waves is that no visual communication is required and the directing of the transmitter and the receiver is not that crucial as in the case of an IR key. For this kind of short-range wireless data transmission there are several suitable solutions and standards, for instance Bluetooth, Zigbee and Zensys.
Using a battery in the lock requires low consumption of the lock's energy both when the lock is in an active mode (i.e. it is being released or closed) and also during its period of inactivity (i.e. in a so-called sleep mode), when the lock is in an energy saving mode waiting for an opening command for instance from a key.
In the active mode the energy consumption of the system is quite high, as energy is required for producing the mechanical action of an actuator (electric motor or the like). The operating time of the actuator is easily of the order of 200 ms (1 00 ms for unlocking and 1 00 ms for locking).
During the active mode the power consumption of the processor and other electronics of the lock is generally quite low (usually a few mA) compared to the power consumption of the actuator. Even if the wireless link of the system were duplex, the energy consumption of the actual data transmission (the energy required by the transmitter of the wireless link) is relatively low compared to the energy consumption of the actuator, as the power consumption of the transmitter is typically in the approximate order of 1 5 mA. The supply voltage and the transmission time may be for instance about 5 V and 20 ms, respectively.
It is possible to make the power consumption of the electronics (processor, memories etc.) of the lock itself sufficiently low in the sleep mode by using the present solutions, but as the proportion of that time is large, the energy consumption in the sleep mode is still significant. A so-called polling function of the lock, i.e. the monitoring of the lock environment, is also related to the sleep mode. Owing to the polling the lock is ready to react, if somebody wants release the locking by using a wireless key, for instance.
The energy consumption during the listening/polling by the receiver of the wireless link is a problem. The time for reacting to the opening command cannot be too long (in practise, not much longer than a second), as people are not willing to stand in front of the door waiting for the door to open. Since it is also impossible to foresee the moment someone wants to release the lock, one cannot use a clock, counter or another similar arrangement for awaking the lock and its electronics. This means in practise that the receiver needs to be active for instance once in a second and for as long as it takes to detect a potential opening command coming from a key. Thus, the transmitter in conjunction with the lock needs to poll the environment once in a second or even more frequently. If there is for instance no key with a message (e.g. a request for opening the door) in the environment of the lock during the polling, the lock needs to go back to the energy saving mode and wake up again after a second in order to listen to (poll) the environment. Even if the listening time of the transmitter was only 20 ms at intervals of one second, it makes altogether a significant daily energy amount thus discharging the energy source of the lock, e.g. the battery of the lock, even if the lock was not opened once.
The energy consumption is 1 0 joules per day, for instance, if the power consumption in the active mode is 200 mA, one unlocking/locking takes 200 ms, the lock is released/closed 50 times a day and the supply voltage is 5 V, whereas the energy consumption is about 85 joules a day, if the reaction time of the listening/polling by the wireless link is 1 s, the listening time 20 ms, the power consumption 1 0 mA during the listening and the supply voltage 5 V. The conclusion is that a significant part of the energy consumption of the lock provided with a wireless link consists of the energy consumed in the polling by the receiver. A practical requirement is that a battery should in normal use last a relatively long time (preferably for years), whereby the battery needs to be sufficiently large or an energy source outside the lock needs to be used, i.e. wires outside the lock, which is something one often wants to get rid of, as already mentioned in the above.
An object of the invention is to minimise the disadvantages of the above- discussed prior art solutions. The object is achieved in a way described in the claims.
Brief description of the invention
The idea of the invention is to awake the receiver or transceiver of the wireless link of the lock, being in conjunction with the lock, only if the lock needs to be informed of something, e.g. opening/closing of the door, and which accordingly awakes the electronics of the lock. In this case the polling function of the wireless link is not necessary. The invention decreases the energy consumption in an energy saving mode to a considerable extent. However, the transition at a random moment of time from the energy saving mode (sleep mode) to an active mode is fast. It is a random moment of time from the viewpoint of the lock, as it cannot foresee the moment a key user wants to release the lock. The random moment of time is thus the moment, at which a key user uses a key to release the lock. This is accomplished, if the receiver or transceiver of the wireless link of the lock in conjunction with the lock, more briefly also called 'the wireless link of the lock' in the present text, is energized and activated by the energy transmitted by the key, whereby it may be a passive element. The required energy is drawn from the energy source of the key, typically from a battery. The activated link for its part awakes the actual lock, more precisely the electronics of the lock. The energy for the lock electronics is drawn from the lock's own energy source, typically from a battery. The invention refers thus to a locking system, in which a wireless link is used for data transmission. The system comprises at least one lock, one key and one receiver or transceiver of the wireless link of the lock being in communication with the lock. The key comprises a transmitter or a transceiver, an en- ergy source, from which the necessary energy is drawn at a random moment of time for transmitting key-specific data to the wireless link of the lock as well as the necessary energy for activating the wireless link of the lock. The energy required by the wireless link of the lock is transmitted to the receiver of the wireless link simultaneously with the data. The simultaneousness means that the data may be transmitted either precisely at the same time as the energy required by the link, or the respective transmission times differ slightly from one another (the energy transmission for instance starts slightly before the data transmission). What is essential is that no unnecessarily long delay is caused for the user. There is a second energy source available for the lock for drawing the necessary energy for activating the lock and for its operations in response to the message transmitted by the receiver of the activated link.
The invention also refers to a locking system of the same kind as the above- mentioned locking system comprising at least one passage control system and one transmitter/receiver of the wireless link included in the passage control system. In this system the key preferably comprises a remote identifier. The transmitter/receiver of the wireless link included in the passage control system comprises an energy source, from which the necessary energy is drawn at a random moment of time for transmitting an opening command to the wireless link of the lock and the necessary energy for activating the receiver of the wireless link of the lock. The opening command is based on the data received from the key. In this system the opening command and the energy are transmitted simultaneously to the receiver of the wireless link. There is a second energy source available for the lock for drawing the necessary energy for activating the lock and for its operations. It is also possible to realise the invention as a combination of the above systems, whereby the energy required by the wireless link is drawn from the energy source of the key or from the transceiver of the passage control system.
The invention also refers to a method for a locking system, in which a wireless link is used for data transmission. In the method the key, which comprises an energy source and a switch, is activated to an operating mode in response to the turning-on of the switch taking place at a random moment of time. The key-specific data and the required energy are transmitted to the wireless link of the lock for energising and activating the wireless link of the lock. The wireless link of the lock is energised in response to the received energy and activated in response to the received data and the energising. Next, the lock comprising a second energy source is activated by transmitting a request from the link to the lock, whereby the necessary energy is drawn from the second energy source. The key-specific data received by the wireless link is read and the read data is checked. In response to the checking a potential operation is performed taking the necessary energy from the second energy source.
List of drawings
In the following the invention is described with reference to the attached drawings, in which
Figure 1 shows an example of an embodiment according to the invention;
Figure 2 shows an example of a second embodiment according to the invention;
Figure 3 shows an example of a third embodiment according to the invention; Figure 4 shows an example of a flow diagram illustrating the method according to the invention.
Description of the invention
FIG. 1 shows an example of the system according to the invention. In the solution according to the invention the lock 1 6 does not poll the environment via its wireless link 7 as in the prior art solutions. The wireless link (i.e. more precisely the receiver or transceiver of the wireless link) is awakened by other means. The idea is to draw the energy required by the wireless link, as in solutions based on electromagnetic induction, from a key 1 , i.e. from the energy source 5 of the key, which is usually a battery. After the wireless link 7 of the lock has been awakened, i.e. it has become active, the actual lock 1 6 is awakened. The lock takes the necessary energy from the energy source 9 of its own, e.g. from a battery. Thus, in the locking system according to the invention at least two different energy sources are utilised: the energy source of the key and the energy source of the lock. When the lock is in its energy saving mode the aim is to minimise the energy amount the lock takes from the battery.
The key 1 in the locking system according to the invention comprises a transmitter 3 (reader) of the wireless link, its antenna 2, an energy source 5, i.e. usually a battery, and an opening push-button 4. In addition, the key comprises a small-scale memory 1 7, which may be integrated inside the wireless link. The memory includes the marker of the key.
The wireless link 7 of the lock is a radio communication channel to the environment of the lock. In addition to the actuating member 7 itself, it comprises an antenna 6. The actuator is usually an electronics circuit. The energy (and data) 1 5 transmitted by the key via radio communication is received in the antenna 6, from which the actuator generates its own operational energy, i.e. its operational electricity. Thus, the wireless link does not need an energy source of its own (e.g. a battery), but it may be a so-called passive unit as regards its operating principle. The actuator of the link is in communication with the actual lock 1 6 via the link interface 8 of the lock, so that data can be transmitted to the lock from a key (or another data source) as well as an interrupt message. The interrupt message is a command or request, by which the lock is told to interrupt the energy saving mode and go to an active mode. The wireless link of the lock may also be included in the lock instead of being an external element in communication with the lock. Therefore the wireless link of the lock in conjunction with the lock refers in this description to a receiver or transceiver of the wireless link located either outside or inside the lock unit.
The lock comprises an electronics circuit 10, a memory 1 8, a power management unit 1 20 and possibly a processor 1 9 (in larger applications). The memory stores key numbers, which indicate the keys authorized to release the lock. The electronics circuit receives its energy from the energy source 9 of the lock. The energy source is usually a battery, but it may also be another source, such as an electric conductor connection to the general electricity supply of the building. In addition, the lock is provided with a control circuit 1 1 for actuator for controlling the operations of the actuator 1 2. The actuator is in mechanical communication with the mechanical locking elements 1 3 (such as the dead bolt) of the lock, which are moved by the actuator for releasing or closing the lock. In the example of FIG. 1 the controller 1 1 of the actuator and the battery 9 are illustrated outside the electronics circuit, but they could as well be integrated into the circuit, i.e. be parts of the lock. Correspondingly, the memory, the power management unit and the processor included in the circuit 1 0 could be separate elements outside the electronics circuit.
The key (i.e. the reader of the wireless link) acting as a transmitter awakes the wireless link of the lock by the energy preferably included in the data transmitted by it. Thus the link gets its energy from the energy of the data message. In other words, if nobody is in the process of releasing the lock (or there is nothing to report to the lock at a certain moment), the wireless link of the lock is not active, whereby it does not consume energy. Accordingly, the wireless link of the lock does not need any energy saving mode (sleep mode), as there is no need for it to wake up in order to react or listen. Polling according to prior art is thus not necessary.
A key transmits energy to the lock only if there is a need to release the lock by the key (i.e. the user of the key presses the opening push-button). The rest of the time the key electronics are totally de-energised or in a very low- current mode. Even if the power taken by the key from the battery in a transmission situation is fairly high (for instance about 0.5 W), the total energy consumption is low, as an individual key is used relatively seldom and the time required for a transmission of one opening command is short. The change and charging of the battery in a key is far easier to arrange than that of the battery located inside the actual lock, door or doorframe.
The lock (more precisely the lock electronics) instead is awakened by an interrupt command or request coming from the wireless link of the lock, which has already been activated by the energy included in the message from the key. In other words, also the lock is activated only if the lock needs to be used or informed of something. The lock may also for some reason be activated by itself (for instance in emergency situations, which the locking system is able to detect independently) . The rest of the time the lock electronics are in a stand-by state (energy saving mode, sleep mode) consuming only very little power (a few microamperes).
FIG. 2 shows an example of a second embodiment according to the invention. In this example the invention is put into practice by using an RFID sys- tem (Radio Frequency Identification) as a part of the locking system. RFID is previously known technology for instance from electric identifying of items. In the system according to the invention the RFID technology is, however, applied in a novel fashion.
In the prior art RFID applications (for instance bar code systems) either a sta- tionary or a movable reader (RFID reader) is used for reading the data on the item. The reader may be in communication with external data networks or data systems. The item or the package thereof is provided with a remote identifier (RFID remote identifier) . The data on the item is located in the remote identifier, from which the reader can catch it and forward the read data to data systems.
An RFID system has also been used for passage control in buildings. People carry along a remote identifier (acting as an electric key), which contains specific data on the remote identifier. Similarly, the passage control appara- tus is provided with a reader (for instance at a door frame), which reads the data of the remote identifier, when it is taken into the vicinity of the reader. The passage control device checks the passage rights of the remote identifier on the basis of the read data.
In the example according to FIG . 2 the remote identifier is made an integrated part of the lock operation, especially of its data transmission and activation. The transmitter 23 of a key 21 is in practise an RFID reader, but it now transmits its marker to the RFID remote identifier located in the actuator of the link 27 of the lock, after the opening push-button 24 of the key has been pressed. The reading, i.e. data transmission, is carried out via radio communication 21 7 through the antenna 22 of the key and the antenna 26 of the wireless link of the lock. In the data transmission the RFID reader transmits energy and data on the key to the RFID remote identifier. The necessary energy is drawn from the energy source 25 of the key.
It is to be noticed that in practise the key may be composed around the RFID reader. Thus, it can be concluded that the key is an RFID reader. The shape of the key 21 in FIG. 2 illustrates such an example, where the necessary elements are located inside a common enclosure. It should, however, be mentioned that the key may also have a mechanical key section, as is shown in FIG. 1 .
The remote identifier in the link is passive, i.e. it has not an energy source of its own, but it takes the required energy from the energy transmitted by the reader. The necessary input power is nowadays quite low, approximately of the order of a few μW's. The actuator 27 of the link is in communication with the actual lock 21 8 via the link interface 28 of the lock, so that data can be transmitted to the lock from a key (or another data source) as well as interrupt information.
The electronics circuit 210 receives the data and the interrupt message from the interface and performs the awakening, i.e. activation, of the lock. The energy is drawn from the lock's energy source 29 through a power management unit 21 4. In this example the power management unit is separated from the electronics circuit 21 0 of the lock, but it may also be connected to the circuit in question. The power management unit takes care of the energy supply to the other parts of the lock, in other words the lock electronics including the processor thereof and the locking sensor 21 5 receive supply voltage VCC and the controller of the actuator and the actuator itself get supply voltage VDD. VCC and VDD may also be one and the same supply voltage. The power management unit is also controlled by the processor's re- quest/command R to move the lock into an energy saving mode.
The memory of the key electronics stores key numbers, which indicate the keys authorized to release the lock. Thus, the electronics circuit receives its energy from the energy source of the lock. The energy source is usually a battery, but it may also be another source, such as an electric conductor connection to the general electricity supply of the building. In addition, the lock is provided with a control circuit 21 1 for actuator for controlling the op- erations of the actuator 21 2. The actuator is in mechanical communication with the mechanical locking elements 21 3 (such as the dead bolt) of the lock, which are moved by the actuator for releasing or closing the lock. A locking sensor 21 5 controls the mode of the locking and transmits the mode data to the electronics of the lock. Further, the figure shows also a parallel alternative for releasing the lock through a mechanical element 21 6 (a key cylinder).
If a duplex service between the RFID reader (i. e. in practise the key) and the RFID remote identifier (i.e. in practise the lock) is desired, a so-called back- scatter modulation may be utilised.
In practise, also a so-called anti-collision method is required for the embodiments of both FIG. 1 and 2, since there may be several doors (RFID remote identifiers) and keys (RFID readers) within the range of the system.
The RFID reader may be either an independent device (i.e. the RFID reader is a key) or it may be arranged as a part of another device (for instance of a mobile phone).
The system shown in FIG. 2 operates on radio waves at a frequency of 869 MHz based on the RFID standard proposal ISO 1 8000-6 (but does not necessarily follow it precisely). A similar operation may also be performed e.g. at a frequency of 1 3,56 MHz and for instance by using magnetic induction, if so required. The range of the key, though, may then be less than one meter and the size of the antennas significantly larger.
If the aim is to arrange an RFID reader into a very small device, a higher frequency may be used, for instance 2,45 GHz, for which there is also an RFID standard proposal ISO 1 8000-4. Then the size of the antennas will also be smaller. In the above-mentioned systems there is no need for a battery for the wireless link of the lock.
FIG. 3 shows an embodiment according to the invention comprising a pas- sage control apparatus (Access Control System) or the like. The lock 21 8 and the wireless link 27 of the lock located at a door 1 4 are similar elements as those in FIG. 2 (software differences might occur). The key 31 is now provided with an RFID remote identifier 33 (not with an RFID reader) and it is in communication 36 with the passage control system 31 0 through an RFID reader 38 included therein. The separate RFID reader 38 included in the passage control system monitors its coverage area and is in communication with the keys within the area. The communication may be link communication (e.g. radio communication), which is continuously turned on or link communication, which is intermittently turned on (e.g. at intervals of a few seconds). In practise, the communication exists between the antenna 32 of the key and the antenna 39 of the passage control reader.
If a key is authorized to open the door controlled by the reader of the passage control, the passage control system 31 0 transmits this information through the reader 38 to the RFID remote identifier of the wireless link of the lock, which forwards it to the lock, which is then released. That being the case, it is not necessarily the lock that makes the decision about releasing the lock, but that is the task of the passage control. Thus, the passage control has the necessary information about the rights of the keys. At the same time as the information about the release the lock is transferred 37 to the wireless link of the lock, also the energy required by the wireless link of the lock is transferred. If there are several locks and passage control readers within an overlapping coverage area, the lock can be provided with a lock- specific code, by which the opening requests intended for the lock can be distinguished from other opening requests. Then the opening request needs to contain the lock specific-code. The wireless links of the locks within the same coverage area receive the same opening request, but only the wireless link of the right lock awakes the lock electronics. It is thus advantageous to check the code in the link and not in the lock electronics in order to avoid unnecessary activation of the lock, whereby the energy source of the lock will neither be used in vain.
Also in this system a duplex communication between the RFID reader (i.e. in practise the passage control apparatus) and the RFID remote identifier (i.e. in practise the lock) can be arranged by utilizing the above-mentioned backscat- ter modulation. Then the lock may wake up for instance by means of the dead locked interrupt of a locking sensor (or similarly by means of the mode data sensor of the lock, not shown in the figure), after which the lock electronics report this through the RFID remote identifier of the lock to the passage control apparatus by utilising for instance the above-mentioned back- scatter modulation. By using this method the lock may report for instance a potential burglary attempt to the system.
Also a duplex communication between the RFID reader of the passage control apparatus and the RFID remote identifier of the key can be arranged applying the same principle.
In this embodiment the cost of the keys is considerably lower and their size much smaller, as in this case the key is not an RFID reader, but a far simpler and less expensive RFID remote identifier. Since the remote identifier does not necessarily require a battery (i.e. it is a passive remote identifier), its op- erating life is practically unlimited. Also a battery may, however, be included in the key, whereby it is possible to add to the functions of the key. Thereby for instance an active or a semi-active RFID remote identifier are possible arrangements, as mentioned in the above.
Also in this embodiment there can be naturally several remote identifiers of keys and locks within the same area, whereby an anti-collision method is required. One passage control apparatus may control several doors by one RFID reader, if its range is sufficiently wide. In addition, several RFID readers may be connected to one passage control apparatus, whereby the range (cover- age area) of the system may be considerably widened.
It is also possible to have an embodiment, in which the solutions according to FIGS. 2 and 3 are combined. In other words, if the key is an RFID reader, it may be in direct communication with the lock, and if the key is an RFID re- mote identifier, it is in communication with the passage control system, which transmits the necessary data to the lock. This embodiment requires an efficient anti-collision method (for instance a frequency or time division).
In the embodiments according to FIGS. 1 - 3 the wireless links in the locks and the transmitters in the keys are shown as one- circuit arrangements. In other words, the wireless link of the lock in conjunction with the lock comprises one circuit unit and correspondingly, the transmitter of the key comprises one circuit unit. It is, however, possible that the wireless link of the lock consists of several circuits, e.g. of two circuits, of which the first one is meant for awakening the lock and receiving the energy transmitted from the key or the passage control, and the second one is a circuit used for receiving and/or transmitting data. Similarly, the key may have two circuits (or even several circuits set up for a specific purpose), of which the first one transmits data and the second one energy. Thus, there are several variations for realis- ing the circuit on the side of the wireless link of the lock and the key and these can be realised irrespectively of the realisation of the opposite side of the link as long as they have a common interface between them. Thus, in this text the receiver, transmitter and transceiver of the wireless link refer to all possible embodiments thereof.
FIG. 4 shows an example of a flow diagram illustrating the method according to the invention that is meant to use in a locking system wherein there exists an energy source both in the key and in the lock. In view of normal usage the key de-energised in the initial situation, as is also the wireless link of the lock. The lock electronics are in a low- current mode, i.e. in a sleep mode (or in some applications de-energised). During the sleep mode the energy is drawn from the energy source of the lock. In the initial situation of this example the lock is latched also by mechanical locking elements (i.e. the dead bolt is out). The locked state does not require any operation of the actuator. In other words, the actuator does not consume any energy in the locked state.
When the aim is to release the lock, the key is activated 41 to an operating mode in response to the turning-on of the opening switch, i .e. to the pressing of the opening push-button. Then the electricity for the key is switched on. The energy is drawn from the energy source of the key. Next, an opening command/request is transmitted 42 from the key to the lock. The opening command contains the marker of the key. At the same time the opening command contains enough energy for activating the wireless link of the lock. It is preferable to transmit the marker and the necessary energy together, but it is also possible to transmit the marker and the energy separately, for in- stance at different frequencies (through different channels). The opening command/request should be understood so as to contain both the marker of the key and the necessary energy regardless of the technical realisation of the transmission. The transmission energy is taken from the energy source of the key.
In response to the energy of the opening command, the wireless link of the lock is energised 43, i.e. an energy source is connected to the link. By utilizing the received energy transmitted by the key the wireless link of the lock is activated, i.e. awakened, 44. Further, the activated link transmits an inter- rupt request or command to the lock electronics, whereby the sleep mode of the lock is interrupted and the lock wakes up. In other words, the lock electronics are activated 45. The activated lock reads 46 the opening command transmitted by the key, i.e. in practise the marker of the key, which the lock receives from the wireless link of the lock. The activated lock takes the necessary energy from the lock's own energy source. The read marker is checked 47 in order to verify the validity of the opening command. The marker of the key is compared with the numbers stored in the lock memory and on the basis of the data in the memory it is verified whether the key indicated by the marker has a right to release the lock.
On the basis of the checking a potential operation is performed 4-8. If the key has a right to release the lock, the lock electronics take care of the releasing of the lock by means of the actuator. The energy is drawn from the power source of the lock. If the key does not have a right to release the lock, the door remains locked. In addition, it is possible to inform the centre of the locking system, if there is any, about the opening attempt. The released lock goes back to the sleep mode preferably after a certain delay, i.e. the lock electronics become de-energised or almost de-energised. The wi reless link of the lock will become de-energised after the energy transmitted to it by the key has run out. It is also preferable that the lock goes back to the locking mode after a certain time from the opening. This may be realised so that af- ter a certain time from the opening of the lock the lock electronics may wake up automatically and close the lock by the help of the actuator. After this, the lock goes back to the sleep mode.
The steps of the method according to FIG. 4 may be performed also in an- other order, if the embodiment of the invention so requires. For instance the key marker, the opening command or another marker may be checked already by the wireless link, and only in case the operation is legal and necessary, the lock electronics will be activated. In other words, steps 46 and 47 of FIG. 4 are practised before step 45. Then the wireless link of the lock con- tains the necessary data, i.e. the rights of the key. It may also be the case that the key does not communicate directly with the lock, but only through the passage control apparatus, which checks whether the key in question is entitled to open the door. If it is authorised to open the door, the passage control apparatus will transmit an opening command to the lock. So, in this arrangement it is not necessarily the lock that decides whether somebody is allowed to open the door, but that is the task of the passage control apparatus. Accordingly, the opening command from the key to the passage control apparatus is read and checked by the passage control apparatus. In other words, steps 46 and 47 of FIG. 4 are practised before step 42. In this case the key-specific data transmitted to the wireless link of the lock refers to an opening command.
The embodiments according to the invention may also comprise various kinds of applications. The wireless link of the lock may for instance check first the general code transmitted by the key, whereby it is verified that the key is included in the system (even if not allowed to release the lock) . By the general code it is ensured that something else (or a disturbance) operating at the same frequency does not unnecessarily awake the lock electronics.
The lock electronics may also transmit data (e.g. a random number) to the key via the wireless link, which data is transformed for instance by a code and returned back by the key. This operation may be utilized for instance for encryption of data. The operation requires that the link communication is duplex, i.e. there is a transceiver at both ends of the link. Thereby there are ei- ther respective channels in both directions or the same channel is used for transmitting data alternately to the lock and the key. The operation may also be arranged by using backscatter modulation technology described in the above.
To allow the release of the lock may also be the task of the key, whereby its memory contains the data (markers or the like) on the locks that may be released by the key in question. In this case it is not necessary to store this data in the lock, whereby the operation of the lock will be simplified. This could be a suitable method (cf. FIG. 4) in case the key is for instance a mobile phone, which has enough memory and processing capacity and the data in which is easier to update, i.e. to add the most recent information, th an in the case of a lock attached to a door.
A key or a similar device (for instance a passage control apparatus), which is located at a communication distance from the lock may also transmit energy (and data) continuously, or for instance by pulsing, to the wireless link of the lock, but if the right code (e.g. the opening command of the lock) is not received, the wireless link of the lock does not activate the lock electronics. Thus, the energy of the lock battery is not used in vain. This kind of situation may be preferable for instance in the case of an object provided with passage control, in which the passage control apparatus communicates with both the lock and the key. Then, there does not necessarily have to be an opening push-button in the key, but it has to be taken into account that the operating life of the energy source is shorter, if the key transmits energy continuously.
In the initial situation the key may also be in a low-current mode (sleep mode), and not totally de-energised. In the same way the wireless link of the lock may be in a low-current sleep mode, but it does not poll the keys with its receiver. In this case the energy is drawn for instance from the battery of the lock.
Also the lock electronics may awaken the wireless link of the lock, if the lock electronics for instance want to communicate with similar kind of devices in the vicinity thereof (e.g. with the passage control apparatus provided with a wireless link), even if they would not have anything to communicate with the lock at that moment.
For a moment he wireless link of the lock may also take its energy for instance from the battery of the lock, and after the link has been activated, start using the energy coming through the wireless link of the passage control apparatus, key or another similar device.
The wireless link of the lock may initially use also the energy coming from the transmitter (e.g. from the key) and then start using the lock's own battery as an energy source. In other words, in this version the wireless link of the lock is only activated by the energy transmitted by the key and after that the energy required for the actual data transmission is drawn from the battery of the lock.
The energy may, instead of a battery, be also drawn from an accumulator, condenser or another similar energy storage.
The embodiments disclosed in this text are applied to an electro-mechanical lock, but the wireless link according to the invention may also be used in other applications, in which a device or system needs to be awakened from the energy saving mode quickly and by a small amount of energy without knowing in advance when the awakening is going to take place, and without polling.
In the light of the above it is apparent that the invention may also be realised by such embodiments that are not described in this text. Thus, the invention is not limited to the above-described examples only, but it can be utilised also in a plurality of other practical applications within the scope of the inventive idea.

Claims

1 . A locking system, in which a wireless link is used for data transmission and which comprises at least one lock, one key and one receiver of the wireless link of the lock being in communication with the lock, the key comprising a transmitter of the wireless link, and an energy source from which the necessary energy is drawn at a random moment of time for transmitting key-specific data to the wireless link of the lock as well as the necessary energy for activating the wireless link of the lock, which energy is transmitted to the receiver of the wireless link simultaneously with the data, characterised in that there is a second energy source available for the lock for drawing the necessary energy for activating the lock and for its operations in response to the message transmitted by the receiver of the activated link.
2. A locking system according to claim 1 , characterised in that the receiver of the wireless link of the lock being in communication with the lock also comprises a transmitter, and the transmitter of the wireless link of the lock located in the key comprises a receiver.
3. A locking system according to claim 1 or 2, characterised in that the key comprises an RFID reader and the receiver of the wireless link in communication with the lock comprises an RFID remote identifier.
4. A locking system according to claim 1 , 2 or 3, characterised in that the receiver of the wireless link of the lock being in communication with the lock is a passive element.
5. A locking system according to any one of claims 1 - 4, characterised in that the receiver of the wireless link of the lock being in communication with the lock is a part of the lock.
6. A locking system according to any one of claims 1 - 5, characterised in that the second energy source is a part of the lock.
7. A locking system according to any one of claims 1 - 6, characterised in that the lock consists of an electronics section, an actuator and mechanical locking elements.
8. A locking system according to claim 7, characterised in that the electronics section comprises a processor.
9. A locking system according to any one of claims 3 - 8 and claim 2, characterised in that data is transmitted also to the key through the wireless link of the lock.
1 0. A locking system according to any one of claims 1 - 9, characterised in that the lock or the receiver of the wireless link of the lock being in comm unication with the lock contains the data on the keys, which are entitled to release the lock.
1 1 . A locking system according to claim 1 0, characterised in that the lock or the receiver of the wireless link of the lock being in communication with the lock checks whether the lock is allowed to be released by a certain key, on the basis of which checking the lock is released, if the key is authorised to release the lock in question.
1 2. A locking system according to claim 9, characterised in that the key has data on the locks, which it is entitled to release, whereby the key may allow the release of the lock on the basis of the lock-specific data transmitted from the lock, whereby an opening request may be transmitted to the lock, which request is fulfilled by the lock.
1 3. A locking system according to any one of claims 1 - 1 2, characterised in that the key and/or the receiver of the wireless link of the lock being in communication with the lock are in a low-current mode.
1 4. A locking system according to any one of claims 1 - 1 3, characterised in that the receiver of the wireless link of the lock being in communication with the lock takes the necessary energy from the second energy source except for the awaking of said receiver, or the receiver of the wireless link of the lock takes the energy for awaking the lock from the second energy source and the rest of the required energy from the key.
1 5. A locking system according to any one of claims 1 - 14, characterised in that also the lock may awake the receiver of the wireless link of the lock being in communication with the lock.
1 6. A locking system according to any one of claims 1 - 1 5, characterised in that the system comprises an anti-collision system.
1 7. A locking system according to any one of claims 1 - 1 6, characterised in that the key is a part of a mobile phone.
1 8. A locking system, in which a wireless link is used for data transmission and which comprises at least one lock, one key and one receiver of the wireless link of the lock being in communication with the lock, one passage control system and one transmitter/receiver of the wireless link included in the passage control system, the key comprising a remote identifier, characterised in that the transmitter/receiver of the wireless link included in the passage control system comprises an energy source, from which the necessary energy is drawn at a random moment of time for transmitting an open- ing command to the wireless link of the lock, which opening command is based on the data received from the key, as well as the necessary energy for activating the receiver of the wireless link of the lock, which energy is transmitted to the receiver of the wireless link simultaneously with the opening command, and that there is a second energy source available for the lock for taking the necessary energy for activating the lock and for its operations in response to the message transmitted by the receiver of the activated link.
1 9. A locking system according to claim 1 8, characterised in that the receiver of the wireless link in communication with the lock comprises an RFID remote identifier, the transmitter/receiver of the wireless link included in the passage control system comprises an RFID reader and the key comprises an RFID remote identifier.
20. A locking system according to claim 1 8 or 1 9, characterised in that the receiver of the wireless link in communication with the lock also comprises a transmitter.
21 . A locking system according to any one of claims 1 9 - 20, characterised in that in addition to said keys the system comprises at least one key, which includes a transmitter of the wireless link and an energy source, from which the necessary energy is drawn at a random moment of time for the transmitting key-specific data to the wireless link of the lock, as well as the necessary energy for activating the wireless link of the lock, which en ergy is transmitted to the receiver of the wireless link simultaneously with the data.
22. A locking system according to any one of claims 1 8 - 21 , characterised in that in the system the lock, the receiver of the wireless link of the lock being in communication with the lock or the passage control system checks whether the key is entitled to release the lock in question, on the basis of which checking the lock is possibly released.
23. A locking system according to any one of claims 1 8 - 22, characterised in that the system comprises an anti-collision system.
24. A locking system according to any one of claims 1 8 - 23, characterised in that the key is a part of a mobile phone.
25. A method for a locking system, in which a wireless link is used for data transmission and which comprises at least one lock, one key and one receiver of the wireless link of the lock being in communication with the lock, the key comprising a transmitter of the wireless link the method, in which method: - activating the key, which comprises an energy source and a switch to an operating mode in response to the turning-on of the switch taking place at a random moment of time,
- transmitting key-specific data and the required energy for energising and activating the wireless link of the lock to the wireless link of the lock, - energising the wireless link of the lock in response to the received energy,
- activating the wireless link of the lock in response to the received data and the energising,
- reading the received key-specific data,
- checking the received data, characterised in that the method further comprises the next phases:
- activating the lock, which comprises a second energy source, by transmitting a request from the wireless link of the lock to the lock, whereby the necessary energy is drawn from the second energy source,
- performing a potential operation in response to said checking taking the necessary energy from the second energy source.
26. A method according to claim 25, characterised in that the key-specific data and the required energy for energising and activating the wireless link of the lock are transmitted simultaneously.
27. A method according to claim 25 or 26, characterised in that said wireless link is duplex, whereby said receiver comprises a transmitter and said transmitter comprises a receiver.
28. A method according to claim 25, 26 or 27, characterised in that the lock may awake the receiver of the wireless link in communication with the lock.
29. A method according to any one of claims 25 - 28 , characterised in that the step of reading the received data and the step of checking the read data are practised before the step of activating the lock.
30. A method according to any one of claims 25 - 28 , characterised in that the system also comprises a passage control apparatus including at least one transmitter/receiver, whereby parallel with the activating step there is an al- ternative step, in which the transmitter/receiver of the passage control apparatus is activated at a random moment of time.
31 . A method according to claim 30, characterised in that the step of reading the received data and the step of checking the read data are practised before the transmission of the key-specific data and the required energy to the lock.
PCT/FI2004/000684 2003-12-08 2004-11-16 Locking system and method for locking system WO2005054609A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20031787 2003-12-08
FI20031787A FI115551B (en) 2003-12-08 2003-12-08 Locking system and procedure for a locking system

Publications (1)

Publication Number Publication Date
WO2005054609A1 true WO2005054609A1 (en) 2005-06-16

Family

ID=29763486

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2004/000684 WO2005054609A1 (en) 2003-12-08 2004-11-16 Locking system and method for locking system

Country Status (4)

Country Link
AR (1) AR046875A1 (en)
FI (1) FI115551B (en)
TW (1) TW200519280A (en)
WO (1) WO2005054609A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006101615A1 (en) * 2005-03-17 2006-09-28 Inncom International, Inc. Proximity wake-up activation of electronic circuits
EP1752929A1 (en) * 2005-07-28 2007-02-14 Inventio Ag Access control method for an area accessible to persons, in particular for a room closed off by means of a door
JP2007080248A (en) * 2005-07-28 2007-03-29 Inventio Ag Method of controlling access to area accessible to persons, in particular to space closed by door
WO2009117855A1 (en) * 2008-03-28 2009-10-01 Lin Dai-You Powerless electric locking device and control method thereof
WO2010144449A1 (en) * 2009-06-08 2010-12-16 Harrow Products Llc Electronic door lock for reduced power consumption
EP2490488A1 (en) * 2011-02-18 2012-08-22 Kerlink Method and device for near-field communication and corresponding computer program.
US8354914B2 (en) 2005-01-27 2013-01-15 Inncom International, Inc. Reduced power electronic lock system
US8446249B2 (en) 2005-07-28 2013-05-21 Inventio Ag Method of controlling access to an area
CN104157059A (en) * 2014-08-14 2014-11-19 深圳市俊武科技有限公司 Logistics security box system with no-transformer electronic lock
EP2919202A1 (en) * 2014-03-10 2015-09-16 Assa Abloy Ab RFID powered lock device
EP3367340B1 (en) * 2015-10-22 2020-05-27 Ojmar, S.A. Electronic lock for furniture, cabinets or lockers
EP3748587A1 (en) * 2019-06-07 2020-12-09 Aug. Winkhaus GmbH & Co. KG Electronic locking system
EP3131068B1 (en) 2015-08-11 2022-09-07 Schulte-Schlagbaum Aktiengesellschaft Cabinet door lock communicating wirelessly with a central unit

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3735470A1 (en) * 1987-10-20 1989-05-03 Franzen Sicherheitstechnik Gmb Locking device having contact-free data and electrical power transmission between the lock and key
EP0505084A1 (en) * 1991-03-19 1992-09-23 Yale Security Products Limited Lock and combination of lock and key.
WO1997044557A1 (en) * 1996-05-23 1997-11-27 Paolo Potenziani Electronic apparatus for the electromagnetic release of a lock
US5920268A (en) * 1996-10-11 1999-07-06 Newtyme, Inc. Keyless entry systems for use with conventional locksets
EP1338734A1 (en) * 2000-11-22 2003-08-27 Xiao Ming Zhai An intelligent lock that can set a key code by itself, a key which can be used for many locks and a setting tool thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3735470A1 (en) * 1987-10-20 1989-05-03 Franzen Sicherheitstechnik Gmb Locking device having contact-free data and electrical power transmission between the lock and key
EP0505084A1 (en) * 1991-03-19 1992-09-23 Yale Security Products Limited Lock and combination of lock and key.
WO1997044557A1 (en) * 1996-05-23 1997-11-27 Paolo Potenziani Electronic apparatus for the electromagnetic release of a lock
US5920268A (en) * 1996-10-11 1999-07-06 Newtyme, Inc. Keyless entry systems for use with conventional locksets
EP1338734A1 (en) * 2000-11-22 2003-08-27 Xiao Ming Zhai An intelligent lock that can set a key code by itself, a key which can be used for many locks and a setting tool thereof

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8354914B2 (en) 2005-01-27 2013-01-15 Inncom International, Inc. Reduced power electronic lock system
WO2006101615A1 (en) * 2005-03-17 2006-09-28 Inncom International, Inc. Proximity wake-up activation of electronic circuits
EP1752929B1 (en) 2005-07-28 2018-10-03 Inventio AG Access control method for an area accessible to persons, in particular for a room closed off by means of a door
EP1752929A1 (en) * 2005-07-28 2007-02-14 Inventio Ag Access control method for an area accessible to persons, in particular for a room closed off by means of a door
CN1905718B (en) * 2005-07-28 2010-05-26 因温特奥股份公司 Access control method for an area accessible to persons, in particular for a room closed off by means of a door
JP2007080248A (en) * 2005-07-28 2007-03-29 Inventio Ag Method of controlling access to area accessible to persons, in particular to space closed by door
US8446249B2 (en) 2005-07-28 2013-05-21 Inventio Ag Method of controlling access to an area
KR101306366B1 (en) 2005-07-28 2013-09-09 인벤티오 아게 Method of controlling access to an area accessible by persons, particularly to a space closed by a door
EP1752929B2 (en) 2005-07-28 2022-06-22 Inventio AG Access control method for an area accessible to persons, in particular for a room closed off by means of a door
US9064403B2 (en) 2005-07-28 2015-06-23 Inventio Ag Method of controlling access to an area accessible by persons, particularly to a space closed by a door
US9082244B2 (en) 2005-07-28 2015-07-14 Inventio Ag Method of controlling access to an area
WO2009117855A1 (en) * 2008-03-28 2009-10-01 Lin Dai-You Powerless electric locking device and control method thereof
WO2010144449A1 (en) * 2009-06-08 2010-12-16 Harrow Products Llc Electronic door lock for reduced power consumption
CN102549625A (en) * 2009-06-08 2012-07-04 哈罗产品有限公司 Electronic door lock for reduced power consumption
EP2490488A1 (en) * 2011-02-18 2012-08-22 Kerlink Method and device for near-field communication and corresponding computer program.
EP2919202A1 (en) * 2014-03-10 2015-09-16 Assa Abloy Ab RFID powered lock device
CN104157059A (en) * 2014-08-14 2014-11-19 深圳市俊武科技有限公司 Logistics security box system with no-transformer electronic lock
EP3131068B1 (en) 2015-08-11 2022-09-07 Schulte-Schlagbaum Aktiengesellschaft Cabinet door lock communicating wirelessly with a central unit
EP3367340B1 (en) * 2015-10-22 2020-05-27 Ojmar, S.A. Electronic lock for furniture, cabinets or lockers
EP3748587A1 (en) * 2019-06-07 2020-12-09 Aug. Winkhaus GmbH & Co. KG Electronic locking system

Also Published As

Publication number Publication date
FI115551B (en) 2005-05-31
TW200519280A (en) 2005-06-16
AR046875A1 (en) 2005-12-28
FI20031787A0 (en) 2003-12-08

Similar Documents

Publication Publication Date Title
JP4635731B2 (en) Security system
US8456305B2 (en) Redundant security system
US8222990B2 (en) Hybrid access control system and method for controlling the same
US20060164206A1 (en) Reduced power electronic lock system
JP5436748B2 (en) How to restrict access to areas where people can go in and out, especially spaces closed by doors
KR101308802B1 (en) Method of controlling access to an area accessible by persons, particularly to a space closed by a door
US8193935B2 (en) RFID perimeter alarm monitoring system
US20120075064A1 (en) Proximity wake-up activation of electronic circuits
WO2005054609A1 (en) Locking system and method for locking system
US9355512B2 (en) Closing unit, closing apparatus, and method for unlocking and/or locking a lock
EP1855756B1 (en) Door system for a mass transit vehicle, comprising a wireless powerless switch sensor.
JP4184375B2 (en) Vehicle communication device
TWM494819U (en) Active detection type RFID smart door lock controller
KR100869888B1 (en) Home door open control device and therefor automatic open control system for use in apartment complex
KR100822769B1 (en) Electronic tag including the mode convertible function and base station device using the tag
JP4665649B2 (en) Lock control device and program
JP7009181B2 (en) Door control system
JP2008158966A (en) Access control system
WO2000060374A1 (en) Passively powered, portable remote device
KR100869293B1 (en) System and method for integrating security using the key-holder card
JP2014173324A (en) Electric lock system
KR20120106141A (en) Wireless door lock built in security function apparatus
JP4510474B2 (en) Entrance / exit management system
TW201704610A (en) Intelligent entrance control device
US20230195203A1 (en) Method and apparatus for reducing power consumption in a hardware token reader

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase