WO2016156665A1 - Control device for controlling an electric locking device - Google Patents

Control device for controlling an electric locking device Download PDF

Info

Publication number
WO2016156665A1
WO2016156665A1 PCT/FI2016/050197 FI2016050197W WO2016156665A1 WO 2016156665 A1 WO2016156665 A1 WO 2016156665A1 FI 2016050197 W FI2016050197 W FI 2016050197W WO 2016156665 A1 WO2016156665 A1 WO 2016156665A1
Authority
WO
WIPO (PCT)
Prior art keywords
control
control device
key
user
locking device
Prior art date
Application number
PCT/FI2016/050197
Other languages
French (fr)
Inventor
Tero PYNNÖNEN
Veli-Matti SINKKONEN
Original Assignee
Fourplan Ict Solutions
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fourplan Ict Solutions filed Critical Fourplan Ict Solutions
Publication of WO2016156665A1 publication Critical patent/WO2016156665A1/en

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6418Hybrid transport
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems

Definitions

  • the application relates generally to control equipment for controlling an electric locking device.
  • the objective of using mobile phones instead of keys for the unlocking of locks at the doors of buildings and apartments is to mitigate the necessity of reserializing the locks as a result of lost keys and user turnover.
  • an accessory thereof which includes a Bluetooth module.
  • the mobile phone is uploaded by way of a mobile phone network with a software application and that is installed on the mobile phone.
  • the accessory communicates over the Bluetooth connection an identifier of the door to the user who, along with an opening request, transmits the door and user identifiers to the background system.
  • the background system verifies whether the user has a right to open the door and, if the right exists, it transmits an unlocking instruction to the mobile phone.
  • the software sends over the Bluetooth connection the unlocking instruction to the accessory which, upon receiving the same, enables a release of the lock.
  • a problem with the aforesaid system is the software application, which must be compatible with an operating system used in the mobile phone as there are several versions of the software available for operating systems used in vari- ous mobile phone models.
  • a further problem is a poor information security in Bluetooth communication between the mobile phone and the accessory as a result of poor compatibility between new and old mobile phone standards.
  • control device which is capable of being retrofitted and independent of the lock brand or lock type, and which is reliable in operation and not dependent on the model of a portable device used for controlling the same.
  • the one objective of the invention is attained with a control device of claim 1 , a control method of claim 8, a computer program of claim 9, and a computer program product of claim 10.
  • the control device for controlling an electric locking device is adapted to be fitted in connection with the locking device and to receive a locking device control coming from a user's portable device.
  • the control device comprises a processor component for generating an electronic key whose key information makes it possible to establish with the portable device a connection to the control device over a communications network and to implement the locking device control, and a data transfer component for transmitting the key information to the portable device over the communications network.
  • the electric locking device refers e.g. to locks used in the external and internal doors of buildings, e.g. boom barriers used for blocking driveways, bikeways or walkways, or locks for gates used for closing off areas, e.g. yard, storage or industrial areas, or boom barrier locking devices whose operation is possible to control with electric signals over a cable connection, e.g. a USB, Ethernet or some other connection, wherein the signal is communicated by way of a cable, a fiber, or some other solid medium, or over a wireless connection, e.g. a Bluetooth, Wi-Fi or a wireless USB connection.
  • the portable device refers e.g. to a portable device which is capable of communicating in a communications network e.g. by means of a radio link.
  • the device can be a mobile communicator, e.g. a mobile phone or smart phone, or a portable computer, e.g. a palmtop, tablet or laptop computer.
  • the communications network refers e.g. to a computer network with several computers linked to each other, e.g. Internet, extranet or intranet; to a mobile phone network which makes use of e.g. GSM, 3G, 4G, GPRS, EDGE, UMTS, CDMA or WCDMA technology; or to a public switched telephone network.
  • a control method according to one embodiment for controlling an electric locking device is implemented with a control device capable of being fitted in connection with the locking device.
  • the method comprises generating with a processor component an electronic key whose key information makes it possible to establish with a user's portable device a connection to the control device over a communications network and to implement a locking device control, transmitting with a data transfer component the key information to the portable device over the communications network, and receiving the locking device control coming from the portable device.
  • a computer program according to one embodiment is intended for controlling an electric locking device when it is run on a computer.
  • the computer program comprises a generation code, which generates with a processor component an electronic key whose key information makes it possible to establish with a user's portable device a connection to the control device over a communications network and to implement a locking device control.
  • the computer program comprises a transmission code which transmits with a data transfer component the key information to the portable device over the communications network, and a reception code by which is received the locking device control coming from the portable device.
  • a computer program product comprises a computer program intended for controlling an electric locking device when it is run on a computer.
  • the computer program comprises a generation code, which generates with a processor component an electronic key whose key information makes it possible to establish with a user's portable device a connec- tion to the control device over a communications network and to implement a locking device control.
  • the computer program comprises a transmission code which transmits with a data transfer component the key information to the portable device over the communications network, and a reception code by which is received the locking device control coming from the port- able device.
  • fig. 1 a shows a control system for a locking device
  • fig. 1 b shows functional components of the locking device
  • Fig. 1 a shows a control system 100 for controlling at least one electric locking device 102, e.g. a lock, included in an object 101 , e.g. the external door of a gym or the gate of a storage area.
  • a control system 100 for controlling at least one electric locking device 102, e.g. a lock, included in an object 101 , e.g. the external door of a gym or the gate of a storage area.
  • the system 100 comprises at least one control device 1 10, which is intended for controlling the locking device 102 and which is possible to mount in con- nection with the object 101 and its locking device 102 and to connect the control device 1 10 to the locking device 102 electrically, e.g. by means of a network cable 109 as shown in the figure or by means of a wireless local loop, e.g. a radio frequency or infrared communication link.
  • a control device 1 10 which is intended for controlling the locking device 102 and which is possible to mount in con- nection with the object 101 and its locking device 102 and to connect the control device 1 10 to the locking device 102 electrically, e.g. by means of a network cable 109 as shown in the figure or by means of a wireless local loop, e.g. a radio frequency or infrared communication link.
  • control devices 1 10 these are intercon- nected over a communications network 106, e.g. an Ethernet, WLAN or mobile phone network, with one serving as a host and the rest being slave devices 1 10.
  • the communication thereof is encrypted and the control proceeds by way of the host device 1 10.
  • the host device 1 10 may collect from the slave devices 1 10 operating data revealing by whom and when each locking device 102 has been operated.
  • control device 1 10 it is possible to connect the control device 1 10 by retrofitting to the locking devices 102 already present in the objects 101 .
  • the system 100 may comprise its management device 140, e.g. a desk or portable computer, which is capable of communicating with at least one control device 1 10 over at least one network 106, e.g. a mobile phone network.
  • management device 140 e.g. a desk or portable computer
  • network 106 e.g. a mobile phone network.
  • the management device 140 which is controlled by its user (operator) 108, can transmit information 141 , 143, 145, 146 to the control device 1 10 and receive information therefrom by way of the at least one network 106.
  • the management device 140 can receive information 142, 144, 146 from a user's 104 portable device 105, e.g. from a smart phone, and transmit information thereto by way of the at least one network 106.
  • the management device 140 may function as a server which maintains e.g. an online service operating on the Internet - a user interface 160 operating online - whereby it is possible for the user's 104 portable device 105 to be in communication with the service for transmitting the information 142, 144, 146 and for receiving information by way of the at least one network 106.
  • a data transfer component 124 of the control device 1 10 can be used for transmitting information 151 , 152, 156 in encrypted form to the portable device 105 and for receiving encrypted information 151 , 154, 156 from the portable device 105 by way of the at least one network 106.
  • the control device 1 10 is further capable of maintaining its user interface 162, 164, which operates e.g. on the Internet and whereby it is capable, by means of the data transfer component 124, of receiving information 141 , 143, 145, 146 from the management device 140 as well as information 151 , 156 and commands 154 from the portable device 105 by way of the at least one network 106.
  • the user 104 may initiate contact over the at least one network 106, e.g. by calling, by sending a text message, or by way of the user interface 160, with the management device 140 in order to obtain a key for opening and/or closing at least one locking device 102 of the object 101 .
  • the user 104 employs one of the aforesaid methods to supply the management device 140 and/or its user 108 with an object-related message 142 that singles out the object 101 by which the user 104 wishes to proceed, with time information 144 expressing when and/or how many times the user 104 wishes to pass across the object 101 , and with user information 146, e.g. the user's
  • the user 104 may inform the management device of the user's 104 employer (company) and information about how to deliver the key.
  • the acquisition of a key requires a purchase of the same, it is by means of the portable device
  • the management device 140 produces key generation information 141 after receiving the necessary data 142, 144, 146 and verifying that the payment transaction has taken place in case the latter is required for obtaining the key.
  • the generation information 141 may comprise at least validity information 145, which has been generated on the basis of time information 144 supplied by the user 104, and user information 146.
  • the generation information 141 may comprise an identifier 143, which singles out at least one locking device 102 and which is generated on the basis of door information 142 supplied by the user, in case the control de- vice 1 10 is, unlike in the figure, capable of controlling several locking devices 102.
  • the validity information 145 may comprise a point in time at which the user 104 has an opportunity of proceeding through the door 101 , and/or the number of its opening times (operation times). It is with the management device 140 that the user 108 transmits the generation information 141 to the control device 1 10 over the user interface 162 maintained thereby.
  • the control device 1 10 can also be supplied with the generation information 141 and other information e.g. from various customer registers formerly at the disposal of the user 104, and/or by way of an online store in case the key has been purchased e.g. from some other online service.
  • the customer registers and online stores can be attached to the system 100 by way of connection in- terfaces, e.g. API.
  • the control device 1 10 Based on the received generation information 141 , the control device 1 10 generates an electronic key by means of which the user 104 is able to pass through the object 101 , e.g. to open and/or to lock a door.
  • the control device 1 10 Based on the generation information 141 , the control device 1 10 additionally generates key information 151 , 152, 156, by means of which it is possible, with the portable device 105, to establish over the at least one network 106 a com- munication link with the control device 1 10 and to implement the control of at least one locking device 102.
  • the key information 151 , 152, 156 may comprise a key identifier 151 needed for the identification of a key, and an individual identifier 152, e.g. a www-link, which is employed by the control device 1 10 in the at least one network 106 and by means of which the portable device 105 is able to establish a communication link with the control device 1 10.
  • the key information 151 , 152 may further comprise a PIN code 156, which enables authentication of the user 104.
  • the system 100 does not require the installation of any software on the portable device 105, because the key is generated in the control device 1 10.
  • the control device 1 10 may include a memory component 122 for storing therein at least one of the following: the generated key, the locking device identifier 143, the validity information 145, the user information 146, the key identifier 151 and the PIN code 156.
  • the memory component may have object-related information stored therein, e.g. contact information for and/or a location of the object on a map, instructions for using the key, advertisements and other services.
  • object-related information e.g. contact information for and/or a location of the object on a map, instructions for using the key, advertisements and other services.
  • the control device 1 10 may further store in the memory component 122 oper- ating information (a log) of the object 101 , revealing who has controlled the locking device 102 - i.e. has passed through the object 101 - and when.
  • the user 108 is able to examine the stored operating information by means of the user interface 162.
  • the system 100 may comprise a camera attachable to the control device 1 10, which enables the users 104 passing through the object 101 to be imaged.
  • the control device 1 10 attaches to each operating incident an image captured with the camera and stores in the memory component 122 the operating information of the object 101 along with images thereof.
  • the control device 1 10 may send the key information 151 , 152 to the portable device 105 in a transmission of the at least one network 106, e.g. as an email or text message.
  • the control device 1 10 may additionally transmit object-related information, e.g. contact information for the object 101 , e.g. an address and/or a phone number, and/or a location on the map, the key validity information 152, operating instructions for the key and advertisements related e.g. to the object 101 or to an online service of the system 100.
  • the control device 1 10 may further transmit a code 156 for the key, which is employed for authentication of the user 104, in a separate e.g. email or text message, such that, when the key information 151 , 1 52 is transmitted by email, the code 156 will be delivered as a text message, or such that, when the key information is transmitted as a text message, the code 156 will be delivered by email.
  • a code 156 for the key which is employed for authentication of the user 104
  • a separate e.g. email or text message such that, when the key information 151 , 1 52 is transmitted by email, the code 156 will be delivered as a text message, or such that, when the key information is transmitted as a text message, the code 156 will be delivered by email.
  • control device 1 10 or the user 108 is able to utilize the user information 146 and make a phone call to the portable device 105, and to supply the user 104 with the code 156 by way of a voice communication or in some manner other than the method of delivering the key information 151 , 152 regardless of the method used for transmitting the key information 151 , 152.
  • the code 156 can be delivered prior to or after a transmission of the key information 151 , 152.
  • the user 104 desires to pass along with his/her portable device 105 through the object 101 , he/she opens an identifier 152 present in the memory of the portable device 105 or received by him/her in the memory of its SIM card as an email or text message, whereby the portable device 105 establishes over the at least one network 106 a communication link with the control device 1 10.
  • the control device 1 10 receives a key identifier 151 as the communication link is established and generates in a browser of the portable device 105 a user interface 164 for at least one locking device 1 02.
  • the system 100 does not require an installable control application specific to the portable device 105, but it is independent of the model, properties and performance of the portable device 105.
  • the control device 1 10 If the user 104 has been supplied with a code 156, the control device 1 10 generates in the user interface 164 a request for the code 156, wherein the user 104 has at least one possibility, e.g. two or three attempts, of entering the code 156 that he/she has received.
  • the control device 1 10 receives, by way of the user interface 164, the code 156 entered by the user 104 and checks, by means of the key identifier 151 received thereby, whether the code 156 entered by the user 104 matches the code 156 stored in the memory component 122 of the control device 1 10.
  • control device 1 10 detects that the entered code 156 is incorrect at the final attempt - i.e. it does not match the code 156 stored in the memory component 122 - the user 104 will be informed by means of the user interface 164 that the user 104 cannot be authenticated and the object 101 is off-limits (the locking device 102 cannot be controlled).
  • the control device 1 10 will check, by means of the key identifier 151 , whether the key issued for the user 104 is valid on the basis of validity information 145 stored in the memory component 122.
  • control device 1 10 If the control device 1 10 detects that they key is not valid because the validity period has expired and/or the number of allowed opening times has been used up, the user 104 will be informed, by means of the user interface 164, that the key is outdated and the object 101 is off-limits.
  • the user 104 will be presented on the user interface 164 with at least one control button for a locking device 102 of the object 101 , the selection of which enables the user 104 to control operation of the locking device 102.
  • the number of control buttons can be e.g. one button intended for open- ing the object 101 , or two buttons in which case one is an opening button and the other is a button intended for locking the object 101 .
  • the user interface 164 can be used for presenting either at least one control button common to all locking devices 102 or at least one control button specific for each locking device 102.
  • the user interface 164 may present the user 104 with a status report for the locking device 102 for revealing whether the latter is unlocked or locked, thereby enabling the detection of an object 101 that has been left open inadvertently.
  • the system 100 may include a confirmation call feature in order to authenticate the user 104, whereby, after receiving the instruction 154, the control device 1 10 is able to utilize user information 146, which contains a phone number for the user 104, and to make a confirmation call to the portable device 105 by way of the at least one network 106.
  • control device 1 10 If the control device 1 10 detects no answer to the confirmation call, the user 104 will be informed, by means of the user interface 164, that the user 104 cannot be authenticated and the object 104 if off-limits. If the user 104 answers the confirmation call, or the system 100 does not use a verification call feature, the control device 1 10 shall identify, by means of a locking device identifier 143 stored in the memory component 122, the locking device 102 to be unlocked, and shall generate, by means of a control element 128 for the locking device 102, included in the control device 1 10, a control signal which, as per the received instruction 154, releases the locking device 102 so as to enable the user 104 to proceed through the door 101 .
  • the control element 128 shall generate a control signal which secures the locking device 102 so as to disallow a passage through the door 101 . After a given time delay following its unlocking, the locking device 102 can be secured or left open by the control device 1 10.
  • the object 101 can be accessed from the user interface 164 of the control device 1 10.
  • the user interface 164 can be implemented in such a way that the user 104 logs in it by entering e.g. some item of his/her user information 146 and a password that he/she has created on the user interface 160 of the management device 140. After the logging, the user interface 164 will be used for pre- senting the functions that this particular user 104 has an access right to, e.g. a release button, after the selection of which the camera can take a picture and the operational occurrence is entered into operational data, and/or a locking button, after the selection of which the locking device 102 does not receive control instructions 154 before the locking is released and the object is only accessible with a key.
  • a release button after the selection of which the camera can take a picture and the operational occurrence is entered into operational data
  • a locking button after the selection of which the locking device 102 does not receive control instructions 154 before the locking is released and the object is only accessible with a key.
  • the object 101 can be accessed by calling with the control device 1 10.
  • the user 104 may dial the phone number of the object 101 , whereby the con- trol device 1 10 checks the memory component 122 whether the user's 104 phone number can be found in the user information 146.
  • control device 1 10 If the control device 1 10 detects that the phone number belongs to a user 104 of the system 100, it will enable the user 104 to access the object 101 by releasing the locking device 102.
  • the camera can take a picture of the user 104 and the control device 1 10 enters the operational occurrence into operational data.
  • the verification may additionally be followed by the control device 1 10 calling back to the user's 104 phone number so as to eliminate a possibility of the phone number being what is referred to as "spoofed”. If the control device 1 10 detects that the phone number does not belong to a user 104 of the system 100, it shall not release the locking device 102 but the camera can take a picture of the user 104 and the control device 1 10 enters the attempted operation into operational data.
  • the object 101 can be accessed with a normal mechanical key.
  • the control device 1 10 can be coupled to detectors of the locking device 102, e.g. to mechanical or optical detectors, by means of which is detected the use of a key in the lock cylinder of a locking device 102 provided that the locking device 102 is fitted with detectors.
  • Fig. 1 b shows functional components 120, 122, 124, 128 of the control device 1 10, which are shielded with an enclosure 1 12 that can be made e.g. of plastics or plastics reinforced with metal parts.
  • the control device 1 10 may comprise a processor component 120, which comprises at least one processor and which enables the execution of instructions defined e.g. by a user 108 or some application program and the processing of data.
  • control device 1 10 may further comprise a memory component 122, which comprises at least one memory and is used for storing and preserv- ing data, e.g. instructions, application programs, keys, locking device identifiers 143, validity information 145, user information 146, key identifiers 151 and PIN codes 156.
  • a memory component 122 which comprises at least one memory and is used for storing and preserv- ing data, e.g. instructions, application programs, keys, locking device identifiers 143, validity information 145, user information 146, key identifiers 151 and PIN codes 156.
  • the control device 1 10 may further comprise a data transfer component 124, which comprises at least one of the following: a communications card, e.g. a 3G/GSM card, a WLAN adapter and a GPS adapter.
  • a data transfer component 124 comprises at least one of the following: a communications card, e.g. a 3G/GSM card, a WLAN adapter and a GPS adapter.
  • control device 1 10 may comprise a server component 126, e.g. a server card, by means of which the control device 1 10 maintains its user interface 162, 164 whereby the users 104, 108 are able to enter information 143, 145, 146, 156 and commands 154 into the control device 1 10 and/or to receive information from the control device 1 10.
  • server component 126 e.g. a server card
  • control device 1 10 may comprise a control element 128 for a locking device 102, e.g. an adaptable I/O card, which enables the generation and transmission of a control signal for the locking device 102 e.g. by means of a cable 109.
  • a control element 128 for a locking device 102 e.g. an adaptable I/O card, which enables the generation and transmission of a control signal for the locking device 102 e.g. by means of a cable 109.
  • the I/O card makes it possible to use the control device 1 10 as a component capable of being retrofitted to various locking devices 102 already present in the objects 101 and regardless of the model thereof, because the I/O card can be adapted according to the locking device 102 and programmed to receive and/or transmit various control signals depending on a model of the locking device 102.
  • the dynamically adaptable control element 128, it can be programmed e.g. from the management device 140 or, if necessary, replaced "on the fly" in case it requires new features or must be adapted to a locking device 102 present in the object 101 .
  • the control device 1 10 may further comprise a control element 127, e.g. an I/O card, and/or a control card for a communication card used for controlling the control element 128 and the data transfer component 124.
  • the control device 1 10 may further comprise a power source element, e.g. a connection functioning as a power source for at least one control device 1 10 or for an external power source.
  • a power source element e.g. a connection functioning as a power source for at least one control device 1 10 or for an external power source.
  • control device 1 10 may comprise a physical user interface element, e.g. a USB connection, by way of which the user 108 is able, whenever necessary, to deliver information to the control device 1 10 and/or to receive information therefrom e.g. over a cable connection.
  • the control device 1 10 can operate independently without a control coming from the management device 140 for as long as the information 141 , 143, 145, 146 required by the control device 1 10 can be supplied by means of a physical user interface element.
  • the memory component 122 may comprise at least an application 134 controlling operation of the data transfer component 124, an application 136 control- ling operation of the server component 126, an application 137 controlling operation of the control element 127, an application 138 controlling operation of the control element 128, an application controlling operation of the power source element, and an application (computer program) 139 intended for controlling the locking device 102.
  • the memory component 122 may further comprise an application controlling operation of the physical user interface element.
  • the control device 100 may comprise at least e.g. a communication card 124, a server card 126, a control card 127, and an I/O card 128.
  • at least one of the cards 124, 126, 127, 128 may comprise at least one processor 120 and/or at least one memory 122, e.g. at least all the cards 124, 126, 127, 128 may comprise at least one processor 120 and at least one memory 122 in such a manner that each card 124, 126, 127, 128 has its appli- cation 134, 136, 137, 138 stored in its memory 122 and e.g. the server card 126 has additionally the application 139 stored in its memory 122.
  • the application 139 controls operation of the locking device 102 when it is executed by the control device 1 10. It comprises a generation code, which uses the processor component 120 for generating a key whose key information 151 , 152 enables, with the user's 104 portable device 105, over at least one network 106, the establishment of a communication link to the control device 1 10 and the implementation of the control 154 for the locking device 102.
  • the application 139 comprises a transmission code, which uses the data transfer component 124 for transmitting the key information 151 , 152 to the portable device 105 over the at least one network 106, and a reception code used for receiving the control 154 of the locking device 102 coming from the portable device 105.
  • the application 139 can be in storage not only in the memory component 122 of the control device 1 10 but also in a computer program product, which is a computer-readable data carrier, e.g. a CD disc or a USB flash drive, and which comprises a computer program code intended to be run on a computer.
  • a computer program product which is a computer-readable data carrier, e.g. a CD disc or a USB flash drive, and which comprises a computer program code intended to be run on a computer.
  • the memory component 122 and the application 139 jointly with the processor component 120, enable the control device 1 10 at least to generate with the processor component 120 a key whose key information 151 , 152 enables, with the user's 104 portable device 105, over at least one network 106, the establishment of a communication link to the control device 1 10 and the implementation of the control 154 for the locking device 102.
  • the control device 1 10 is enabled to transmit with the data transfer component 124 the key information 151 , 152 to the portable device 105 over the at least one network 106 and to receive the control 154 of the locking device 102 coming from the portable device 105.
  • the memory component 122 and the application 139 jointly with the processor component 120, enable the control device 1 10 to carry out other functions of the control device 1 10 depicted in connection with fig. 1 a.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Automation & Control Theory (AREA)
  • Lock And Its Accessories (AREA)

Abstract

According to one embodiment, the application relates to a control device (110) for controlling an electric locking device (102). The control device is adapted to be fitted in connection with the locking device and to receive a locking device control (154) coming from a user's (104) portable device (105). The control device comprises a processor component for generating an electronic key whose key information (151, 152) makes it possible to establish with the portable device a connection to the control device over a communications network (106) and to implement the locking device control, and a data transfer component for transmitting the key information to the portable device over the communications network (106).

Description

CONTROL DEVICE FOR CONTROLLING AN ELECTRIC LOCKING DEVICE
Technical field
The application relates generally to control equipment for controlling an electric locking device. Background
The objective of using mobile phones instead of keys for the unlocking of locks at the doors of buildings and apartments is to mitigate the necessity of reserializing the locks as a result of lost keys and user turnover.
In one key management system, to the door in connection with the lock is fitted an accessory thereof, which includes a Bluetooth module. From the management server functioning as a background system, the mobile phone is uploaded by way of a mobile phone network with a software application and that is installed on the mobile phone.
When the user carrying a mobile phone approaches a door to be opened, the accessory communicates over the Bluetooth connection an identifier of the door to the user who, along with an opening request, transmits the door and user identifiers to the background system. The background system verifies whether the user has a right to open the door and, if the right exists, it transmits an unlocking instruction to the mobile phone. The software sends over the Bluetooth connection the unlocking instruction to the accessory which, upon receiving the same, enables a release of the lock.
A problem with the aforesaid system is the software application, which must be compatible with an operating system used in the mobile phone as there are several versions of the software available for operating systems used in vari- ous mobile phone models.
A further problem is a poor information security in Bluetooth communication between the mobile phone and the accessory as a result of poor compatibility between new and old mobile phone standards.
Summary It is one objective of the invention to eliminate some of the prior art problems and to provide a control device, which is capable of being retrofitted and independent of the lock brand or lock type, and which is reliable in operation and not dependent on the model of a portable device used for controlling the same. The one objective of the invention is attained with a control device of claim 1 , a control method of claim 8, a computer program of claim 9, and a computer program product of claim 10.
According to one embodiment, the control device for controlling an electric locking device is adapted to be fitted in connection with the locking device and to receive a locking device control coming from a user's portable device. The control device comprises a processor component for generating an electronic key whose key information makes it possible to establish with the portable device a connection to the control device over a communications network and to implement the locking device control, and a data transfer component for transmitting the key information to the portable device over the communications network.
The electric locking device refers e.g. to locks used in the external and internal doors of buildings, e.g. boom barriers used for blocking driveways, bikeways or walkways, or locks for gates used for closing off areas, e.g. yard, storage or industrial areas, or boom barrier locking devices whose operation is possible to control with electric signals over a cable connection, e.g. a USB, Ethernet or some other connection, wherein the signal is communicated by way of a cable, a fiber, or some other solid medium, or over a wireless connection, e.g. a Bluetooth, Wi-Fi or a wireless USB connection. The portable device refers e.g. to a portable device which is capable of communicating in a communications network e.g. by means of a radio link. The device can be a mobile communicator, e.g. a mobile phone or smart phone, or a portable computer, e.g. a palmtop, tablet or laptop computer.
The communications network refers e.g. to a computer network with several computers linked to each other, e.g. Internet, extranet or intranet; to a mobile phone network which makes use of e.g. GSM, 3G, 4G, GPRS, EDGE, UMTS, CDMA or WCDMA technology; or to a public switched telephone network. A control method according to one embodiment for controlling an electric locking device is implemented with a control device capable of being fitted in connection with the locking device. The method comprises generating with a processor component an electronic key whose key information makes it possible to establish with a user's portable device a connection to the control device over a communications network and to implement a locking device control, transmitting with a data transfer component the key information to the portable device over the communications network, and receiving the locking device control coming from the portable device. A computer program according to one embodiment is intended for controlling an electric locking device when it is run on a computer. The computer program comprises a generation code, which generates with a processor component an electronic key whose key information makes it possible to establish with a user's portable device a connection to the control device over a communications network and to implement a locking device control. In addition, the computer program comprises a transmission code which transmits with a data transfer component the key information to the portable device over the communications network, and a reception code by which is received the locking device control coming from the portable device. A computer program product according to one embodiment comprises a computer program intended for controlling an electric locking device when it is run on a computer. The computer program comprises a generation code, which generates with a processor component an electronic key whose key information makes it possible to establish with a user's portable device a connec- tion to the control device over a communications network and to implement a locking device control. In addition, the computer program comprises a transmission code which transmits with a data transfer component the key information to the portable device over the communications network, and a reception code by which is received the locking device control coming from the port- able device.
Other embodiments are presented in the dependent claims. Brief description of the figures
Embodiments of the invention will be described more thoroughly in the detailed description of the figures with reference to the accompanying figures, in which fig. 1 a shows a control system for a locking device, and fig. 1 b shows functional components of the locking device.
Detailed description of the figures Fig. 1 a shows a control system 100 for controlling at least one electric locking device 102, e.g. a lock, included in an object 101 , e.g. the external door of a gym or the gate of a storage area.
The system 100 comprises at least one control device 1 10, which is intended for controlling the locking device 102 and which is possible to mount in con- nection with the object 101 and its locking device 102 and to connect the control device 1 10 to the locking device 102 electrically, e.g. by means of a network cable 109 as shown in the figure or by means of a wireless local loop, e.g. a radio frequency or infrared communication link.
Should the system comprise several control devices 1 10, these are intercon- nected over a communications network 106, e.g. an Ethernet, WLAN or mobile phone network, with one serving as a host and the rest being slave devices 1 10. The communication thereof is encrypted and the control proceeds by way of the host device 1 10. The host device 1 10 may collect from the slave devices 1 10 operating data revealing by whom and when each locking device 102 has been operated.
It is possible to connect the control device 1 10 by retrofitting to the locking devices 102 already present in the objects 101 .
The system 100 may comprise its management device 140, e.g. a desk or portable computer, which is capable of communicating with at least one control device 1 10 over at least one network 106, e.g. a mobile phone network.
The management device 140, which is controlled by its user (operator) 108, can transmit information 141 , 143, 145, 146 to the control device 1 10 and receive information therefrom by way of the at least one network 106.
In addition, the management device 140 can receive information 142, 144, 146 from a user's 104 portable device 105, e.g. from a smart phone, and transmit information thereto by way of the at least one network 106. Moreover, the management device 140 may function as a server which maintains e.g. an online service operating on the Internet - a user interface 160 operating online - whereby it is possible for the user's 104 portable device 105 to be in communication with the service for transmitting the information 142, 144, 146 and for receiving information by way of the at least one network 106.
A data transfer component 124 of the control device 1 10 can be used for transmitting information 151 , 152, 156 in encrypted form to the portable device 105 and for receiving encrypted information 151 , 154, 156 from the portable device 105 by way of the at least one network 106. With its server component 126, the control device 1 10 is further capable of maintaining its user interface 162, 164, which operates e.g. on the Internet and whereby it is capable, by means of the data transfer component 124, of receiving information 141 , 143, 145, 146 from the management device 140 as well as information 151 , 156 and commands 154 from the portable device 105 by way of the at least one network 106.
With his/her portable device 105, the user 104 may initiate contact over the at least one network 106, e.g. by calling, by sending a text message, or by way of the user interface 160, with the management device 140 in order to obtain a key for opening and/or closing at least one locking device 102 of the object 101 .
The user 104 employs one of the aforesaid methods to supply the management device 140 and/or its user 108 with an object-related message 142 that singles out the object 101 by which the user 104 wishes to proceed, with time information 144 expressing when and/or how many times the user 104 wishes to pass across the object 101 , and with user information 146, e.g. the user's
104 name, personal identification, customer number, telephone number (for the portable device 105), and/or email address, which authenticates the user 104.
In addition, the user 104 may inform the management device of the user's 104 employer (company) and information about how to deliver the key.
If, in the service maintained by the management device 140, the acquisition of a key requires a purchase of the same, it is by means of the portable device
105 that the user buys the key from the service. The management device 140 produces key generation information 141 after receiving the necessary data 142, 144, 146 and verifying that the payment transaction has taken place in case the latter is required for obtaining the key.
The generation information 141 may comprise at least validity information 145, which has been generated on the basis of time information 144 supplied by the user 104, and user information 146.
In addition, the generation information 141 may comprise an identifier 143, which singles out at least one locking device 102 and which is generated on the basis of door information 142 supplied by the user, in case the control de- vice 1 10 is, unlike in the figure, capable of controlling several locking devices 102.
The validity information 145 may comprise a point in time at which the user 104 has an opportunity of proceeding through the door 101 , and/or the number of its opening times (operation times). It is with the management device 140 that the user 108 transmits the generation information 141 to the control device 1 10 over the user interface 162 maintained thereby.
In addition, it is from the management device 140 that the user 108 may transmit the aforesaid other information supplied by the user 104. The control device 1 10 can also be supplied with the generation information 141 and other information e.g. from various customer registers formerly at the disposal of the user 104, and/or by way of an online store in case the key has been purchased e.g. from some other online service. The customer registers and online stores can be attached to the system 100 by way of connection in- terfaces, e.g. API.
Based on the received generation information 141 , the control device 1 10 generates an electronic key by means of which the user 104 is able to pass through the object 101 , e.g. to open and/or to lock a door.
Based on the generation information 141 , the control device 1 10 additionally generates key information 151 , 152, 156, by means of which it is possible, with the portable device 105, to establish over the at least one network 106 a com- munication link with the control device 1 10 and to implement the control of at least one locking device 102.
The key information 151 , 152, 156 may comprise a key identifier 151 needed for the identification of a key, and an individual identifier 152, e.g. a www-link, which is employed by the control device 1 10 in the at least one network 106 and by means of which the portable device 105 is able to establish a communication link with the control device 1 10.
The key information 151 , 152 may further comprise a PIN code 156, which enables authentication of the user 104. The system 100 does not require the installation of any software on the portable device 105, because the key is generated in the control device 1 10.
The control device 1 10 may include a memory component 122 for storing therein at least one of the following: the generated key, the locking device identifier 143, the validity information 145, the user information 146, the key identifier 151 and the PIN code 156.
In addition, the memory component may have object-related information stored therein, e.g. contact information for and/or a location of the object on a map, instructions for using the key, advertisements and other services.
The control device 1 10 may further store in the memory component 122 oper- ating information (a log) of the object 101 , revealing who has controlled the locking device 102 - i.e. has passed through the object 101 - and when. The user 108 is able to examine the stored operating information by means of the user interface 162.
The system 100 may comprise a camera attachable to the control device 1 10, which enables the users 104 passing through the object 101 to be imaged. The control device 1 10 attaches to each operating incident an image captured with the camera and stores in the memory component 122 the operating information of the object 101 along with images thereof.
The control device 1 10 may send the key information 151 , 152 to the portable device 105 in a transmission of the at least one network 106, e.g. as an email or text message. The control device 1 10 may additionally transmit object-related information, e.g. contact information for the object 101 , e.g. an address and/or a phone number, and/or a location on the map, the key validity information 152, operating instructions for the key and advertisements related e.g. to the object 101 or to an online service of the system 100.
The control device 1 10 may further transmit a code 156 for the key, which is employed for authentication of the user 104, in a separate e.g. email or text message, such that, when the key information 151 , 1 52 is transmitted by email, the code 156 will be delivered as a text message, or such that, when the key information is transmitted as a text message, the code 156 will be delivered by email.
Alternatively, the control device 1 10 or the user 108 is able to utilize the user information 146 and make a phone call to the portable device 105, and to supply the user 104 with the code 156 by way of a voice communication or in some manner other than the method of delivering the key information 151 , 152 regardless of the method used for transmitting the key information 151 , 152.
Irrespective of the method of delivery, the code 156 can be delivered prior to or after a transmission of the key information 151 , 152.
When the user 104 desires to pass along with his/her portable device 105 through the object 101 , he/she opens an identifier 152 present in the memory of the portable device 105 or received by him/her in the memory of its SIM card as an email or text message, whereby the portable device 105 establishes over the at least one network 106 a communication link with the control device 1 10. The control device 1 10 receives a key identifier 151 as the communication link is established and generates in a browser of the portable device 105 a user interface 164 for at least one locking device 1 02. By virtue of this, the system 100 does not require an installable control application specific to the portable device 105, but it is independent of the model, properties and performance of the portable device 105.
If the user 104 has been supplied with a code 156, the control device 1 10 generates in the user interface 164 a request for the code 156, wherein the user 104 has at least one possibility, e.g. two or three attempts, of entering the code 156 that he/she has received.
The control device 1 10 receives, by way of the user interface 164, the code 156 entered by the user 104 and checks, by means of the key identifier 151 received thereby, whether the code 156 entered by the user 104 matches the code 156 stored in the memory component 122 of the control device 1 10.
If the control device 1 10 detects that the entered code 156 is incorrect at the final attempt - i.e. it does not match the code 156 stored in the memory component 122 - the user 104 will be informed by means of the user interface 164 that the user 104 cannot be authenticated and the object 101 is off-limits (the locking device 102 cannot be controlled).
If the entered code 156 is correct - i.e. it matches the code 156 stored in the memory component 122 - or if the code 156 is not requested, the control device 1 10 will check, by means of the key identifier 151 , whether the key issued for the user 104 is valid on the basis of validity information 145 stored in the memory component 122.
If the control device 1 10 detects that they key is not valid because the validity period has expired and/or the number of allowed opening times has been used up, the user 104 will be informed, by means of the user interface 164, that the key is outdated and the object 101 is off-limits.
If the key is valid, the user 104 will be presented on the user interface 164 with at least one control button for a locking device 102 of the object 101 , the selection of which enables the user 104 to control operation of the locking device 102. The number of control buttons can be e.g. one button intended for open- ing the object 101 , or two buttons in which case one is an opening button and the other is a button intended for locking the object 101 .
If a single key provides a passage through several objects by controlling several locking devices 102, the user interface 164 can be used for presenting either at least one control button common to all locking devices 102 or at least one control button specific for each locking device 102.
In addition, the user interface 164 may present the user 104 with a status report for the locking device 102 for revealing whether the latter is unlocked or locked, thereby enabling the detection of an object 101 that has been left open inadvertently.
When the user 104 wishes to proceed by way of a locked object 101 , he/she selects an opening button presented on the user interface 164, thereby trans- mitting to the control device 1 10, over the at least one network 106, a control instruction 154 for opening the door 101 .
The system 100 may include a confirmation call feature in order to authenticate the user 104, whereby, after receiving the instruction 154, the control device 1 10 is able to utilize user information 146, which contains a phone number for the user 104, and to make a confirmation call to the portable device 105 by way of the at least one network 106.
If the control device 1 10 detects no answer to the confirmation call, the user 104 will be informed, by means of the user interface 164, that the user 104 cannot be authenticated and the object 104 if off-limits. If the user 104 answers the confirmation call, or the system 100 does not use a verification call feature, the control device 1 10 shall identify, by means of a locking device identifier 143 stored in the memory component 122, the locking device 102 to be unlocked, and shall generate, by means of a control element 128 for the locking device 102, included in the control device 1 10, a control signal which, as per the received instruction 154, releases the locking device 102 so as to enable the user 104 to proceed through the door 101 .
When the instruction 154 is a locking instruction, the control element 128 shall generate a control signal which secures the locking device 102 so as to disallow a passage through the door 101 . After a given time delay following its unlocking, the locking device 102 can be secured or left open by the control device 1 10.
Alternatively, the object 101 can be accessed from the user interface 164 of the control device 1 10.
The user interface 164 can be implemented in such a way that the user 104 logs in it by entering e.g. some item of his/her user information 146 and a password that he/she has created on the user interface 160 of the management device 140. After the logging, the user interface 164 will be used for pre- senting the functions that this particular user 104 has an access right to, e.g. a release button, after the selection of which the camera can take a picture and the operational occurrence is entered into operational data, and/or a locking button, after the selection of which the locking device 102 does not receive control instructions 154 before the locking is released and the object is only accessible with a key.
Alternatively, the object 101 can be accessed by calling with the control device 1 10.
The user 104 may dial the phone number of the object 101 , whereby the con- trol device 1 10 checks the memory component 122 whether the user's 104 phone number can be found in the user information 146.
If the control device 1 10 detects that the phone number belongs to a user 104 of the system 100, it will enable the user 104 to access the object 101 by releasing the locking device 102. The camera can take a picture of the user 104 and the control device 1 10 enters the operational occurrence into operational data.
The verification may additionally be followed by the control device 1 10 calling back to the user's 104 phone number so as to eliminate a possibility of the phone number being what is referred to as "spoofed". If the control device 1 10 detects that the phone number does not belong to a user 104 of the system 100, it shall not release the locking device 102 but the camera can take a picture of the user 104 and the control device 1 10 enters the attempted operation into operational data.
Optionally, the object 101 can be accessed with a normal mechanical key. The control device 1 10 can be coupled to detectors of the locking device 102, e.g. to mechanical or optical detectors, by means of which is detected the use of a key in the lock cylinder of a locking device 102 provided that the locking device 102 is fitted with detectors.
When the control device 1 10 detects a key turning in the lock cylinder, the camera can be take a picture of the user 104 and the control device enters the operational occurrence/attempt into operational data. Fig. 1 b shows functional components 120, 122, 124, 128 of the control device 1 10, which are shielded with an enclosure 1 12 that can be made e.g. of plastics or plastics reinforced with metal parts.
The control device 1 10 may comprise a processor component 120, which comprises at least one processor and which enables the execution of instructions defined e.g. by a user 108 or some application program and the processing of data.
In addition, the control device 1 10 may further comprise a memory component 122, which comprises at least one memory and is used for storing and preserv- ing data, e.g. instructions, application programs, keys, locking device identifiers 143, validity information 145, user information 146, key identifiers 151 and PIN codes 156.
The control device 1 10 may further comprise a data transfer component 124, which comprises at least one of the following: a communications card, e.g. a 3G/GSM card, a WLAN adapter and a GPS adapter. By means of the data transfer component 124, the control device 1 10 transmits and receives information 151 , 152, 156 over at least one wired and/or wireless communications link.
In addition, the control device 1 10 may comprise a server component 126, e.g. a server card, by means of which the control device 1 10 maintains its user interface 162, 164 whereby the users 104, 108 are able to enter information 143, 145, 146, 156 and commands 154 into the control device 1 10 and/or to receive information from the control device 1 10.
In addition, the control device 1 10 may comprise a control element 128 for a locking device 102, e.g. an adaptable I/O card, which enables the generation and transmission of a control signal for the locking device 102 e.g. by means of a cable 109.
The I/O card makes it possible to use the control device 1 10 as a component capable of being retrofitted to various locking devices 102 already present in the objects 101 and regardless of the model thereof, because the I/O card can be adapted according to the locking device 102 and programmed to receive and/or transmit various control signals depending on a model of the locking device 102. By virtue of the dynamically adaptable control element 128, it can be programmed e.g. from the management device 140 or, if necessary, replaced "on the fly" in case it requires new features or must be adapted to a locking device 102 present in the object 101 . The control device 1 10 may further comprise a control element 127, e.g. an I/O card, and/or a control card for a communication card used for controlling the control element 128 and the data transfer component 124.
The control device 1 10 may further comprise a power source element, e.g. a connection functioning as a power source for at least one control device 1 10 or for an external power source.
In addition, the control device 1 10 may comprise a physical user interface element, e.g. a USB connection, by way of which the user 108 is able, whenever necessary, to deliver information to the control device 1 10 and/or to receive information therefrom e.g. over a cable connection. The control device 1 10 can operate independently without a control coming from the management device 140 for as long as the information 141 , 143, 145, 146 required by the control device 1 10 can be supplied by means of a physical user interface element.
The memory component 122 may comprise at least an application 134 controlling operation of the data transfer component 124, an application 136 control- ling operation of the server component 126, an application 137 controlling operation of the control element 127, an application 138 controlling operation of the control element 128, an application controlling operation of the power source element, and an application (computer program) 139 intended for controlling the locking device 102. The memory component 122 may further comprise an application controlling operation of the physical user interface element.
In physical sense, the control device 100 may comprise at least e.g. a communication card 124, a server card 126, a control card 127, and an I/O card 128. In addition, at least one of the cards 124, 126, 127, 128 may comprise at least one processor 120 and/or at least one memory 122, e.g. at least all the cards 124, 126, 127, 128 may comprise at least one processor 120 and at least one memory 122 in such a manner that each card 124, 126, 127, 128 has its appli- cation 134, 136, 137, 138 stored in its memory 122 and e.g. the server card 126 has additionally the application 139 stored in its memory 122.
The application 139 controls operation of the locking device 102 when it is executed by the control device 1 10. It comprises a generation code, which uses the processor component 120 for generating a key whose key information 151 , 152 enables, with the user's 104 portable device 105, over at least one network 106, the establishment of a communication link to the control device 1 10 and the implementation of the control 154 for the locking device 102. In addition, the application 139 comprises a transmission code, which uses the data transfer component 124 for transmitting the key information 151 , 152 to the portable device 105 over the at least one network 106, and a reception code used for receiving the control 154 of the locking device 102 coming from the portable device 105.
The application 139 can be in storage not only in the memory component 122 of the control device 1 10 but also in a computer program product, which is a computer-readable data carrier, e.g. a CD disc or a USB flash drive, and which comprises a computer program code intended to be run on a computer.
The memory component 122 and the application 139, jointly with the processor component 120, enable the control device 1 10 at least to generate with the processor component 120 a key whose key information 151 , 152 enables, with the user's 104 portable device 105, over at least one network 106, the establishment of a communication link to the control device 1 10 and the implementation of the control 154 for the locking device 102. In addition, the control device 1 10 is enabled to transmit with the data transfer component 124 the key information 151 , 152 to the portable device 105 over the at least one network 106 and to receive the control 154 of the locking device 102 coming from the portable device 105.
In addition, the memory component 122 and the application 139, jointly with the processor component 120, enable the control device 1 10 to carry out other functions of the control device 1 10 depicted in connection with fig. 1 a.
Described above are just a few embodiments of the invention. The principle according to the invention can naturally be varied within the scope of protection defined by the claims, regarding for example implementation details as well as fields of use.

Claims

Claims
1 . A control device (1 10) for controlling an electric locking device (102), said control device being adapted to
be fitted as a standalone unit in connection with the locking device and receive a locking device control (154) coming from a user's (104) portable device (105),
characterized in that the control device comprises
a processor component (120) for generating an electronic key whose key information (151 , 152) makes it possible to establish with the portable device a connection to the control device over a communications network (106) and to implement the locking device control, and
a data transfer component (124) for transmitting the key information to the portable device over the communications network (106).
2. A control device according to claim 1 , which comprises a server compo- nent (126) for providing a user interface (162) for the control device, said user interface enabling the control device to receive from a system management device (140) information (141 , 145, 146) necessary for the generation of a key and/or from the portable device the locking device control over the communications network (106).
3. A control device according to either of the preceding claims, wherein the generating information comprises validity information (145) and user information (146) for the key.
4. A control device according to any of the preceding claims, which comprises a memory component (122) for storing the generated key in the control device, in said memory component being stored the validity and user information (145, 146) for the key, and an identifier (151 ) needed for authentication of the key.
5. A control device according to any of the preceding claims, wherein the key information comprises a key identifier for authenticating the key and an in- dividual identifier used by the control device in the communications network (106) for establishing a connection to the control device.
6. A control device according to any of the preceding claims, wherein the server component receives the key identifier as the connection is established and the control device verifies therewith the key's validity and the user by means of the information (145, 146) stored in the memory component.
7. A control device according to any of the preceding claims, wherein, upon detecting that the key is valid, the control device enables the locking device to be controlled from the portable device by means of a user interface (164).
8. A control method for controlling an electric locking device (102) with a control device (1 10) according to any of claims 1 -7 capable of being fitted as a standalone unit in connection with the locking device, said method comprising generating with a processor component (120) an electronic key whose key information (151 , 152) makes it possible to establish with a user's (104) portable device (105) a connection to the control device over a communications network (106) and to implement a locking device control (154),
transmitting with a data transfer component (124) the key information to the portable device over the communications network (106), and
receiving the locking device control coming from the portable device.
9. A computer program (139) for controlling an electric locking device (102), which computer program is adapted to implement the control method of claim 8 when it is run on a computer, and which comprises
a generation code, which generates with a processor component (120) an electronic key whose key information (151 , 152) makes it possible to establish with a user's (104) portable device (105) a connection to the control device over a communications network and to implement a locking device control (154),
a transmission code which transmits with a data transfer component (124) the key information to the portable device over the communications network (106), and
a reception code by which is received the locking device control coming from the portable device.
10. A computer program product, comprising a computer program (139) for controlling an electric locking device (102), which computer program is adapted to implement the control method of claim 8 when it is run on a computer, and which comprises
a generation code, which generates with a processor component (120) an electronic key whose key information (151 , 152) makes it possible to estab- Iish with a user's (104) portable device (105) a connection to the control device over a communications network (106) and to implement a locking device control (154),
a transmission code which transmits with a data transfer component (124) the key information to the portable device over the communications network (106), and
a reception code by which is received the locking device control coming from the portable device.
PCT/FI2016/050197 2015-03-31 2016-03-30 Control device for controlling an electric locking device WO2016156665A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20155226 2013-03-08
FI20155226A FI20155226A (en) 2015-03-31 2015-03-31 Control device for checking an electric locking device

Publications (1)

Publication Number Publication Date
WO2016156665A1 true WO2016156665A1 (en) 2016-10-06

Family

ID=57006571

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2016/050197 WO2016156665A1 (en) 2015-03-31 2016-03-30 Control device for controlling an electric locking device

Country Status (2)

Country Link
FI (1) FI20155226A (en)
WO (1) WO2016156665A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6148404A (en) * 1997-05-28 2000-11-14 Nihon Unisys, Ltd. Authentication system using authentication information valid one-time
EP1607922A1 (en) * 2003-03-25 2005-12-21 Toyoki Sasakura Home security system
US8120460B1 (en) * 2009-01-05 2012-02-21 Sprint Communications Company L.P. Electronic key provisioning
US20140265359A1 (en) * 2013-03-15 2014-09-18 August Home, Inc. Intelligent Door Lock System
US20140360232A1 (en) * 2013-06-07 2014-12-11 Velo Labs, Inc. Wireless ultra-low power portable lock
WO2015006316A1 (en) * 2013-07-08 2015-01-15 Convida Wireless, Llc Connecting imsi-less devices to the epc
US20150027178A1 (en) * 2013-07-26 2015-01-29 Joseph Frank Scalisi Smart lock systems and methods

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6148404A (en) * 1997-05-28 2000-11-14 Nihon Unisys, Ltd. Authentication system using authentication information valid one-time
EP1607922A1 (en) * 2003-03-25 2005-12-21 Toyoki Sasakura Home security system
US8120460B1 (en) * 2009-01-05 2012-02-21 Sprint Communications Company L.P. Electronic key provisioning
US20140265359A1 (en) * 2013-03-15 2014-09-18 August Home, Inc. Intelligent Door Lock System
US20140360232A1 (en) * 2013-06-07 2014-12-11 Velo Labs, Inc. Wireless ultra-low power portable lock
WO2015006316A1 (en) * 2013-07-08 2015-01-15 Convida Wireless, Llc Connecting imsi-less devices to the epc
US20150027178A1 (en) * 2013-07-26 2015-01-29 Joseph Frank Scalisi Smart lock systems and methods

Also Published As

Publication number Publication date
FI20155226A (en) 2016-10-01

Similar Documents

Publication Publication Date Title
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US7810146B2 (en) Security device, terminal device, gate device, and device
CN102084369B (en) For monitoring the system used the unauthorized of equipment
CN104517338B (en) Distance entrance and its implementation based on wireless network
US20120002808A1 (en) Interleaving and deinterleaving method for preventing periodic position interference
CN102084370A (en) System for mitigating the unauthorized use of a device
EP2378451A1 (en) User authentication in a tag-based service
CN103295341A (en) POS (point-of-sales) safety certification device, POS safety certification system and POS device safety certification method
US9922473B1 (en) Systems and methods for location-based automated authentication
CN102084372A (en) System for monitoring the unauthorized use of a device
US11709923B2 (en) Systems and methods for location-based automated authentication
CN102084371A (en) System for mitigating the unauthorized use of a device
CN104380298A (en) Systems and methods for dynamically assessing and mitigating risk of an insured entity
CN109859350B (en) Remote authorized fingerprint self-service entry method and hotel self-service check-in method
CA3080097A1 (en) Managing and controlling access to secured areas
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
CN104935486A (en) Intelligent gated comprehensive information management method
KR20210003485A (en) Method and apparatus for providing financial transaction in atm based on face recognition
CN110349302A (en) One kind can program intelligent entrance guard control protection operational method and its system
CN107341870B (en) Bluetooth button unlocking method and system
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
WO2016156665A1 (en) Control device for controlling an electric locking device
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
KR20160090992A (en) Security system, apparatus, and method using supplemental code
KR20150102668A (en) Security system, apparatus, and method using add-on code

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16771457

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16771457

Country of ref document: EP

Kind code of ref document: A1