WO2017182708A1 - Method, lock and server for a lock system, and lock system - Google Patents

Method, lock and server for a lock system, and lock system Download PDF

Info

Publication number
WO2017182708A1
WO2017182708A1 PCT/FI2017/050288 FI2017050288W WO2017182708A1 WO 2017182708 A1 WO2017182708 A1 WO 2017182708A1 FI 2017050288 W FI2017050288 W FI 2017050288W WO 2017182708 A1 WO2017182708 A1 WO 2017182708A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
door
server
information
information relating
Prior art date
Application number
PCT/FI2017/050288
Other languages
French (fr)
Inventor
Hannu Kankkunen
Ari REKONEN
Helinä NURMONEN
Joonas TUOMIKUMPU
Sampo TERÄS
Laura KRÖGER
Original Assignee
Rollock Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rollock Oy filed Critical Rollock Oy
Publication of WO2017182708A1 publication Critical patent/WO2017182708A1/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0046Electric or magnetic means in the striker or on the frame; Operating or controlling the striker plate
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B15/00Other details of locks; Parts for engagement by bolts of fastening devices
    • E05B15/02Striking-plates; Keepers; Bolt staples; Escutcheons
    • E05B15/0205Striking-plates, keepers, staples
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0057Feeding
    • E05B2047/0059Feeding by transfer between frame and wing
    • E05B2047/0061Feeding by transfer between frame and wing using induction
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B59/00Locks with latches separate from the lock-bolts or with a plurality of latches or lock-bolts

Definitions

  • the invention relates to a lock system and also to a door lock and server belonging to the system.
  • door locks comprising a lock case and a locking latch, which door locks can be opened and closed mechanically.
  • electrical locks which can be controlled to open and close by means of electrical commands and electrical opening means.
  • the electrical connections of a lock that is in a door are arranged e.g. by means of wires or other corresponding conductors through the frame of the door. The conductors could be led to the door lock e.g. via the door frame from the hinge side of the door.
  • the purpose of the present invention is to achieve a new type of lock system, in which the operation of a lock can be monitored and, based on the monitoring of the operation, messages and notifications associated with operation of the lock can be sent to bodies associated with use of the lock.
  • information relating to use of the lock can be collected with a lock system, which comprises at least one lock and a server.
  • a lock collects information relating to use of the lock, and the information collected by the lock and relating to its use is sent to a server.
  • the information relating to use of the lock is analyzed on the server and from the server a message and/or alarm formed on the basis of information received from the lock is sent to a body associated with the lock.
  • the body associated with the lock is a body administering and/or using electronic keys connected to the lock and/or a body responsible for servicing the lock.
  • the information relating to use of a lock is information as to whether the door is open, information as to whether the door is closed, how long the door is open, how long the door is closed, the number of times the door is opened, the technical condition of the lock, the condition and/or servicing time of the door.
  • means for wirelessly sending electrical power to the lock case and/or into connection with the lock case are arranged in connection with the counterpart of the lock.
  • Arranged in the lock case and/or in connection with the lock case are means for wirelessly receiving electrical power from the means for sending electrical power that are arranged in connection with the counterpart of the lock.
  • the counterpart of the lock wirelessly sends electrical power to the lock case and/or into connection with the lock case with the means that are for sending electrical power
  • the lock case wirelessly receives electrical power from the counterpart of the lock with the means for receiving electrical power when the lock and the counterpart of the lock are at a certain distance from each other.
  • the electrical power received from the connection of the lock e.g. from the means for receiving electrical power, can further be measured.
  • the wireless transfer of power is implemented as inductive power transmission.
  • the lock updates the information about the electronic keys suited to it from the server, and by means of this information the lock knows which electronic keys have the right to open the lock.
  • the solution according to the invention now presented has some significant advantages when it is compared to prior-art solutions.
  • the operation of a lock can be monitored and, based on the monitoring of the operation, messages and notifications associated with operation of the lock can be sent to bodies associated with use of the lock.
  • the technical condition of the lock and different operating situations can be monitored without the user or some other body associated with the lock having to physically visit the lock.
  • FIG. 1 presents a schematic view of the operating principle of a lock according to one embodiment of the invention
  • Fig. 2 presents the structure of a lock according to one embodiment of the invention
  • Fig. 3 presents the structure of a counterpart of a lock according to one embodiment of the invention
  • Fig. 4 presents the structure of a lock according to one embodiment of the invention, in which a coil used for receiving electrical power is presented;
  • Fig. 5 presents a schematic view of the operating principle of a lock system according to an embodiment of the invention.
  • information relating to use of a lock can be collected in a lock system, which comprises at least one lock and a server.
  • Fig. 1 presents a schematic view of a lock according to one embodiment of the invention, which lock can be used in the lock system according to the invention.
  • the counterpart 101 of the lock which counterpart is presented in Fig. 1 and is fitted into the frame of the door, scans for the presence of the door lock 102 at regular intervals.
  • the lock 102 and the counterpart 101 of the lock comprise coils 103, 104, which are used for the wireless transfer of electrical power.
  • the counterpart 101 of the lock controls current to the transmitter coil 103, which produces a magnetic field.
  • the magnetic field connects to the receiver, i.e.
  • the power transfer is thus based on magnetic induction, correspondingly to that in a mains transformer (primary coil and secondary coil).
  • a mains transformer primary coil and secondary coil.
  • two planar coils are used, instead of an iron core transformer.
  • the medium of the coils is air, in some embodiments of the invention partly also plastic.
  • the unit sending power i.e. the counterpart 101 of the lock
  • scans for the presence of the lock 102 at regular intervals so-called ping function. If the lock 102 does not respond to the scan and/or if an object is not identified, the power transfer is not switched into use. In this way the warming of the wrong metal objects and also the unnecessary power consumption of the device can be prevented, and also it can be detected whether the door is open (lock does not respond to a scan) or whether the door is closed (power transfer succeeds).
  • the principle of magnetic resonance or some other method can be used for wirelessly transferring electrical power from the counterpart of the lock to the lock.
  • Fig. 2 presents an exemplary structure of a lock according to an embodiment of the invention, which lock can be used as a lock of the lock system according to the invention.
  • the lock comprises a lock case 203, which lock case comprises a locking latch 204 and a latch mechanism.
  • the latch mechanism comprises electrical means for opening and/or closing the locking latch.
  • Means are arranged in connection with the lock case 203 for wirelessly receiving 205 electrical power from the means for sending electrical power that are arranged in connection with the counterpart of the lock.
  • the lock functions mechanically and the mechanical lock can also be opened and/or closed electrically.
  • Fig. 3 presents a counterpart 301 of the lock according to an embodiment of the invention, which counterpart can also be used in the lock system according to the invention.
  • the counterpart 301 of the lock presented in Fig. 3 comprises an aperture for the locking latch 302 of the lock, and means for sending 303 electrical power.
  • the counterpart of the lock is fastenable into the door frame at a point corresponding to the lock of the door, and wiring to the counterpart of the lock is arranged via the door frame.
  • the means for receiving 205 and for sending 303 electrical power can be coils.
  • a lock environment is characteristically narrow and high in structure.
  • the electronics used in the solution according to the invention can be disposed inside the lock to some extent more freely than the coils that transfer power - the coils, on the other hand, must be brought close to each other on the front surfaces of the lock and of the counterpart.
  • the coils can be implemented to be planar in structure (planar coils).
  • Fig. 4 presents a magnification of the bottom part of the lock.
  • the lock of Fig. 4 corresponds in its structure to the lock presented in Fig . 2, but a coil 404 used for receiving electrical power is presented in it.
  • the width of the magnetic field between the coils is small in the lateral direction.
  • the metal in the environs of the transmitter coil and receiver coil hardly affects the functionality of the power transfer and the resonance circuits at all.
  • a relatively thin, e.g. 1 - 2 mm thick, ferrite sheet can generally be used. Ferrite material is used as a suitable material for shielding from interference.
  • the ferrite sheet that is background material behind the transmitter coil and receiver coil guides the direction of the magnetic field and prevents the field spreading behind a coil, and thus, for its part, shields the other electronics from interference.
  • the lock and the counterpart of the lock, as well as the means comprised in them for sending and receiving electrical power are arranged in the door and in the door frame in such a way that the door can be opened and closed but the transfer of power only succeeds when the door is closed . It is not good for the transfer of electrical power and/or the transfer of information to operate when the door is open because in this case the door would appear to the system, and e.g. to access control systems, to be closed even though it was really open.
  • the transfer of electrical power is possible at an operating range of approx. 10 mm.
  • the maximum distance between the frame and the lock when the door is closed is typically approx. 6 mm.
  • Both the transmitter coil and the receiver coil can be shielded with an approx. 2 mm layer, in which case an operating range of approx. 10 mm is sufficient in a lock application.
  • information can also be wirelessly sent between the lock and the counterpart of the lock.
  • the transfer of information can be implemented with the means used for the transfer of electrical power.
  • the solution according to the invention can be based on electronic keys that enable the opening of a lock.
  • Electronic keys can be stored e.g . in a mobile device, in which case the mobile device functions as a key, and/or in a cloud service, by means of which electronic keys can be administered.
  • one electronic key can provide a lock opening right also for a number of locks instead of for one lock, e.g. for a lock group, which comprises all the locks of one building, in which case by creating one key an opening right for a number of locks is given.
  • the owner of a lock requests with his/her device the creation of an electronic key from the service, he/she can select for which lock or locks he/she wishes to create a key.
  • Fig. 5 presents a lock system according to the invention, which comprises at least one lock and a server.
  • the owner and administrator of a lock can administer a certain lock or certain locks and the electronic keys connected to them.
  • the owner or administrator of a lock can also receive notifications and alarms from the service.
  • Electronic keys connected to a lock can be sent from the service to the device of a user of the lock.
  • a user can, by means of his/her device, e.g . a mobi le device such as a mobile phone, tablet, electronic key or other device, open a lock when the user is in the proximity of the lock.
  • a lock can also send a message to a device comprising an electronic key.
  • a user of a lock has the opportu nity of chang ing the settings associated with the lock via the server and he/she can receive notifications relating to the lock from the server.
  • information relating to use of a lock is collected by means of the lock.
  • the information collected by a lock is sent to a server and is analyzed on the server, e.g . on a server or servers of a cloud service.
  • From the server a message and/or a la rm formed on the basis of information received from the lock is sent to a body associated with the lock.
  • the message can be sent e.g . to a body ad ministering electronic keys connected to a lock and/or to a body using a lock and/or to a body responsible for servicing the lock.
  • Information relating to use of a lock collected and sent by the lock can be e.g . information as to whether the door is open, information as to whether the door is closed , how long the door is open, how long the door is closed , the number of times the door is opened , the technica l cond ition of the lock, the cond ition and/or servicing time of the door.
  • a lock can also report its position to the server and/or the location information of the lock can be stored on the server.
  • a lock comprises the mea ns described above for the wireless transfer of power from the striking plate to the lock, and the lock can utilize these means for the wi reless transfer of power in collecting information .
  • the information relating to use of a lock is determined on the basis of information measu red by the aid of the means for wireless power transfer of the lock.
  • the cond ition of the lock and of the door can be determined by measu ring the operation of wi reless power transfer, e.g .
  • the wi reless power transfer means in the striking plate and in the lock are also not fully alig ned and in this case the transmission of sufficient power to the lock requires the transmission of more power than normal from the striking plate, i.e. the efficiency ratio of the wireless transmission of power is thus worse than the desig ned ratio. Based on this, an alarm can be raised and/or a message sent and/or a body servicing the lock can be called out to repair the door.
  • a technical fault in the lock can cause a lower than normal efficiency ratio in wireless power transfer.
  • the system via the server to raise an alarm and/or to send a message and/or to call out a body servicing the lock to repair the lock, because the lock must be adjusted or it must be replaced .
  • Servicing can also be ordered in situations in which the number of times the door has been opened exceeds a predefined limit. It can also be deduced by the aid of the means for the wireless transfer of power whether the door is open or closed . The deduction can be implemented in such a way that the door can be interpreted as being open when the wireless transfer of power does not succeed and closed when power can be supplied from the striking plate to the lock.
  • a system e.g . a lock
  • a temperature sensor by monitoring the temperature and power consumption of the induction coil information about the state of the door environs can be obtained, e.g . whether the door gap is optimal, whether the door is possibly d rooping because the coil gets warm, et cetera.
  • the service life of a lock can be prolonged by optimizing the temperature and power supply.
  • the period of time a door is open and the number of times it is opened can be reported to a server and the server can analyze and report the effect of these on energy consumption.
  • notifications and/or alarms can be issued from a server and/or from a service e.g . in the following situations.
  • a notification or message can be sent if the means for the wireless transfer of power do not have contact but the lock is in the closed state. In such a case the lock could have been picked .
  • a notification or message can be sent if the latch of a lock is moved without a key. In such a case a break-in via the door has possibly been attempted or an attempt has possibly been made from inside to open it while none of the registered keys (e.g. keys in use) are on the inside of the door.
  • a notification or message can be sent if a door has been left inadvertently open.
  • some period of time can be set for how long a door must be open before a message or alarm is sent.
  • the time period can be set by means of the server and the time typically in use can be e.g. 5 minutes.
  • the criteria for sending messages or alarms can be different for a different time of day, for different days of the week and/or for different seasons of the year.
  • the service can include e.g. different alarm criteria for different times of day. Such a case can be e.g. one in which a message or alarm is sent if the door detects it is in daytime usage mode at certain times or on certain days.
  • the state of a certain lock, and also whether there is no key connected to the lock in the proximity of the lock is detected.
  • a message or alarm can be formed e.g. if no key is detected in the proximity of the lock when the door is opened .
  • the lock can report the lack of a key e.g. with a sound notification or visual notification.
  • the lock can be configured in such a way that it does not become locked, so that a user cannot lock himself/herself outside.
  • the function in question can be set on or off e.g . by an action of the user and/or of the body administering the lock.
  • the locks connected to a system and the mobile devices comprising an electronic key can communicate safely via an encrypted connection with a server and/or a cloud service via the Internet.
  • the lock can in this way send its user information in encrypted form to a server.
  • the lock is also aware, via an encrypted connection, of electronic keys connected to it that are administered in a cloud service.
  • the lock can contact the service at certain intervals and can update the list of electronic keys authorized to open the lock.
  • the server can notify the lock of changes when they occur such as e.g. when a new key is created, or the right of use of an old key is removed, or other settings associated with the lock are changed.
  • the lock and lock striking plate of the lock system according to the invention can operate as described below in a situation in which the door closes and the lock system detects the closing of the door.
  • the counterpart of the lock starts to wirelessly send electrical power to the lock case and/or into connection with the lock case e.g. with the means that are for sending electrical power.
  • the lock case wirelessly receives electrical power sent from the counterpart of the lock with the means that are for receiving electrical power, when the lock and the counterpart of the lock are at a certain distance from each other.
  • the sending of power can always be started from a certain initial power level or, alternatively, from the power level used earlier.
  • a certain power level can be set to be suitable for each lock & striking plate pair in conjunction with installation of the lock, or the initial level can be the same for all the locks and it can be set e.g. already at the factory.
  • the electrical power received from the connection of the lock e.g. from the means for receiving electrical power, can further be measured, so that it is known how much electrical power has been received by the lock. Losses occurring during the sending, such as e.g. the distance of the lock and the counterpart of the lock from each other and how well aligned the lock and the counterpart of the lock are, affect the power level received.
  • the power level of the electrical power sent is decreased and/or increased in such a way that the measured level of the electrical power received is between certain predetermined upper and lower values or essentially at a given preset level. In this way enough power from the viewpoint of reliable functioning of the lock is always sent to the lock, but at the same time the transfer of excess power is avoided.
  • the lock can communicate the level of electrical power received to the counterpart of the lock, so that the power level can be decreased, increased and/or kept unchanged.
  • the lock can e.g. communicate to the counterpart of the lock the measured electrical power level, voltage and/or current.
  • the lock can e.g.
  • the counterpart of the lock can adjust the electrical power sent to be suitable on the basis of the information received from the lock. Changing the power level that is sent can be performed in steps, or otherwise the lock can try to determine the power level needed on the basis of one measurement result. When the power level received has reached a determined target level, the adjustment of the power level can be ended until the door is opened and the electricity supply is disconnected, or until information is received from the lock that the power level received is no longer within the defined range. Information about the power level sent and received can also be sent to a server and/or the power levels can be changed on the basis of commands given by the server.
  • the access control system or some other access control device sends a command to the counterpart of the lock of the door about opening the door lock after the power supply has started.
  • the command is encrypted.
  • the command can be encrypted in the counterpart of the lock or already previously, e.g. in the access control system.
  • the counterpart of the door sends a message to the door lock, utilizing the components to be used in the transfer of electrical power.
  • the encryption is decrypted and the content of the message interpreted.
  • the lock executes the command, in other words e.g. opens the lock, locks the lock, or sends the status information of the lock to the counterpart of the lock.
  • the lock wants to send a message to the counterpart of the lock, the system functions in such a way that the lock of the door encrypts the message (e.g. its status information) and sends it utilizing the components used for receiving electrical power.
  • the counterpart of the lock receives the message and sends it onwards.
  • the encryption of the message is decrypted, the content of the message can be read.
  • the encryption of a message can be decrypted e.g. in the counterpart of the lock or not until the final receiving destination e.g. in the access control system.
  • the identifier and encryption key of the new lock to be installed can be set in connection with the installation.
  • the authentication method described above can be used between the lock and/or the counterpart of the lock and the replacement tool.
  • the lock system according to the invention can function at the start of the lock and the counterpart of the lock forming contact e.g. in the manner described in the following.
  • the counterpart of the lock occasionally switches power to the lock so that the electronics of the lock would wake up when the door is closed fully and the transfer of power succeeds.
  • the distance of the counterpart of the lock and the lock from each other is such that the transfer of power can be started.
  • the electronics of the lock activates as a consequence of the connection of power and the software of the lock starts up and begins to receive electrical power.
  • the power to be sent can be adjusted, e.g. in this phase, to a predefined level or to within predefined limits.
  • the lock and the counterpart of the lock can create a data link between the lock and the counterpart of the lock.
  • the lock and the counterpart of the lock authenticate each other.
  • the counterpart of the lock sends an encrypted control command and the command is sent via the means of the counterpart of the lock that are for sending electrical power, over the wireless interface, to the lock via the devices of the lock that are for receiving electrical power.
  • the lock decrypts and interprets the control command and executes the control command .
  • the level of power to be sent is adjusted only after authentication .
  • the lock ca n send e. g . its status i nformation in encrypted format to the counterpart of the lock.
  • the cou nterpart of the lock receives, by the aid of the means send ing electrical power, the status information sent by the lock, which status information the lock sends by the aid of the means receiving electrical power.
  • the counterpart of the door decrypts and interprets the status information .
  • the counterpart of the lock can tra nsmit the status information onwards, e.g . to the access control .
  • Information can also be sent i n encrypted format to the access control or i n encrypted format to some other correspond ing system or u nit, where the encryption is then decrypted .
  • the transfer of electrica l power and data l in k between the lock and the counterpart of the lock are disconnected .
  • the aforementioned proceed ures a re performed aga in from the beg inning .
  • the status of the lock can be set to a status correspond ing to the opening of the door or to a new control command received .
  • the lock can be without cu rrent when the door is open because in this case there is no need to control it.
  • the lock fu nctions in this case as a mecha nical lock.
  • Th is situation can be detected by means of the power transfer, e.g . by comparing the power sent and the power received , such that power reception is possible but the power level received is low.
  • This kind of situation is when the door is still slightly ajar and the lock and the counterpart of the lock are not fully face to face.
  • the door when it is detected that the door is almost, but not quite, closed, i.e. when the lock and the counterpart of the lock are close but not exactly face to face, the door can be tightened closed by means of the lock or other means, e.g. by controlling the latch tightening the lock to tighten the door closed.
  • the lock and/or the counterpart of the lock can have a separate identification for the purpose of locking the lock.
  • information can be collected about the development of the power level received by the lock and if changes occur in the power received and/or in the ratio of power received with respect to the power level of the power sent, it can be deduced, e.g. on the server, that the door, in which the lock system is installed, is damaged or worn, or that there is some other defect in the door that prevents it from closing properly.
  • the lock can have a battery, which keeps the electrical components of the lock on when the power transfer is disconnected.
  • the solution according to the invention it is also possible to wirelessly transfer information between the lock and the counterpart of the lock.
  • the information transfer is digital and authentication methods and/or encryption methods are used in the lock application to ensure data security.
  • the aim of authentication is therefore to ensu re that the devices communicating with each other recog nize one another. In this way, a fraudu lent device cannot control another device. Li kewise, transmission of information to a fraudulent device is also prevented . Authentication ca n be performed before permitting use of the service.
  • Authentication can be one-way (server identifies user) or two-way (service identifies user, and the user identifies the service) .
  • the lock ensures, by mea ns of authentication, before executing a command, that the control command comes from an identified device (from the identified counterpart of the lock) .
  • the lock ensu res that the device of an u nauthorized person (intruder) cannot control the operation of the lock.
  • the counterpart of the lock ensu res, by means of authentication, before transmission to the bu ild ing automation of the status information received from a lock, that the status i nformation orig i nates from an identified device (from an identified lock) .
  • the counterpart of the lock ensu res that incorrect status information delivered by the device of an u nauthorized person (intruder) does not travel onwards and jeopard ize the safety of the locking .
  • Encryption means the converting of the plain text information to be encrypted into a type of format that makes cla rification of the orig inal information either impossible or too expensive (i .e. breaking the encryption takes too much time or resou rces compared to the value of the encrypted information) .
  • the hand ling of encrypted information is generally two-d irectional : the information to be encrypted ca n be converted into an u nreadable format for encrypting the information and , correspond ing ly, the encrypted information can be retu rned back to the orig inal format for utilizi ng it.
  • Exam ples of a lgorithms to be used for the encryption of the information are, inter alia, DES, AES a nd Blowfish .
  • the data transfer speed between the lock and the counterpart of the lock is approx. 1 kBit/s. This transfer speed is sufficient for the solution accord ing to the invention, because the amount of information to be transferred between the cou nterpa rt of the lock and the lock is sma ll despite the authentication and encryption protocols.
  • the means for send ing electrical power are sepa rate and the means that can be installed i n connection with the cou nterpart of the lock and/or the means for receiving electrical power are sepa rate and the means that can be installed i n connection with the lock.
  • the means for receiving electrical power are arra nged i n the lock case and/or the means for send ing electrical power are arranged in the cou nterpart of the lock.
  • the lock and the counterpart of the lock comprise means for encrypting and decrypting the information to be transmitted .
  • a mobile device when a mobile device is in the proximity of the lock it forms an encrypted connection with the lock.
  • the connection can be formed e.g . by means of some short-range technology such as by means of Bluetooth technology or by means of WLAN .
  • the lock receives the encrypted key and decrypts the encryption .
  • the lock e.g . the lock case or its striking plate, compares the information contained i n the electronic key to the information it received about electronic keys from the service.
  • the lock opens the locking if the information of these two electronic keys corresponds.
  • the lock ca n record an opening event i n a cloud service for monitoring the operation and use of the lock.
  • An opening event is recorded i n a database on the basis of the reference of the electronic key and/or on the basis of the identifier of the lock. Opening events, the number of them and/or the numbers of keys created can be recorded i n the database and reports can be formed by mea ns of these.
  • the aforementioned data recorded i n the database can also be used as the basis for invoicing a customer.
  • a lock can be opened with a mobile device also when the mobile device is not in the proximity of the lock. In this case other means of contact are used for commu nications between the lock and the mobile device.
  • the system comprises a camera, which is arranged e.g .
  • Information collected via the camera can be sent to a server.
  • movement can be detected by means of the camera . If the camera detects movement, an alarm can be formed and/or a message can be sent. In one embod iment of the invention an alarm can be formed and/or a message can be sent if movement is detected and the lock is i n the locked state.
  • a user can be identified by means of the camera, e.g . by means of face recog nition, by means of i ris recog nition, and after recog nition the lock ca n open .
  • the system comprises a motion sensor or movement detector, which is arranged e.g . in connection with the lock inside and/or outside the locked space.
  • Information collected via a motion sensor or movement detector can be sent to a server. If the motion sensor detects movement, an ala rm can be formed and/or a message can be sent. In one embod iment of the invention an ala rm can be formed and/or a message can be sent if movement is detected and the lock is in the locked state.
  • the data traffic between the lock and a server ca n be arra nged to travel via the means for the wi reless transfer of power, e.g . i n the manner described earlier i n this application.
  • the counterpart of the lock can be connected to a wireline or wireless telecommunications network and the data traffic going to the door lock is arranged to travel via the counterpart of the lock.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

Lock system, lock and method for collecting information relating to use of a lock in a lock system, which comprises at least one lock (102, 202) and a server. In the method the lock (102, 202) collects information relating to use of a lock, the information relating to use of the lock is sent to a server, the information relating to use of the lock is analyzed on the server, and from the server a message and/or alarm formed on the basis of information received from the lock is sent to a body associated with the lock.

Description

METHOD, LOCK AND SERVER FOR A LOCK SYSTEM, AND LOCK SYSTEM
Field of the invention
The invention relates to a lock system and also to a door lock and server belonging to the system.
Background of the invention
Known in the art are door locks comprising a lock case and a locking latch, which door locks can be opened and closed mechanically. Also known in the art are electrical locks, which can be controlled to open and close by means of electrical commands and electrical opening means. In the arrangements known in the art, the electrical connections of a lock that is in a door are arranged e.g. by means of wires or other corresponding conductors through the frame of the door. The conductors could be led to the door lock e.g. via the door frame from the hinge side of the door.
Leading the conductors requires a passageway in the door for the conductors and, that being the case, a conventional door cannot be used with an electric lock without adapting the door. In their present state, pre-ordered special doors must be used for doors that are provided with an electric lock, said doors having passageways for electrical conductors, or otherwise a conventional door must be adapted by making in it passageways going through the door for the conductors. Both methods are expensive relative to the costs of conventional doors. In addition to this, according to regulations holes may not be made in some doors, such as e.g. in fire doors.
Also known in the art are electrical door locks to which electrical power can be transferred wirelessly. By means of these locks that enable wireless power transfer, wiring coming through the structure of the door to the lock that is in the door can be avoided. These electrical locks can be used in conventional doors in which space for wires has not been arranged. In solutions known in the art power can be transferred e.g. from the striking plate to the lock case when the door is closed and the lock and striking plate are face to face.
In recent times locks that can be opened wirelessly, e.g. by means of a mobile phone, have also been launched onto the market. In systems of this type the owner of a lock can send to different devices a user right, i.e. an electronic key for a lock he/she owns. In this way the lock owner can create keys for different devices and for different people.
Brief description of the invention
The purpose of the present invention is to achieve a new type of lock system, in which the operation of a lock can be monitored and, based on the monitoring of the operation, messages and notifications associated with operation of the lock can be sent to bodies associated with use of the lock.
In the solution according to the invention information relating to use of the lock can be collected with a lock system, which comprises at least one lock and a server. In the solution of the invention a lock collects information relating to use of the lock, and the information collected by the lock and relating to its use is sent to a server. The information relating to use of the lock is analyzed on the server and from the server a message and/or alarm formed on the basis of information received from the lock is sent to a body associated with the lock.
In one embodiment of the invention the body associated with the lock is a body administering and/or using electronic keys connected to the lock and/or a body responsible for servicing the lock.
In one embodiment of the invention the information relating to use of a lock is information as to whether the door is open, information as to whether the door is closed, how long the door is open, how long the door is closed, the number of times the door is opened, the technical condition of the lock, the condition and/or servicing time of the door. In one embodiment of the invention means for wirelessly sending electrical power to the lock case and/or into connection with the lock case are arranged in connection with the counterpart of the lock. Arranged in the lock case and/or in connection with the lock case are means for wirelessly receiving electrical power from the means for sending electrical power that are arranged in connection with the counterpart of the lock. In the solution according to one embodiment of the invention the counterpart of the lock wirelessly sends electrical power to the lock case and/or into connection with the lock case with the means that are for sending electrical power, and the lock case wirelessly receives electrical power from the counterpart of the lock with the means for receiving electrical power when the lock and the counterpart of the lock are at a certain distance from each other. In the solution of the invention the electrical power received from the connection of the lock, e.g. from the means for receiving electrical power, can further be measured.
In one embodiment of the invention, the wireless transfer of power is implemented as inductive power transmission.
In one embodiment of the invention the lock updates the information about the electronic keys suited to it from the server, and by means of this information the lock knows which electronic keys have the right to open the lock.
The solution according to the invention now presented has some significant advantages when it is compared to prior-art solutions. By means of the solution of the invention the operation of a lock can be monitored and, based on the monitoring of the operation, messages and notifications associated with operation of the lock can be sent to bodies associated with use of the lock. In this case the technical condition of the lock and different operating situations can be monitored without the user or some other body associated with the lock having to physically visit the lock.
Brief description of the figures In the following, the invention will be described in more detail by the aid some examples of its embodiment with reference to the drawings 1 - 5, wherein Fig. 1 presents a schematic view of the operating principle of a lock according to one embodiment of the invention;
Fig. 2 presents the structure of a lock according to one embodiment of the invention;
Fig. 3 presents the structure of a counterpart of a lock according to one embodiment of the invention;
Fig. 4 presents the structure of a lock according to one embodiment of the invention, in which a coil used for receiving electrical power is presented;
Fig. 5 presents a schematic view of the operating principle of a lock system according to an embodiment of the invention.
Detailed description of the invention
In the solution according to the invention information relating to use of a lock can be collected in a lock system, which comprises at least one lock and a server.
Fig. 1 presents a schematic view of a lock according to one embodiment of the invention, which lock can be used in the lock system according to the invention. The counterpart 101 of the lock, which counterpart is presented in Fig. 1 and is fitted into the frame of the door, scans for the presence of the door lock 102 at regular intervals. The lock 102 and the counterpart 101 of the lock comprise coils 103, 104, which are used for the wireless transfer of electrical power. When the lock 102 is at a suitable distance from the counterpart 101 of the lock, e.g . when the door is closed, the counterpart 101 of the lock controls current to the transmitter coil 103, which produces a magnetic field. The magnetic field connects to the receiver, i.e. to the coil 104 of the lock, and forms alternating current there, which is rectified and filtered . The power transfer is thus based on magnetic induction, correspondingly to that in a mains transformer (primary coil and secondary coil). In the solution according to the invention e.g. two planar coils are used, instead of an iron core transformer. In practice the medium of the coils is air, in some embodiments of the invention partly also plastic.
When the lock system is functioning, the unit sending power, i.e. the counterpart 101 of the lock, scans for the presence of the lock 102 at regular intervals (so-called ping function). If the lock 102 does not respond to the scan and/or if an object is not identified, the power transfer is not switched into use. In this way the warming of the wrong metal objects and also the unnecessary power consumption of the device can be prevented, and also it can be detected whether the door is open (lock does not respond to a scan) or whether the door is closed (power transfer succeeds).
In one embodiment of the invention, instead of inductive power transfer, the principle of magnetic resonance or some other method can be used for wirelessly transferring electrical power from the counterpart of the lock to the lock.
Fig. 2 presents an exemplary structure of a lock according to an embodiment of the invention, which lock can be used as a lock of the lock system according to the invention. The lock comprises a lock case 203, which lock case comprises a locking latch 204 and a latch mechanism. The latch mechanism comprises electrical means for opening and/or closing the locking latch. Means are arranged in connection with the lock case 203 for wirelessly receiving 205 electrical power from the means for sending electrical power that are arranged in connection with the counterpart of the lock.
In one embodiment of the invention, the lock functions mechanically and the mechanical lock can also be opened and/or closed electrically.
Fig. 3 presents a counterpart 301 of the lock according to an embodiment of the invention, which counterpart can also be used in the lock system according to the invention. The counterpart 301 of the lock presented in Fig. 3 comprises an aperture for the locking latch 302 of the lock, and means for sending 303 electrical power. The counterpart of the lock is fastenable into the door frame at a point corresponding to the lock of the door, and wiring to the counterpart of the lock is arranged via the door frame.
In the solution according to the invention, the means for receiving 205 and for sending 303 electrical power can be coils. A lock environment is characteristically narrow and high in structure. The electronics used in the solution according to the invention can be disposed inside the lock to some extent more freely than the coils that transfer power - the coils, on the other hand, must be brought close to each other on the front surfaces of the lock and of the counterpart. The coils can be implemented to be planar in structure (planar coils).
Fig. 4 presents a magnification of the bottom part of the lock. The lock of Fig. 4 corresponds in its structure to the lock presented in Fig . 2, but a coil 404 used for receiving electrical power is presented in it.
The width of the magnetic field between the coils is small in the lateral direction. Thus the metal in the environs of the transmitter coil and receiver coil hardly affects the functionality of the power transfer and the resonance circuits at all.
For shielding the other electronics behind the coils from interference and also for directing the magnetic field, a relatively thin, e.g. 1 - 2 mm thick, ferrite sheet can generally be used. Ferrite material is used as a suitable material for shielding from interference. The ferrite sheet that is background material behind the transmitter coil and receiver coil guides the direction of the magnetic field and prevents the field spreading behind a coil, and thus, for its part, shields the other electronics from interference. In the solution according to an embodiment of the invention the lock and the counterpart of the lock, as well as the means comprised in them for sending and receiving electrical power, are arranged in the door and in the door frame in such a way that the door can be opened and closed but the transfer of power only succeeds when the door is closed . It is not good for the transfer of electrical power and/or the transfer of information to operate when the door is open because in this case the door would appear to the system, and e.g. to access control systems, to be closed even though it was really open.
In one embodiment of the invention the transfer of electrical power is possible at an operating range of approx. 10 mm. The maximum distance between the frame and the lock when the door is closed is typically approx. 6 mm. Both the transmitter coil and the receiver coil can be shielded with an approx. 2 mm layer, in which case an operating range of approx. 10 mm is sufficient in a lock application.
In the system according to the invention information can also be wirelessly sent between the lock and the counterpart of the lock. The transfer of information can be implemented with the means used for the transfer of electrical power.
The solution according to the invention can be based on electronic keys that enable the opening of a lock. Electronic keys can be stored e.g . in a mobile device, in which case the mobile device functions as a key, and/or in a cloud service, by means of which electronic keys can be administered. In one embodiment of the invention one electronic key can provide a lock opening right also for a number of locks instead of for one lock, e.g. for a lock group, which comprises all the locks of one building, in which case by creating one key an opening right for a number of locks is given. When the owner of a lock requests with his/her device the creation of an electronic key from the service, he/she can select for which lock or locks he/she wishes to create a key.
Fig. 5 presents a lock system according to the invention, which comprises at least one lock and a server. The owner and administrator of a lock can administer a certain lock or certain locks and the electronic keys connected to them. The owner or administrator of a lock can also receive notifications and alarms from the service. Electronic keys connected to a lock can be sent from the service to the device of a user of the lock. In this way a user can, by means of his/her device, e.g . a mobi le device such as a mobile phone, tablet, electronic key or other device, open a lock when the user is in the proximity of the lock. A lock can also send a message to a device comprising an electronic key. A user of a lock has the opportu nity of chang ing the settings associated with the lock via the server and he/she can receive notifications relating to the lock from the server.
In the solution accord ing to the invention information relating to use of a lock is collected by means of the lock. The information collected by a lock is sent to a server and is analyzed on the server, e.g . on a server or servers of a cloud service. From the server a message and/or a la rm formed on the basis of information received from the lock is sent to a body associated with the lock. The message can be sent e.g . to a body ad ministering electronic keys connected to a lock and/or to a body using a lock and/or to a body responsible for servicing the lock.
Information relating to use of a lock collected and sent by the lock can be e.g . information as to whether the door is open, information as to whether the door is closed , how long the door is open, how long the door is closed , the number of times the door is opened , the technica l cond ition of the lock, the cond ition and/or servicing time of the door. A lock can also report its position to the server and/or the location information of the lock can be stored on the server.
In one embod iment of the invention a lock comprises the mea ns described above for the wireless transfer of power from the striking plate to the lock, and the lock can utilize these means for the wi reless transfer of power in collecting information . In this case at least some of the information relating to use of a lock is determined on the basis of information measu red by the aid of the means for wireless power transfer of the lock. For example, the cond ition of the lock and of the door can be determined by measu ring the operation of wi reless power transfer, e.g . its efficiency ratio and/or the mag nitude of the power level sent and/or other information related to the send ing of power, such as the number of times power transmission is switched on and/or switched off and/or the periods of time power transmission is switched on and/or switched off. If the door is misalig ned , the wi reless power transfer means in the striking plate and in the lock are also not fully alig ned and in this case the transmission of sufficient power to the lock requires the transmission of more power than normal from the striking plate, i.e. the efficiency ratio of the wireless transmission of power is thus worse than the desig ned ratio. Based on this, an alarm can be raised and/or a message sent and/or a body servicing the lock can be called out to repair the door. Also a technical fault in the lock can cause a lower than normal efficiency ratio in wireless power transfer. In this case also it is good for the system via the server to raise an alarm and/or to send a message and/or to call out a body servicing the lock to repair the lock, because the lock must be adjusted or it must be replaced . Servicing can also be ordered in situations in which the number of times the door has been opened exceeds a predefined limit. It can also be deduced by the aid of the means for the wireless transfer of power whether the door is open or closed . The deduction can be implemented in such a way that the door can be interpreted as being open when the wireless transfer of power does not succeed and closed when power can be supplied from the striking plate to the lock.
In one embodiment of the invention also other sensors can be used for collecting information, e.g . a temperature sensor or a sensor that detects the presence of a key. In an embodiment wherein a system, e.g . a lock, comprises a temperature sensor, by monitoring the temperature and power consumption of the induction coil information about the state of the door environs can be obtained, e.g . whether the door gap is optimal, whether the door is possibly d rooping because the coil gets warm, et cetera. Furthermore, the service life of a lock can be prolonged by optimizing the temperature and power supply.
In one embodiment of the invention e.g . the period of time a door is open and the number of times it is opened can be reported to a server and the server can analyze and report the effect of these on energy consumption.
On the basis of information analyzed on the server, notifications and/or alarms can be issued from a server and/or from a service e.g . in the following situations. A notification or message can be sent if the means for the wireless transfer of power do not have contact but the lock is in the closed state. In such a case the lock could have been picked . A notification or message can be sent if the latch of a lock is moved without a key. In such a case a break-in via the door has possibly been attempted or an attempt has possibly been made from inside to open it while none of the registered keys (e.g. keys in use) are on the inside of the door. A notification or message can be sent if a door has been left inadvertently open. With regard to sending a message or an alarm, e.g . some period of time can be set for how long a door must be open before a message or alarm is sent. The time period can be set by means of the server and the time typically in use can be e.g. 5 minutes. The criteria for sending messages or alarms can be different for a different time of day, for different days of the week and/or for different seasons of the year. The service can include e.g. different alarm criteria for different times of day. Such a case can be e.g. one in which a message or alarm is sent if the door detects it is in daytime usage mode at certain times or on certain days.
Also other procedures can be performed on the basis of information relating to use of the lock. In one embodiment of the invention the state of a certain lock, and also whether there is no key connected to the lock in the proximity of the lock, is detected. In this case a message or alarm can be formed e.g. if no key is detected in the proximity of the lock when the door is opened . In such a case e.g . in a situation in which a user does not have a key with him/her when leaving his/her home, the lock can report the lack of a key e.g. with a sound notification or visual notification. The lock can be configured in such a way that it does not become locked, so that a user cannot lock himself/herself outside. The function in question can be set on or off e.g . by an action of the user and/or of the body administering the lock.
The locks connected to a system and the mobile devices comprising an electronic key can communicate safely via an encrypted connection with a server and/or a cloud service via the Internet. The lock can in this way send its user information in encrypted form to a server. The lock is also aware, via an encrypted connection, of electronic keys connected to it that are administered in a cloud service. The lock can contact the service at certain intervals and can update the list of electronic keys authorized to open the lock. Also the server can notify the lock of changes when they occur such as e.g. when a new key is created, or the right of use of an old key is removed, or other settings associated with the lock are changed.
In the following the operation of a lock according to one embodiment of the invention is presented in more detail by way of illustration. The lock and lock striking plate of the lock system according to the invention, which are shown in Figs. 1 - 4, can operate as described below in a situation in which the door closes and the lock system detects the closing of the door. When the system detects that the door has closed, the counterpart of the lock starts to wirelessly send electrical power to the lock case and/or into connection with the lock case e.g. with the means that are for sending electrical power. The lock case wirelessly receives electrical power sent from the counterpart of the lock with the means that are for receiving electrical power, when the lock and the counterpart of the lock are at a certain distance from each other. In one embodiment of the invention the sending of power can always be started from a certain initial power level or, alternatively, from the power level used earlier. A certain power level can be set to be suitable for each lock & striking plate pair in conjunction with installation of the lock, or the initial level can be the same for all the locks and it can be set e.g. already at the factory. In one embodiment of the invention the electrical power received from the connection of the lock, e.g. from the means for receiving electrical power, can further be measured, so that it is known how much electrical power has been received by the lock. Losses occurring during the sending, such as e.g. the distance of the lock and the counterpart of the lock from each other and how well aligned the lock and the counterpart of the lock are, affect the power level received. The power level of the electrical power sent is decreased and/or increased in such a way that the measured level of the electrical power received is between certain predetermined upper and lower values or essentially at a given preset level. In this way enough power from the viewpoint of reliable functioning of the lock is always sent to the lock, but at the same time the transfer of excess power is avoided. In the solution of the invention the lock can communicate the level of electrical power received to the counterpart of the lock, so that the power level can be decreased, increased and/or kept unchanged. The lock can e.g. communicate to the counterpart of the lock the measured electrical power level, voltage and/or current. The lock can e.g. communicate to the counterpart of the lock whether the power level received is too low, too high and/or essentially the magnitude of a certain predetermined level, or between certain upper and lower values. That being the case, the counterpart of the lock can adjust the electrical power sent to be suitable on the basis of the information received from the lock. Changing the power level that is sent can be performed in steps, or otherwise the lock can try to determine the power level needed on the basis of one measurement result. When the power level received has reached a determined target level, the adjustment of the power level can be ended until the door is opened and the electricity supply is disconnected, or until information is received from the lock that the power level received is no longer within the defined range. Information about the power level sent and received can also be sent to a server and/or the power levels can be changed on the basis of commands given by the server.
In the following the operation of a solution according to one embodiment of the invention will be presented in a situation in which electricity supply to the lock has been started. In this case when it is desired to open the lock, the access control system or some other access control device sends a command to the counterpart of the lock of the door about opening the door lock after the power supply has started. Before sending a command over a wireless interface, the command is encrypted. The command can be encrypted in the counterpart of the lock or already previously, e.g. in the access control system. After encryption, the counterpart of the door sends a message to the door lock, utilizing the components to be used in the transfer of electrical power. When the door lock receives the message, the encryption is decrypted and the content of the message interpreted. After this, the lock executes the command, in other words e.g. opens the lock, locks the lock, or sends the status information of the lock to the counterpart of the lock. If the lock wants to send a message to the counterpart of the lock, the system functions in such a way that the lock of the door encrypts the message (e.g. its status information) and sends it utilizing the components used for receiving electrical power. Correspondingly, the counterpart of the lock receives the message and sends it onwards. When the encryption of the message is decrypted, the content of the message can be read. The encryption of a message can be decrypted e.g. in the counterpart of the lock or not until the final receiving destination e.g. in the access control system.
For practical reasons, e.g. in a situation in which a damaged lock is replaced with a new lock, the identifier and encryption key of the new lock to be installed can be set in connection with the installation. For permitting the changing of the identifier, the authentication method described above can be used between the lock and/or the counterpart of the lock and the replacement tool.
The lock system according to the invention can function at the start of the lock and the counterpart of the lock forming contact e.g. in the manner described in the following. When the door is open, there is no data link between the lock and the counterpart of the lock. The counterpart of the lock occasionally switches power to the lock so that the electronics of the lock would wake up when the door is closed fully and the transfer of power succeeds. When closing the door fully, the distance of the counterpart of the lock and the lock from each other is such that the transfer of power can be started. In this case the electronics of the lock activates as a consequence of the connection of power and the software of the lock starts up and begins to receive electrical power. The power to be sent can be adjusted, e.g. in this phase, to a predefined level or to within predefined limits.
When the connection transferring electrical power has been formed, the lock and the counterpart of the lock can create a data link between the lock and the counterpart of the lock. For creating the data link, the lock and the counterpart of the lock authenticate each other. After authentication the counterpart of the lock sends an encrypted control command and the command is sent via the means of the counterpart of the lock that are for sending electrical power, over the wireless interface, to the lock via the devices of the lock that are for receiving electrical power. After this the lock decrypts and interprets the control command and executes the control command . In one embod iment of the invention the level of power to be sent is adjusted only after authentication .
The lock ca n send e. g . its status i nformation in encrypted format to the counterpart of the lock. In this case the cou nterpart of the lock receives, by the aid of the means send ing electrical power, the status information sent by the lock, which status information the lock sends by the aid of the means receiving electrical power. After receiving, the counterpart of the door decrypts and interprets the status information . The counterpart of the lock can tra nsmit the status information onwards, e.g . to the access control . Information can also be sent i n encrypted format to the access control or i n encrypted format to some other correspond ing system or u nit, where the encryption is then decrypted .
When the door is opened , the transfer of electrica l power and data l in k between the lock and the counterpart of the lock are disconnected . When the door is closed again, the aforementioned proced ures a re performed aga in from the beg inning . After closing of the door, the status of the lock can be set to a status correspond ing to the opening of the door or to a new control command received .
The lock can be without cu rrent when the door is open because in this case there is no need to control it. The lock fu nctions in this case as a mecha nical lock. By means of the solution of the invention it can be deduced that the door is open when the transfer of power and/or the transfer of information cannot be performed and that it is closed when power tra nsfer and/or information transfer is possible and/or i n prog ress. In add ition to this, in one embod iment of the invention the closed state and locked state of the door can be determined even more precisely when the lock and the counterpart of the lock are close to each other even thoug h the door is not fu l ly closed or locked . Th is situation can be detected by means of the power transfer, e.g . by comparing the power sent and the power received , such that power reception is possible but the power level received is low. This kind of situation is when the door is still slightly ajar and the lock and the counterpart of the lock are not fully face to face. In one embodiment of the invention when it is detected that the door is almost, but not quite, closed, i.e. when the lock and the counterpart of the lock are close but not exactly face to face, the door can be tightened closed by means of the lock or other means, e.g. by controlling the latch tightening the lock to tighten the door closed. In one embodiment of the invention the lock and/or the counterpart of the lock can have a separate identification for the purpose of locking the lock.
In one embodiment of the invention information can be collected about the development of the power level received by the lock and if changes occur in the power received and/or in the ratio of power received with respect to the power level of the power sent, it can be deduced, e.g. on the server, that the door, in which the lock system is installed, is damaged or worn, or that there is some other defect in the door that prevents it from closing properly.
In one embodiment of the invention, the lock can have a battery, which keeps the electrical components of the lock on when the power transfer is disconnected.
By means of the solution according to the invention it is also possible to wirelessly transfer information between the lock and the counterpart of the lock. The information transfer is digital and authentication methods and/or encryption methods are used in the lock application to ensure data security.
By means of encryption and authentication it is ensured that the lock reacts only to commands transmitted by an identified (acting as the correct pair) counterpart. An unauthorized device that does not know the encryption key used cannot create or send to the lock a control message in an acceptable format and therefore cannot mislead the lock into the incorrect operating mode. The counterpart of the lock accepts and transmits onwards only the status information it receives from an identified lock (acting as the correct pair). An unauthorized device that does not know the encryption key used cannot send status information in an acceptable format and therefore cannot mislead the access control system . The encryption key used is not sent at any stage to another device. The encryption key used is kept in the device in such a way that it would not be economica lly reasona ble to u ncover it. The aim of authentication is therefore to ensu re that the devices communicating with each other recog nize one another. In this way, a fraudu lent device cannot control another device. Li kewise, transmission of information to a fraudulent device is also prevented . Authentication ca n be performed before permitting use of the service.
Authentication can be one-way (server identifies user) or two-way (service identifies user, and the user identifies the service) .
In the solution accord ing to the invention the lock ensures, by mea ns of authentication, before executing a command, that the control command comes from an identified device (from the identified counterpart of the lock) . By checking the identity of the counterpart of the lock, the lock ensu res that the device of an u nauthorized person (intruder) cannot control the operation of the lock.
The counterpart of the lock ensu res, by means of authentication, before transmission to the bu ild ing automation of the status information received from a lock, that the status i nformation orig i nates from an identified device (from an identified lock) . In this way the counterpart of the lock ensu res that incorrect status information delivered by the device of an u nauthorized person (intruder) does not travel onwards and jeopard ize the safety of the locking .
After successfu l authentication, information, which is encrypted, can be transferred between the lock and the counterpart of the lock. Va rious encryption technolog ies used in telecommu nications or in computers can be used as encryption methods for encrypting the messages of the information transfer. Encryption means the converting of the plain text information to be encrypted into a type of format that makes cla rification of the orig inal information either impossible or too expensive (i .e. breaking the encryption takes too much time or resou rces compared to the value of the encrypted information) . The hand ling of encrypted information is generally two-d irectional : the information to be encrypted ca n be converted into an u nreadable format for encrypting the information and , correspond ing ly, the encrypted information can be retu rned back to the orig inal format for utilizi ng it. Exam ples of a lgorithms to be used for the encryption of the information are, inter alia, DES, AES a nd Blowfish .
In the solution accord ing to one embod iment of the invention the data transfer speed between the lock and the counterpart of the lock is approx. 1 kBit/s. This transfer speed is sufficient for the solution accord ing to the invention, because the amount of information to be transferred between the cou nterpa rt of the lock and the lock is sma ll despite the authentication and encryption protocols. In one embod iment of the invention, the means for send ing electrical power are sepa rate and the means that can be installed i n connection with the cou nterpart of the lock and/or the means for receiving electrical power are sepa rate and the means that can be installed i n connection with the lock.
In one embod iment of the invention, the means for receiving electrical power are arra nged i n the lock case and/or the means for send ing electrical power are arranged in the cou nterpart of the lock. In one embod iment of the invention, the lock and the counterpart of the lock comprise means for encrypting and decrypting the information to be transmitted .
In one embod iment of the invention when a mobile device is in the proximity of the lock it forms an encrypted connection with the lock. The connection can be formed e.g . by means of some short-range technology such as by means of Bluetooth technology or by means of WLAN . After this the mobile device requests opening of the lock by means of the encrypted electronic key. The lock receives the encrypted key and decrypts the encryption . After this the lock, e.g . the lock case or its striking plate, compares the information contained i n the electronic key to the information it received about electronic keys from the service. The lock opens the locking if the information of these two electronic keys corresponds. The lock ca n record an opening event i n a cloud service for monitoring the operation and use of the lock. An opening event is recorded i n a database on the basis of the reference of the electronic key and/or on the basis of the identifier of the lock. Opening events, the number of them and/or the numbers of keys created can be recorded i n the database and reports can be formed by mea ns of these. The aforementioned data recorded i n the database can also be used as the basis for invoicing a customer. In one embod iment of the invention a lock can be opened with a mobile device also when the mobile device is not in the proximity of the lock. In this case other means of contact are used for commu nications between the lock and the mobile device. In one embod iment of the invention the system comprises a camera, which is arranged e.g . in the proximity of the lock inside a nd/or outside the locked space. Information collected via the camera can be sent to a server. In one embod iment of the invention movement can be detected by means of the camera . If the camera detects movement, an alarm can be formed and/or a message can be sent. In one embod iment of the invention an alarm can be formed and/or a message can be sent if movement is detected and the lock is i n the locked state. In one embod iment of the invention a user can be identified by means of the camera, e.g . by means of face recog nition, by means of i ris recog nition, and after recog nition the lock ca n open .
In one embod iment of the invention the system comprises a motion sensor or movement detector, which is arranged e.g . in connection with the lock inside and/or outside the locked space. Information collected via a motion sensor or movement detector can be sent to a server. If the motion sensor detects movement, an ala rm can be formed and/or a message can be sent. In one embod iment of the invention an ala rm can be formed and/or a message can be sent if movement is detected and the lock is in the locked state.
In one embod iment of the invention the data traffic between the lock and a server ca n be arra nged to travel via the means for the wi reless transfer of power, e.g . i n the manner described earlier i n this application. In this case e.g. the counterpart of the lock can be connected to a wireline or wireless telecommunications network and the data traffic going to the door lock is arranged to travel via the counterpart of the lock.
It is obvious to the person skilled in the art that the different embodiments of the invention are not limited solely to the examples described above, and that they may therefore be varied within the scope of the claims presented below. The characteristic features possibly presented in the description in conjunction with other characteristic features can also, if necessary, be used separately to each other.

Claims

1. Method for collecting information relating to use of a lock in a lock system, which comprises at least one lock (102, 202) and a server, characterized in that in the method :
a lock (102, 202) collects information relating to use of the lock, the information relating to use of the lock is sent to a server, the information relating to use of the lock is analyzed on the server, and
from the server a message and/or alarm formed on the basis of information received from the lock is sent to a body associated with the lock.
2. Method according to claim 1, characterized in that the body associated with the lock is a body administering and/or using electronic keys connected to the lock and/or a body responsible for servicing the lock.
3. Method according to claim 1 or 2, characterized in that the information relating to use of a lock is information as to whether the door is open, information as to whether the door is closed, how long the door is open, how long the door is closed, the number of times the door is opened, the technical condition of the lock, the condition of the door, servicing time and/or location of the lock.
4. Method according to any whatsoever of the preceding claims, characterized in that arranged in the lock case of the lock and/or in connection with the lock case (203) are means for wirelessly receiving (205) electrical power from the means for sending (303) electrical power that are arranged in connection with the counterpart of the lock, and
in which method the information relating to use of the lock is determined at least partly on the basis of information measured by the aid of the means of the lock for wireless power transfer.
5. Method according to claim 4, characterized in that the technical condition of a door and/or of a lock are determined at least partly on the basis of information measured by the aid of the means for the wireless transfer of power.
6. Method according to any whatsoever of the preceding claims, characterized in that a lock comprises sensors such as temperature sensors and/or a sensor detecting the presence of a key, and
wherein the information relating to use of the lock is determined at least partly by means of the sensors.
7. Method according to any whatsoever of the preceding claims, characterized in that in the method it is detected whether a lock (102, 202) is open or closed, whether a door is open and/or whether keys connected to the lock are in the proximity of the lock.
8. Method according to claim 7, characterized in that in the method an alarm is formed if a lock (102, 202) is closed but the door is open.
9. Method according to claim 7, characterized in that in the method a door does not lock if the lock (102, 202) is open but a key is not detected in the proximity of the lock.
10. Lock system, characterized in that it comprises a server and at least one lock (102, 202) and
wherein the system is adapted to implement any method whatsoever according claims 1 - 9.
11. Lock for a lock system, which lock (102, 202) comprises a lock case (203) fastenable into a door, which lock case comprises a locking latch and a latch mechanism, wherein the latch mechanism comprises electrical means for opening and/or closing the locking latch, characterized in that
the lock (102, 202) is adapted to collect information relating to use of the lock, and
the lock (102, 202) is further adapted to send to a server the information relating to use of the lock.
12. Lock according to claim 11, characterized in that information relating to use of a lock is information as to whether the door is open, information as to whether the door is closed, how long the door is open, how long the door is closed, the number of times the door is opened, the technical condition of the lock, the condition and/or servicing time of the door.
13. Lock according to claim 11 or 12, characterized in that arranged in the lock case of the lock and/or in connection with the lock case (203) are means for wirelessly receiving (205) electrical power from the means for sending (303) electrical power that are arranged in connection with the counterpart of the lock, and
the lock (102, 202) is adapted to send to the server information measured by the aid of the means of the lock for wireless power transfer.
14. Lock according to any whatsoever of claims 11 - 13, characterized in that the lock is adapted to transmit information between a lock and a server using a wired and/or wireless connection.
15. Server for a lock system, which comprises at least one lock, characterized in that
the server is adapted to receive information relating to use of a lock from at least one lock (102, 202) of the lock system,
the server is adapted to analyze the information relating to use of a lock, and
the server is adapted to send a message and/or alarm formed on the basis of information received from a lock to a body associated with the lock.
16. Server according to claim 15, characterized in that the body associated with the lock is a body administering and/or using electronic keys connected to the lock and/or a body responsible for servicing the lock.
17. Server according to claim 15 or 16, characterized in that information relating to use of a lock is information as to whether the door is open, information as to whether the door is closed, how long the door is open, how long the door is closed, the number of times the door is opened, the technical condition of the lock, the condition and/or servicing time of the door.
PCT/FI2017/050288 2016-04-18 2017-04-18 Method, lock and server for a lock system, and lock system WO2017182708A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI20165338A FI20165338A (en) 2016-04-18 2016-04-18 LOCK SYSTEM, LOCK SYSTEM SERVER AND DOOR LOCK
FI20165338 2016-04-18

Publications (1)

Publication Number Publication Date
WO2017182708A1 true WO2017182708A1 (en) 2017-10-26

Family

ID=60115727

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2017/050288 WO2017182708A1 (en) 2016-04-18 2017-04-18 Method, lock and server for a lock system, and lock system

Country Status (2)

Country Link
FI (1) FI20165338A (en)
WO (1) WO2017182708A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008013359A1 (en) * 2006-07-24 2008-01-31 Kyungdong Network Co., Ltd System and method for enhancing security function through double monitoring
US20150159401A1 (en) * 2013-12-11 2015-06-11 Echostar Technologies L.L.C. Integrated Door Locking and State Detection Systems and Methods
WO2016027178A1 (en) * 2014-08-21 2016-02-25 Cordiner Peter Alexander An electronic locking system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008013359A1 (en) * 2006-07-24 2008-01-31 Kyungdong Network Co., Ltd System and method for enhancing security function through double monitoring
US20150159401A1 (en) * 2013-12-11 2015-06-11 Echostar Technologies L.L.C. Integrated Door Locking and State Detection Systems and Methods
WO2016027178A1 (en) * 2014-08-21 2016-02-25 Cordiner Peter Alexander An electronic locking system

Also Published As

Publication number Publication date
FI20165338A (en) 2017-10-19

Similar Documents

Publication Publication Date Title
US9721412B2 (en) Door lock and arrangement for transferring power and information to door lock
US9991936B2 (en) Door lock and arrangement for transferring power to door lock
CN102747891B (en) A kind of smart lock
CN204166591U (en) A kind of intelligent door lock system based on WIFI and Cloud Server
US9940766B2 (en) Lock arrangement and method for detecting the presence and location of a device sending a radio signal
CN109005189A (en) A kind of access transmission platform suitable for double net isolation
EP1897066A1 (en) Communication method of access control system
WO2009088902A2 (en) Mesh network security system gateway and method
CN103262474A (en) Method and system for remote operation of an installation
CN104967825A (en) Gatekeeper electronic dog system
US10202785B2 (en) Universal control module for electrical lock, retrofit and method for operating
CN103685499A (en) Terminal, server, application program management system and application program management method
WO2016001489A1 (en) Lock system and the creation of electronic keys in the lock system
CN112665674B (en) Flowmeter in communication with electromechanical valve
CN102118353A (en) Instruction security audit method of industrial internet remote maintenance system
KR20210025909A (en) Smart door look control system and method
KR20160128644A (en) Disital door remote control device
KR20140089020A (en) Home security prevention method using smartphone
WO2017182708A1 (en) Method, lock and server for a lock system, and lock system
CN102387494A (en) Android-mobile-platform-based remote automatic information exchange and control solution
US10943415B2 (en) System and method for providing communication over inductive power transfer to door
CN106355830B (en) Government affairs automatic monitored control system on duty
WO2017182709A1 (en) Lock system, server of a lock system and a door lock
EP2157889B1 (en) Mail delivery system
CN110349302A (en) One kind can program intelligent entrance guard control protection operational method and its system

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17785508

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17785508

Country of ref document: EP

Kind code of ref document: A1