WO2021051174A1 - Système de gestion à distance appliqué à des fermetures électroniques avec contrôle d'accès par dispositif mobile - Google Patents
Système de gestion à distance appliqué à des fermetures électroniques avec contrôle d'accès par dispositif mobile Download PDFInfo
- Publication number
- WO2021051174A1 WO2021051174A1 PCT/BR2019/050404 BR2019050404W WO2021051174A1 WO 2021051174 A1 WO2021051174 A1 WO 2021051174A1 BR 2019050404 W BR2019050404 W BR 2019050404W WO 2021051174 A1 WO2021051174 A1 WO 2021051174A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- locking
- lock
- access
- user
- allows
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention describes a remote management system applied to electronic locks with access control via mobile device. More specifically, it comprises a system of electronic locks activated via bluetooth that are developed to perform physical access control to environments, equipment, offices or related in the telecommunications market, so that this system completely dispenses with the use of physical keys. Access for opening and closing is done using an APP installed on a mobile device (smartphone, tablet), which allows the user to access the lock through a local bluetooth connection. This access process starts when the user, through his mobile device, with internet access, makes the request for an encrypted virtual key to the specific server. Once duly authenticated and authorized, the user receives the key from the server, starting to carry it in the memory of the APP of his mobile device. While the key is valid, the user, even though he is completely disconnected from the internet (stand-alone), can connect to the bluetooth lock corresponding to the received encrypted virtual key, authenticate himself using it, and send the command to open or close the lock.
- This access control system via electronic locks has different forms of construction and application, so that they have a series of features and characteristics that give them great operational flexibility, delivering operational efficiency in access management, as well as reducing direct and indirect losses, resulting from the reduction of events with damage to the company's assets.
- the present inventor based on the knowledge described above, has developed a new management and control system that is capable of performing remote customized recoding of the locks, creating an additional layer of protection through the link between each lock and its server.
- it developed new features applied to the locks, in order to improve the durability, security and usability of the system, regardless of the constructive form and application of the lock.
- the object of the present invention is a remote management system applied to electronic locks with access control via mobile device that comprises a system of electronic locks activated via bluetooth that are developed to perform physical access control to environments , equipment, cabinets or similar in the telecommunications market, so that this system completely dispenses with the use of physical keys.
- Access for opening and closing is done using an APP installed on a mobile device (smartphone, tablet), which allows the user to access the lock through a local bluetooth connection.
- a mobile device smart phone, tablet
- This access process starts when the user, through his mobile device, with internet access, makes the request for an encrypted virtual key to the specific server. Once duly authenticated and authorized, the user receives the key from the server, starting to carry it in the memory of the APP of his mobile device. As long as the key is valid, the user, even though he is completely disconnected from the internet (stand-alone), can connect to the bluetooth lock corresponding to the received encrypted virtual key, authenticate using it, and send the command to open or close the lock.
- This access control system via electronic locks has different forms of construction and application, so that they have a series of features and characteristics that give them great flexibility of operation.
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides a system that provides an effective and efficient way to perform access control to environments by eliminating the use of physical keys and manual control methods.
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via mobile device that provides a management and control system carried out by the central platform that is directly linked to electronic locks that are equipped with a connection via bluetooth and developed to control physical access to environments, equipment, offices or similar.
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides a bluetooth locks that totally dispense with the use of physical keys.
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides an access system for opening and closing that is done using an APP Installed on a mobile device (smartphone, tablet), which allows the user to access the lock via a local bluetooth connection.
- a feature of the present invention is a remote management system applied to electronic locks with access control via mobile device that provides an access process that starts when a user, through his mobile device, with internet access, makes the request encrypted virtual key to the central control platform.
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides a system that, once it is duly authenticated and authorized, the user receives the server key, passing it to the user. it in your mobile device's APP memory.
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides a system that, while the key is valid, the user, even though he is completely disconnected from the internet (stand-alone), can connect to the bluetooth lock corresponding to the received encrypted virtual key, authenticate using it and send the command to open or close the lock
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides a system equipped with electronic locks that are grouped in different construction and application forms, so that they have a series of features and characteristics that give them great flexibility of operation
- a characteristic of the present invention is a remote management system applied to electronic locks with access control via a mobile device that provides electronic locks that are manageable through the control platform and through the specific APP.
- Figure 1 presents the perspective view of the first constructive form of electric lock in the system, designed for internal applications with double pivoted or sliding door
- Figure 2 shows the exploded view of the first electrical lock construction of the system.
- Figure 3 shows the view of the locking system of the first constructive form of electric lock.
- Figure 4 shows the perspective view of a variant of the first constructive form of electric lock, applicable to simple pivoted doors, detailing the actuation next to the jamb.
- Figure 5 shows the perspective view of the first constructive form of electric lock, installed next to the door.
- Figure 6 shows the perspective view of the second constructive form of electric lock applied to the cabinet.
- Figure 7 shows the perspective view of the second constructive form of electric lock, detailing the constructivity of the device.
- Figures 7A, 7B and 7C show the views of the details of the locking and unlocking system of the second lock construction.
- Figure 8 shows the perspective view of the third constructive form of electric lock applied to the glass door.
- Figure 9 shows the rear perspective view of the third constructive form of electric lock applied to the cabinet.
- Figures 9A, 9B, 9G and 9D show the locking and unlocking details of the third electrical lock construction.
- Figure 10 shows the perspective view of the fourth constructive form of electric lock
- Figure 11 shows the perspective view of the fourth constructive form of electric lock, detailing the way in which the locking pin is actuated.
- Figures 11A, 11B, 11C and 11 D show the locking and unlocking details of the fourth electrical lock construction.
- Figure 12 presents the perspective view of the fifth constructive form of electric lock.
- Figure 13 shows the perspective view of the details of the components of the fifth constructive form of electric lock.
- Figure 14 shows the perspective view of the fifth constructive form of electric lock, detailing the form of arrangement next to the lock set.
- Figure 15 shows the perspective view of the sixth constructive form of electric lock, detailing the 'l' shape.
- Figure 16 shows the perspective view of the 'l' shape of the sixth constructive form of electric lock, detailing the form of actuation.
- Figures 16A, 16B and 16C show the locking and unlocking details of the 'l' shape of the sixth constructive form of electric lock.
- Figures 17 and 17A present the perspective views of the 'l' shape of the sixth constructive form of electric lock, detailing its application next to the locking system.
- Figure 18 shows the perspective view of the sixth constructive form of electric lock, detailing the closed 'C' shape.
- Figure 19 shows the perspective view of the sixth constructive form of electric lock, detailing the open 'C' shape.
- Figures 19A, 19B and 19C show the locking and unlocking details of the 'C' shape of the sixth constructive form of electric lock.
- Figure 20 shows the perspective view of the sixth constructive form of electric lock, detailing the closed 'C' shape and the locking and unlocking system.
- Figure 21 shows the perspective view of the seventh constructive form of electric lock, detailing the drive system.
- Figure 22 shows the perspective view of the seventh constructive form of electric lock, detailing the tongue coupling system provided with a groove next to the locking pin, figure 22A shows the pin fitted next to the tongue and figure 22B shows the pin fitted to the tongue and rotated, promoting locking.
- Figure 23 shows the details of the seventh constructive form of electric lock, showing the motor and the actuation of the pin.
- Figure 24 shows the perspective view of the eighth constructive form of electric lock, detailing the drive system.
- Figure 25 presents the perspective view of the eighth constructive form of electric lock, demonstrating its application and form of activation.
- Figures 26 and 26A show the views of the activation details of the eighth constructive form of electric lock, demonstrating the activation of locking and unlocking.
- Figures 27 and 27A show the views of the driving details of the eighth constructive form of electric lock, demonstrating the activation of the pin next to the motor.
- the remote management system applied to electronic locks with access control via a mobile device comprises a system that provides an effective and efficient way to perform access control to environments by eliminating the use of physical keys and manual control methods, providing the customer with a centralized and individualized way of controlling releases and access records, as well as as well as users of the tool (employees and subcontractors) a means of requesting and obtaining access without any need to travel to checkpoints.
- the remote management system has the following features and functionality: a. Configuration, registration and access control through a centralized platform; B. Access control by individual with determination of places, dates and times of permission, without the use of physical keys; ç. Access control devices (locks, padlocks) with stand-alone operation capability; d. Detection and registration of accesses and alarms of devices; and. Encrypted communication between the elements of the system; f. Release of accesses by means of iptographed electronic keys and protected by a password for personal use, carried by a mobile device (smartphone, tablet); g. Opening and closing devices for accessing environments through Mobile APP (IOS and Android platforms);
- the remote management system has become a solution capable of adequately meeting not only the demands of large companies, but also of medium and small companies, which can use the cloud platform to access scalable the resources offered by the system.
- the system integrates a set of elements involving accessories, access control devices and software platforms.
- the central system-wide management platform fulfills the primary storage functions of all parameters and data of the system and execution of the tasks of granting, controlling and registering keys and accesses according to stored parameterization, defined by the client, and this platform has the following characteristics and functionalities: a) Storage of the registration of people, companies, locations , environments and devices; b) Storage of links between locations x environments x devices; c) Control of access authorizations by users x locations x devices x dates / times and in real time; d) Registration of access / interaction events; e) Registration of alarms; f) Granting access for periods with restricted key validity; g) Granting access with predefined date, time and duration; h) Sending iptographed keys with a unique ID and in unlimited quantity; i) Key use validation facility based on activity authorization; j) Complete registration of key requests; k) Registration of key requests by terminals not registered on the platform; l) Mechanism for blocking or denying access - remote removal of keys present on mobile devices;
- the system features a block, called ‘auth’, which is responsible for authenticating and authorizing users to access any of the platform’s services, providing effective security to the information exchange process with the server platform.
- the system has a block, called 'key', it is the component of the system responsible exclusively for the generation of encrypted keys. Its topology, separate from the server platform, gives a much higher level of security to the system, as it allows a more restricted and controlled access to the encryption service. Featuring features and functionality that allow the generation of encrypted keys with unique ID and in unlimited quantity, restricted access to the platform and protected SW block.
- the central management platform features a functional module that allows licensing control already on the production line, generating traceable records of production and ensuring the safety of devices even on production lines of licensed factories. It also adds the device's property control feature and its link to a specific server. Featuring features and functionality that at production time generates and assigns device hardware licenses, linking its internal serial number to the identification of the licensed factory, production test date and responsible operator, also recording the calibration data, test results and bluetooth activation. In time of use, the registration of ownership of the device at the time of its activation or in the eventual transfer of ownership by the holder user, when the operation is authorized.
- the management and control system carried out by the central platform is directly linked to electronic locks that are equipped with a Bluetooth connection and developed to control physical access to environments, equipment, offices or similar.
- Bluetooth locks completely dispense with the use of physical keys. Access to open and close them is done using an APP installed on a mobile device (smartphone, tablet), which allows the user to access the lock through a local bluetooth connection.
- This access process starts when a user, through his mobile device, with access to the internet, makes the request for an encrypted virtual key to the central control platform. Once duly authenticated and authorized, the user receives the key from the server, starting to carry it in the memory of the APP of his mobile device. While the key is valid, the user, even though he is completely disconnected from the internet (stand-alone), can connect to the bluetooth lock corresponding to the received encrypted virtual key, authenticate himself using it and send the command to open or close the lock.
- Electronic locks have the following characteristics: a. Level of mechanical robustness (structure and locking system) appropriate to the type of application designed; B. Local bluetooth connection; ç. Sleep-mode operation mode with extremely low power consumption when in standby mode and without external power; d. Long-life non-rechargeable battery (associated with sleep-mode): autonomy of 5 years or more (according to the usage regime and device model); and. Contingency supply via USB port or Inductive coupling; f. Stand-alone operation: can operate in places without any internet connectivity; g. Possibility of operation in full online mode: operation using an ehernet connection, allowing connection in real time with dedicated virtual connection. This mode provides for the use of external power. Allows monitoring of alarms and reporting status in real time.
- H. Possibility of operation in online mode through its bluetooth interface, the lock can connect to a Bluetooth Gateway device (connected to the internet / intranet), through which it is possible to send alarms and report status to the SGR Server, as well as accepting remote controls for opening, closing or activating other devices (when dry contact output is available).
- This mode differs from full online in that it allows the lock to operate without any type of physical connection for communication with the SGR Server, operating only on battery, using the sleep-mode feature to ensure long autonomy; i. Possibility of operation in offline mode: in this mode, the lock operates in a totally isolated way.
- the only way to send alarms or status is to communicate through the bluetooth connection with the mobile device at the time of access. When this mobile device reconnects to the internet, the data is then forwarded to the central platform. In this mode, there is no possibility of executing remote controls; j. Storage of access and alarm history; k. Temperature, humidity and vibration sensors (accelerometer);
- L Alarms for unlocked lock, lock / door open, low battery, critical battery, battery removed, high temperature, high humidity, vandalism and disconnected external power; m. Ethernet port; n. LoT connectivity: LORA, ZigFox, CAT-M1 and NB-loT; O. Configurable lock opening feature in case of inconsistent geographic location: register position +/- tolerance radius.
- Electronic locks are grouped in different construction and application forms, so that they have a series of features and characteristics that give them great flexibility of operation, being described below several forms constructive measures applied to the locks that enable management through the control platform and the specific APP.
- the electronic lock presents an internal assembly, superimposed or embedded in a door, capable of restricting or freeing the access of a user through an iptographed electronic key, for individual use, managed by means of an application available on your mobile device, with local communication via Bluetooth technology.
- the lock describes a structure (10) that has two fixing points (11) that allows the connection of a structure (12) provided with rods (121) that fit together with the points (11), allowing the fixation by nut (122) and protective cover (123) next to the door.
- the structure (10) is provided with an opening (13) that has a pin (14) of vertical movement, said opening (13) that allows the arrangement of the projection (151) of the stop (15).
- the stop (15) with projection (151) has two fixing points (152) that allows the connection of a structure (16) provided with rods (161) that fit together with the points (152), allowing the fixing by nut (162) and protective cover (163) next to the stop.
- the projection (151) is provided with a central hole (153) that allows the pin (14) to fit.
- the lock closure and locking system occurs through the projection arrangement (151) next to the opening (13) of the structure (10), so that when activated, it moves the pin (14) vertically, locking or unlocking the lock , as described in figures, 1, 2 and 3.
- the lock can have a constructive variation, where the structure (10) and the stop (15) are fixed through a pin (14) that moves horizontally, in order to promote the locking and unlocking of the set, as described in figures 4 and 5
- the electronic lock features equipment with an alpha-robust body, for superimposed assembly, designed to resist attacks by drills or hand saws, with geometry that prevents the action of tools such as crow's feet or similar, preventing access or transfer of forces to the main locking pin and its mechanism.
- Your brace watchband type also of high resistance, makes its application especially versatile.
- the lock has a structure (20) equipped with threaded rods (201) that fit together with a structure (21) through a nut (202) in order to allow its fixation next to the equipment.
- a second structure (22) is provided with threaded rods (221) that fit next to a structure (23) through a nut (222), said structure (22) which has a chain (24) provided by links (241) that fit through pins (242) that allow flexibility of movement, so that the structure (25) provided with a projection (251) that has a through hole (252) is fitted next to the opening (203) of the structure (20 ), as described in figures 6 and 7.
- the structure (20) internally has the provision of a pin (204) that moves vertically, in order to allow the locking and unlocking of the set as the control platform is activated.
- the locking and unlocking system is represented by figures 7B and 7C.
- the electronic lock features a fixing system adjusted for application on pivoted or sliding glass doors. Its design foresees its use in external doors, counting on a constructive form resistant to the weather. It consists of two basic parts: lock (30) and stop (31), as described in figures 8 and 9.
- the movement of the locking tab (303) is made by the user by turning the mechanical actuation button (302) of the device.
- the tongue (303) is projected out of the lock body, entering the stop and effecting the movement of the door, whether sliding or pivoted.
- the device detects the situation of the door and starts to monitor the situation of the locking tab (303).
- the device detects the door lock. Once both requirements are satisfied, the user, from a connection via APP, with a valid encrypted virtual key for the user in question in his memory, is able to give the lock command on the lock. Once the command is accepted, an internal motor (304) decouples the mechanical actuation button from the internal actuation mechanism of the tongue, leaving the actuation button drive turning freely, making it impossible to retract the tongue and, consequently, opening the door. To open the door, a user, using an APP that is carrying a valid encrypted virtual key for the user, date and device, connects to the lock, receives information about its status and is able to send the lock opening command. .
- the internal motor (304) of the device re-couples the mechanism of the button (302) to the internal mechanism of the tongue (303), making it possible for the user to retract the tongue into the body of the device (30) by turning the button (302), thus unlocking the door.
- the internal motor (304) of the device re-couples the mechanism of the button (302) to the internal mechanism of the tongue (303), making it possible for the user to retract the tongue into the body of the device (30) by turning the button (302), thus unlocking the door.
- this lock As it has an application where there is usually a pressure on the locking tongue (303), this lock has a system that acts only on the coupling / uncoupling of the mechanism of movement of the lock. This demands greater user interaction, but allows a very significant reduction in consumption, allowing its application more freely, due to the absence of demand for power cables.
- Another innovation brought by this product is the fact that it enables a more active communication with the control platform, regardless of a connection with the APP.
- the electronic lock presents a constructivity developed for use in protection rails of outdoor telecommunications cabinets.
- Cabinet protection rails are equipment developed by different manufacturers, which aim to protect equipment cabinets located in areas with high risk or incidence of theft and vandalism.
- the use of railings with conventional keys represents an enormous vulnerability to the result of this solution.
- the lock is provided with a structure (40) that internally has a tongue (41) of horizontal movement arranged next to the upper portion of the lock and next to the low relief point (42) provided with a projection (43).
- the railing door has a manual locking system that consists of hooks that lock the door to the cabinet by means of a vertical movement.
- the role of the lock is to detect this locking system in the “locked” position from the inside of the rail. Once the locking position is detected, the user will be able to activate the advance of the tongue (41) using the APP (therefore the appropriate virtual key). Once advanced, the tongue prevents the movement of the railing locking mechanism, keeping it locked. To unlock it, simply reconnect to the device and, with a valid virtual key, activate the catch of the tongue (41), releasing the movement of the railing locking mechanism, allowing the user to open it, as described in the figures 10 and 11.
- Railings are capable of operating over a wide range of DC voltages, including + 24Vdc and -48Vdc. They make it possible to restrict or release a user's access by means of an encrypted electronic key, for individual use, managed through an application available on their mobile device (Unilock APP), with local communication through Bluetooth technology, registering and sending information. access information to the centralized supervision system.
- Unilock APP mobile device
- This constructive form also brings a different positioning of the sensor system, also relying on sensors external to the main block, giving it greater robustness in detecting the state of the protected cabinet door.
- the electronic lock features a device (50) that makes it possible to automate the unlocking / locking system of a cabinet door through a command in the APP of the control platform.
- This device makes use of an indoor application lock, properly designed to use sensors and motor external to it.
- This device adds a drive system for high torque compact DC electric motors (applied in automotive accessories) to carry out the aggregate access control to drive cabinet doors.
- the technology provides the use of smooth doors " , without any type of apparent lock, allowing it to be opened at the touch of a button on the APP
- the lock button on the APP In order to close the door, the user presses the lock button on the APP, placing the lock on hold for the door to be closed during the desired waiting time.
- the lock detects its alignment and positioning through its sensors, triggering the mechanism of the cabinet itself, which brings the door to the final closed position, making its locking.
- sensors on the device allow the confirmation of the closing, making it possible to register the closing of access.
- the closing and locking mechanism (51) is an integral part of the client's cabinet.
- the device in question is limited to effecting, using the motor (52) already mentioned, the activation of this pre-existing mechanism in the cabinet.
- the device has a gear system (511) that has a square hole (512) where a shaft (513) for coupling the gear of the device to the cabinet mechanism must be inserted.
- the system has an input for coupling a lead-acid battery (53), which has the function of feeding the motor drive in the event of a total power failure in the cabinet.
- the device also has an external power input, which can be discreetly made available in an external part of the cabinet. This input allows the supply of the necessary energy to supply the motor in the event of a total power failure, that is, the internal power source of the cabinet and the lead-acid battery of the device motor, according to figures 12, 13 and 14.
- the electronic lock presents devices developed to replace conventional padlocks, adding, in addition to access control, high robustness and application flexibility.
- This device was developed for use in an external environment (outdoor), being immune to bad weather. Its steel housing receives heat treatment that gives it high mechanical resistance, preventing its locking system from being affected through the use of hand tools.
- the padlock has a USB power port (66) as a contingent form of power, which can be powered by a simple pocket powerbank.
- This device also has an option called Rasplock, which aims to make the lock compatible with the locking function of the original lock of a cabinet, keeping the lock mechanically fixed to it.
- Rasplock aims to make the lock compatible with the locking function of the original lock of a cabinet, keeping the lock mechanically fixed to it.
- the Bluetooth Padlock has two constructive forms: type 'l' and type 'C', making reference to the geometric shape of its locking system.
- the “I” shape has a body (60) provided with an opening (61) which has a main pin (62).
- the main pin (62) is internally locked when the rack (63) advances into the hole (64) of said pin (62).
- the motor (65) backs off the rack (63) that exits the hole (64) of the main pin (62). From this state, the user can move the main pin (62) outwards until the limit of full opening of the opening (61).
- the handle (62) has a shorter side, attached to the locking and locking hole (601) than the other, attached to the locking hole (602), so that the shorter side can come completely out of the body (60) and rotate freely around the longest side axis, which is always attached to the body (60) by the locking hole (602), even with the mechanism released.
- the user returns the short side of the handle (62) back to the position in the locking and locking hole (601), inserting it back into the body (60).
- the closing is detected by the electronic system, the user is able to send the closing command using his smartphone or tablet loaded with a valid key.
- the motor (65) reverses the mechanism (66) that advances its pins (63) and (64) into the cavities (621) and (622) of the handle (62), locking the lock in the closed position , according to figures 18, 19 and 20.
- the electronic lock presents a product aimed at implementing access control directly on retractable lever type locks, usually used in telecommunications equipment and data processing cabinets.
- the device body (71) is directly attached to the lever (701) of the original lock (70) of the cabinet, replacing the conventional mechanical core.
- a motor (73) with an axle (74) with an oblong cross section that, when vertical, allows it to fit into the slot (711) of the device body (71) when the lever of the original cabinet lock is placed in the locking position.
- the motor (73) rotates the oblong axis (74) by 90 degrees, making its cross section perpendicular to the direction of the slit (711) of the device body (71), thus preventing the lock lever from being able to be pulled out and rotated.
- the user using the same virtual key used for locking, sends an unlock command from his smartphone or tablet.
- the motor (73) rotates the shaft (74) 90 degrees in the opposite direction to the locking, making its cross section aligned with the slit in the device body (71), thus allowing its decoupling, releasing the lock lever so that it can be pulled out and turned to unlock and open the door where it is applied.
- the electronic lock presents a device developed for the control of access to galleries and inspection boxes closed by metal lids of different sizes.
- the device is provided with a body (80) that has a threaded main axis (81) on its bottom, perpendicular to the plane of the body (80), which has an end-of-travel nut (811) at its opposite end ). Between the body (80) and the locking nut (811), there is a tongue (82) that has a thread inside which the main axis (81) passes, allowing it to rotate freely around the axis (81 ).
- a cavity (812) that has a profile formed by the outline of nine semicircles.
- the user can attach a switch (83) which has a profile compatible with that of the cavity (812), thus allowing the main axis (81) to rotate to the main axis (81) a locking disc (813) is attached, which has a locking tooth (814).
- a motor (802) inside the body (80) maintains a locking pin ( 803) advanced towards the locking tooth (814), keeping the main shaft (81) locked.
- a supply cavity (805) through which it is possible to energize the equipment by means of inductive coupling.
- the user can send the cover unlock command to the device.
- the electronic control activates the motor (802) by moving the locking pin (803) in the opposite direction to the locking disc (813), releasing the rotation movement of the main shaft (81).
- the tongue (82) moves downwards, relieving the locking pressure of the cover to the point where it can rotate freely following the movement of the main shaft (81), releasing the opening of the lid.
- the tongue (82) rotates following the movement of the main shaft (81) until the end of the stroke pin (821) touches the end of the stroke (801) causing the tongue (82) to stop turning and start to rise by exerting pressure on the locking point against the cover rim.
- the control system detects the closing position and the motor (802) that moves the pin (803) towards the locking disc (813), ending the lid locking process, as described in figures 24, 25, 26 and 27.
- the device has a locking and unlocking system for the manual locking and unlocking mechanism of the cover, monitoring its status in order to guarantee its proper closing, registering the access completely.
- the equipment was designed to provide the locking of ground covers that give access to underground energy galleries, telecommunications, sewage networks, among others.
- the device was designed for application in circular cast iron covers, with diameters around 0.8m, and its mechanical scale may vary for application in smaller covers.
- the equipment has a mechanical locking device for the cover by means of a highly robust tongue. This main lock is moved with the use of a mechanical tool specially designed for this purpose, preventing malicious people from being able to exert effort on the mechanism using common tools.
- the standard mechanical tool was designed to break under applied force below the resistance level of the main mechanism, creating an initial level of mechanical self-protection. Associated with this system, we then have the bluetooth locking device itself.
- This device has an actuator that locks or unlocks the main system, thus ensuring control of opening and closing the lid.
- the device was designed to withstand immersion in water, wide temperature variations, recurring mechanical impact (due to the constant passage of vehicles) and dirt.
- the device does not use a battery. It is powered using an accessory that, powered by a powerbank, is capable of providing energy transfer by inductive coupling, thus enabling activation and operation.
- the management and control platform enables the user and the managers involved to maintain constant control and management over the activities and release of accesses in each lock model, so that the system presents a management and monitoring web application, a client application and a mobile application, each application having its functionalities and characteristics.
- the management and monitoring web application allows the interaction of managing users as a system. It is an application with a responsive interface, capable of providing friendly access both in internet browsers running on desktops / notebooks, as well as in browsers of mobile devices lOS or Android, giving mobility and flexibility to system managers and supervisors. [0132] Through this application, the user can interact with all the functions of registering people, companies, places, environments and devices, establishing the relationships between them and managing access authorizations. Finally, the application allows the user to monitor the access, as well as the incidence of alarms.
- the mobile application is the application through which management users interact with the system. It is a executable program that needs to be installed and licensed on a desktop / notebook machine with Windows operating system
- the mobile application is software that can be downloaded on mobile devices with an Android or iOS operating system that allows the user to make a remote request to the iptographed electronic key server, for exclusive use and protected by password, which allows access to the environments for previously authorized periods.
- the mobile APP allows communication with the Bluetooth lock even in a stand-alone scenario. Once communication is established and after checking the validity of the key, the user can operate the lock by unlocking and locking it.
- the same Mobile APP provides a feature for disarming and resetting the Bluetooth alarm center from a similar interface and with the same operating principle.
- the system also features the use of an alarm center that is arranged up to 100m away for direct connection between the alarm center and lock and up to (100m + 100m) away with the use of a switch or router, a bluetooth gateway which is installed up to 100m away from the switch or router where it will be connected and up to 10m away from the locks to which it provides bluetooth connectivity (BT range using an external antenna in an open indoor environment) and a bluetooth module arranged over a distance of up to 100m of a lock, due to the need for the bluetooth signal.
- BT range using an external antenna in an open indoor environment BT range using an external antenna in an open indoor environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
- Selective Calling Equipment (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/BR2019/050404 WO2021051174A1 (fr) | 2019-09-17 | 2019-09-17 | Système de gestion à distance appliqué à des fermetures électroniques avec contrôle d'accès par dispositif mobile |
BR112022004889A BR112022004889A2 (pt) | 2019-09-17 | 2019-09-17 | Sistema de gerenciamento remoto aplicado em fechaduras eletrônicas com controle de acesso via dispositivo móvel |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/BR2019/050404 WO2021051174A1 (fr) | 2019-09-17 | 2019-09-17 | Système de gestion à distance appliqué à des fermetures électroniques avec contrôle d'accès par dispositif mobile |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021051174A1 true WO2021051174A1 (fr) | 2021-03-25 |
Family
ID=74882942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/BR2019/050404 WO2021051174A1 (fr) | 2019-09-17 | 2019-09-17 | Système de gestion à distance appliqué à des fermetures électroniques avec contrôle d'accès par dispositif mobile |
Country Status (2)
Country | Link |
---|---|
BR (1) | BR112022004889A2 (fr) |
WO (1) | WO2021051174A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150027178A1 (en) * | 2013-07-26 | 2015-01-29 | Joseph Frank Scalisi | Smart lock systems and methods |
BR102016013149A2 (pt) * | 2016-06-08 | 2017-12-19 | Cezar Carvalho Nilton | Bluetooth cell phone access control system |
US10163289B2 (en) * | 2015-07-06 | 2018-12-25 | Acsys Ip Holding, Inc. | Systems and methods for secure lock systems with redundant access control |
US20190028487A1 (en) * | 2015-08-31 | 2019-01-24 | Kai Romer | Indirect Authorization Transport |
EP3454243A1 (fr) * | 2017-09-12 | 2019-03-13 | Bitwards Oy | Système d'exécution de jeton pour contrôle d'accès |
-
2019
- 2019-09-17 BR BR112022004889A patent/BR112022004889A2/pt unknown
- 2019-09-17 WO PCT/BR2019/050404 patent/WO2021051174A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150027178A1 (en) * | 2013-07-26 | 2015-01-29 | Joseph Frank Scalisi | Smart lock systems and methods |
US10163289B2 (en) * | 2015-07-06 | 2018-12-25 | Acsys Ip Holding, Inc. | Systems and methods for secure lock systems with redundant access control |
US20190028487A1 (en) * | 2015-08-31 | 2019-01-24 | Kai Romer | Indirect Authorization Transport |
BR102016013149A2 (pt) * | 2016-06-08 | 2017-12-19 | Cezar Carvalho Nilton | Bluetooth cell phone access control system |
EP3454243A1 (fr) * | 2017-09-12 | 2019-03-13 | Bitwards Oy | Système d'exécution de jeton pour contrôle d'accès |
Also Published As
Publication number | Publication date |
---|---|
BR112022004889A2 (pt) | 2022-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108027992B (zh) | 用于提供冗余访问通道的锁 | |
US11710362B2 (en) | Systems and methods for controlling access to a secured space | |
CN107889536B (zh) | 用于冗余接入控制的锁和方法 | |
US9672674B2 (en) | Systems and methods for secure lock systems with redundant access control | |
CN102750785B (zh) | Atm及atm的安全认证系统 | |
JP5686269B1 (ja) | 錠開閉装置及び錠開閉システム | |
CN202771546U (zh) | Atm及atm的安全认证系统 | |
CN102819881A (zh) | 精密仪器预约和使用管理系统 | |
CN109326036A (zh) | 锁具监控管理方法及系统 | |
JP2021156162A (ja) | 鍵システム | |
US20230274594A1 (en) | Systems, devices and methods for controlling access to a secure space | |
KR101933671B1 (ko) | 디지털 도어락의 전원 공급 시스템 | |
US10774569B1 (en) | Door security device | |
JP2005146755A (ja) | 電子錠管理システム、サーバ装置、方法、そのためのプログラム及び記録媒体 | |
WO2021051174A1 (fr) | Système de gestion à distance appliqué à des fermetures électroniques avec contrôle d'accès par dispositif mobile | |
US11982108B2 (en) | Security system having an electronic lock to control access to electronic devices | |
US11715339B1 (en) | Electronic lockbox with key retainer subassembly | |
GB2432025A (en) | Remote access control by way of authorisation data comunicated from a users mobile phone | |
CN112133003A (zh) | 多功能智慧杆机箱及其控制方法 | |
CA3087914A1 (fr) | Systemes, dispositifs et methodes pour controler l'acces a un espace securise | |
JP2010255396A (ja) | 仮設扉 | |
KR102251387B1 (ko) | 공공사용 공간의 룸용 도어락 인증 시스템 및 이에 사용되는 스마트 도어락 | |
KR20240110211A (ko) | 도어락과 연동되는 IoT 스마트 도어락 브릿지 디바이스 및 이를 포함한 공유 관리 플랫폼 | |
ES2537837B1 (es) | Sistema de gestión remota de acceso a espacios restringidos | |
CN116685086A (zh) | 基于大数据的远程在线智能管控柜及其控制系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19945806 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112022004889 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112022004889 Country of ref document: BR Kind code of ref document: A2 Effective date: 20220316 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19945806 Country of ref document: EP Kind code of ref document: A1 |