WO2022254260A1 - Electronic lock and implemantation process of said electronic lock - Google Patents

Electronic lock and implemantation process of said electronic lock Download PDF

Info

Publication number
WO2022254260A1
WO2022254260A1 PCT/IB2022/052035 IB2022052035W WO2022254260A1 WO 2022254260 A1 WO2022254260 A1 WO 2022254260A1 IB 2022052035 W IB2022052035 W IB 2022052035W WO 2022254260 A1 WO2022254260 A1 WO 2022254260A1
Authority
WO
WIPO (PCT)
Prior art keywords
coded data
lock
data
biometric data
operating device
Prior art date
Application number
PCT/IB2022/052035
Other languages
French (fr)
Inventor
Quang Nghia LE
Original Assignee
Le Quang Nghia
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Le Quang Nghia filed Critical Le Quang Nghia
Publication of WO2022254260A1 publication Critical patent/WO2022254260A1/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/06Controlling mechanically-operated bolts by electro-magnetically-operated detents
    • E05B47/0676Controlling mechanically-operated bolts by electro-magnetically-operated detents by disconnecting the handle
    • E05B47/0684Controlling mechanically-operated bolts by electro-magnetically-operated detents by disconnecting the handle radially
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0091Retrofittable electric locks, e.g. an electric module can be attached to an existing manual lock
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks
    • E05B2047/0095Mechanical aspects of locks controlled by telephone signals, e.g. by mobile phones
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • G07C2009/00785Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by light

Definitions

  • the present invention relates to an electronic lock and an implementation process said electronic lock of the type specified in the preamble to the first claim.
  • the present invention relates to an electronic lock, and an implementation process said electronic lock, which does not require a specific physical means of opening, such as, for example, a key or card, or a corresponding key or card, or which alternatively allows a mechanical lock to be converted into a lock which is at least partially electronically controlled.
  • most popular locks comprise at least one bolt operable by a physical key and configured to position itself within a compartment to prevent movement of a door relative to a seat or frame.
  • cylinder locks include a small rotor, or inner cylinder, connected to the bolt and held in place by bases that are positioned between the rotor and the stator, or rather the fixed part.
  • Each plinth is then pushed down by a spring, and beneath it is a plunger also known as a pin. Insertion of the correct key raises the pins to the level of the rotor, so that, at the same time, the bases are brought to the level of the stator and the cylinder can rotate, moving the bolt by means of the lever or cam to which it is attached.
  • keys which can be opened by means of plastic cards, or keycards, containing a digital signature used in electronic access control are known.
  • Keycards are usually almost rectangular in shape and can also serve as an identification card.
  • Keycard locks include, in addition to the latter, a reader capable of recognising the corresponding card when the card is swiped or inserted or simply placed in the vicinity of the sensor part of the reader.
  • the latter case in particular, is generally referred to as wireless keys.
  • the known technique described includes some important drawbacks.
  • all locks include a physical key that must correspond to a respective opening mechanism or code reader. Therefore, the opening or closing of any lock depends on whether or not one has said key.
  • electronic locks include mechatronic, remotely operable devices, i.e. actuators that react to electrical impulses sent by the control system. Therefore, if you have a conventional mechanical lock and want to convert it to an electronic one, the entire opening mechanism must be replaced. As well as being very costly, this is not always possible, since, for example, security doors are made up of purpose-built structures that may not be structurally compatible with mechanisms other than the original ones.
  • the technical task at the basis of the present invention is to devise an electronic lock and implementation process for said electronic lock capable of substantially obviating at least part of the aforementioned drawbacks.
  • a further important scope of the invention is to achieve an electronic lock and implementation process for said electronic lock that allows all keys in a user's possession to be available and usable, preventing the user from at least partially forgetting or, even worse, losing them.
  • a further task of the invention is to realize an electronic lock and implementation process for said electronic lock which allows a mechanical lock to be converted into an electronic lock in a simple, inexpensive manner and without requiring invasive changes to the door locking structure including the lock.
  • the Fig. 1 shows a simplified schematic of an example of an electronic lock control system according to the invention and of the relative implementation process
  • the Fig. 2 shows a longitudinal sectional view of the conversion device of an electronic lock according to the invention
  • the Fig. 3 illustrates a perspective view of the conversion device of an electronic lock according to the invention
  • the Fig. 4a is a view of the conversion device of an electronic lock according to the invention positioned in front of a conventional lock for installation
  • the Fig. 4b is a view of the device of Fig. 4a at the end of installation where the device is ready for use.
  • the measurements, values, shapes and geometric references (such as perpendicularity and parallelism), when associated with words like “about” or other similar terms such as “approximately” or “substantially”, are to be considered as except for measurement errors or inaccuracies due to production and/or manufacturing errors, and, above all, except for a slight divergence from the value, measurements, shape, or geometric reference with which it is associated.
  • these terms if associated with a value, preferably indicate a divergence of not more than 10% of the value.
  • treatment refers to the action and/or processes of a computer or similar electronic calculation device that manipulates and/or transforms data represented as physical, such as electronic quantities of registers of a computer system and/or memories in, other data similarly represented as physical quantities within computer systems, registers or other storage, transmission or information displaying devices.
  • lock 1 the electronic lock according to the invention is globally referred to as lock 1.
  • the lock 1 comprises, in summary, at least one operating device 2, a control device 3 and an access device 4.
  • the operating device 2 is the part of the lock 1 communicating with the mechanism for opening or closing a door. Therefore, the operating device 2 is configured to operate, on command, the door opening or closing mechanism.
  • the operating device 2 could simply comprise a mechatronic actuator capable of moving the mechanism when subjected to a given electrical stimulus.
  • the operating device 2 could thus be integrated within, for example, a door.
  • the operating device 2 could be adapted or integrated with the opening or closing mechanism of a door, i.e., for example, a latch.
  • the lock 1 could comprise, in a preferred but not exclusive embodiment, a conversion device 5.
  • the conversion device 5, if present, preferably comprises, or interacts directly with, the operating device 2. Further, it is substantially capable of enabling conversion of any mechanical door lock 100.
  • the lock 100 thus includes, at least, the input portion into which the key 101 is normally inserted.
  • the key 101 regardless of shape and size defines a stem 101a and a handle 101b.
  • the stem 101 a is the portion of the key 101 that connects the handle 101 b to the head of the key 101 that is capable of interacting with the internal mechanisms of the lock 100.
  • the shank 101 a may coincide with the head of the key 101 if the key 101 is a classic compact key 101 , for example a paracentric key.
  • the handle 101 b is the part that, generally, is gripped by the user to rotate the stem 101a, and thus the head of the key 101 , within the mechanism so as to operate the locking or unlocking of the lock 100.
  • the conversion device 5 is suitable for interacting with the handle 101 b of a key 101 already introduced into the keyhole of the lock 100.
  • the conversion device 5 comprises at least one casing 6.
  • the casing 6 is substantially a box element. It further defines a central axis 6a.
  • the central axis 6a is an axis passing through a back wall of the enclosure 6.
  • the enclosure 6 is suitable for covering the lock 100 so as to make it directly inaccessible from the side of the door on which the enclosure 6 is arranged.
  • the casing 6 may be secured to the door by conventional constraining means, bolting, nailing or otherwise.
  • the casing 6 is fixed to the door by non- resolvable constraining means or by gluing.
  • the casing 6 is superimposed on the lock 100 in such a way that the central axis 6a is aligned with the stem 101 a.
  • the conversion device 5 advantageously comprises other features.
  • the conversion device 5 further comprises a gripping device 7.
  • the gripping device 7 is preferably configured to engage the handle 101 b in such a way that the gripping device 7 and the handle 101 b are integrally constrained.
  • the gripping device 7 may comprise a gripper 70.
  • the gripper 70 defines, therefore, an adjustable opening at least transversely to the central axis 6a. This means that the gripper 70 can easily be adjusted to grip handles 101 b of different thicknesses.
  • the grippers 70 could also be adjustable along the central axis 6a in order to be able to move forward or backward with respect to the key 101 when the casing 6 is positioned on the door. This feature may be advantageous to make the grippers 70 compatible with any type of key 101 .
  • the device 5 further comprises manipulation means 8.
  • the manipulation means 8 are preferably integral with the gripping device 7. They are, therefore, loosely constrained to the casing 6 and rotatable about the central axis 6a. Therefore, the manipulation means 8 are nothing else than means for transmitting motion around the central axis 6a to the handle 101 b and thus to the entire key 101 .
  • the manipulation means 8 may, moreover, be accessible or inaccessible from the outside.
  • the manipulation means 8 are accessible from outside the housing 6 and are manually operable by a user.
  • the manipulation means 8 may be non-accessible and remotely operable. In any case, when the manipulation means 8 rotate about the central axis 6a, they drag the handle 101 b of the key 101 and operate the internal mechanism of the mechanical lock 100.
  • the conversion device 5 also comprises safety means 9.
  • the safety means 9, in general, are configured to block and/or unlock, when operated, the rotation of the manipulation means 8 with respect to the gripping device 7.
  • the nature of the safety means 9 may change depending on the conformation of the manipulation means 8.
  • the safety means 9 may comprise an obstruction element 90.
  • the obstruction element 90 is, therefore, configured to obstruct, on command, the rotation of the manipulation means 8 about the central axis 6a.
  • the safety means 9 may further include, in detail, the operating device 2.
  • the latter may be, in this configuration, configured to operate, on command, the obstruction element 90 so as to block or unlock the manipulation means 8 with respect to the housing 6.
  • the safety means 9 are preferably configured to block and/or unlock the rotation of the manipulation means 8 with respect to the gripping device 7 preferably when operated via the operating device 2.
  • the operating device 2 may be directly operatively connected to, or part of, the manipulation means 8 and may be configured to move the manipulation means 8, as well as to lock or unlock the manipulation means 8 and thus the gripping device 7.
  • the locking phase may simply coincide with the non-handling phase and the unlocking phase may coincide with the handling phase.
  • the operating device 2 may simply include a mechatronic actuator capable of moving the mechanism when subjected to a given electrical stimulus.
  • a mechatronic actuator capable of moving the mechanism when subjected to a given electrical stimulus.
  • mechanisms of this type are known in the current state of the art.
  • the conversion device 5, when arranged on a lock 100, may allow for simple implementation of the electronic lock 1 .
  • operating device 2 additionally comprises a reader 20. Therefore, it is configured to scan external images.
  • a reader 20 may be given by a common EAN or QR barcode reader.
  • the operating device 2 is configured to communicate with the outside world, for example in a network.
  • the operating device 2 may comprise connection means configured to allow transmission of the data scanned by the reader 20.
  • the operating device 2 may further comprise other components.
  • the operating device 2 may comprise power supply means operatively connected to the reader 20. If present, the power supply means are configured to autonomously power the operating device 2. In this way, there is no need to connect the latter to an external electrical network on which to depend. Furthermore, the power supply means are also connected to the connection means.
  • the operating device 2 may also comprise a burglary sensor.
  • the burglary sensor if present, is configured to detect tampering with said opening or closing mechanism.
  • the burglary sensor may visually and/or audibly signal a burglary attempt.
  • the burglar sensor may signal tampering to the control device 3.
  • the control device 3 is capable of remote communication with the operating device 2. Therefore, the control device 3 preferably also comprises connection means that enable network communication of the control device 3.
  • control device 3 comprises at least one database 30.
  • the database 30 is substantially a storage space within which one or more data may be recorded.
  • the database may be virtual, for example of the Cloud type, or may be a physical medium internal to the control device 3.
  • the first biometric data 10 is nothing other than data referring to a specific user referring to one or more physiological and/or behavioural characteristics.
  • biometric data may, as is known, correspond to simple fingerprints.
  • the database 30 also includes at least one first coded data 11.
  • the first coded data 11 is a data element that can be set or selected by the user himself. For example, it may be a word, or a phrase or other element that allows a means of encoding to be determined.
  • the first coded data 11 is periodically variable in such a way that it is, periodically, differentiated from the previous data.
  • the biometric data 10 and the first coded data 11 are associated, in the database 30, with the operating device 2. For example, the association may be made by defining an identification code of the operating device 2 associated with biometric data 10 and first coded data 11 .
  • the association may take place by means of a program, for example implemented as a smartphone application or PC interface through which the identification code of the operating device 2 and the biometric data 10 and first coded data 11 connected thereto may be registered, as is similarly the case when products are registered for warranty management.
  • a program for example implemented as a smartphone application or PC interface through which the identification code of the operating device 2 and the biometric data 10 and first coded data 11 connected thereto may be registered, as is similarly the case when products are registered for warranty management.
  • the control device 3 additionally comprises a computer 31.
  • the computer 31 is essentially an electronic device capable of processing and processing input data to realise output data.
  • the computer 31 is operatively connected to the database 30 and the reader 20.
  • the control device 3 may substantially realise a server to which the operating device 2 may have access and which may control the operating device 2 itself.
  • the computer 31 is configured to generate a second coded data 12.
  • the second coded data 12 is conceptually similar to the first coded data 11 . Therefore, the second coded data 12 is preferably also periodically variable. However, the second coded datum 12 is realised by the computer 31 itself and not by the user.
  • the second coded data 12 is also associated with the first biometric data 10 and the first coded data 11 .
  • the first coded data 11 and/or the second coded data 12 may be encrypted.
  • one or more of them is encrypted according to at least SHA-2 type algorithms.
  • the first encrypted data 11 and/or the second encrypted data 12 may be encrypted according to SHA 256 or even 516 algorithms.
  • such algorithms may be recorded on the database 30 and executed by the computer 31.
  • the access device 4 is capable of remote communication with the control device 3. Therefore, the access device 4 may also include connection means capable of allowing it to navigate the network. Furthermore, the access device 4 is preferably a mobile electronic device that is easily transportable by a user. For example, the access device 4 may be a smartphone, tablet or other similar device.
  • the access device 4 preferably comprises at least acquisition means 40.
  • the acquisition means 40 are configured to capture second biometric data 10' of a user.
  • the second biometric data 10' are substantially of the same type as the first biometric data 10. Therefore, they could coincide with, for example, a fingerprint and could be detected via touch systems by a device such as a smartphone.
  • the acquisition means 40 are capable of acquiring a third coded data 1T.
  • the third coded data element 11 ' is preferably of the same type as the first coded data element 11 . It may, therefore, as already mentioned correspond to a word, or a sentence or other.
  • the acquisition means 40 may include a physical or virtual keyboard suitable to allow typing by the user so that the latter can set the third coded data 11
  • the access device 4 further comprises, in addition, a display 41.
  • the display 41 is, as is known, a screen or equivalent configured to show one or more images.
  • the display 41 is suitable for at least allowing a symbolic code 13 to be shown.
  • the symbolic code 13 is nothing more than a code that encapsulates specific data. Thus, for example, it may be one of a choice between a QR code and an EAN barcode or other.
  • the symbolic code 13 is the result of processing by the control device 3.
  • the computer 31 is configured to receive the second biometric data 10' and the third coded data 11 ' and to generate the symbolic code 13 from the first biometric data 10, the first coded data 11 and the second coded data 12 whenever the second biometric data 10' and the third coded data 11 ' correspond respectively to the first biometric data 10 and the first coded data 11 .
  • the computer 31 composes the symbolic code 13 on the basis of the first biometric data 10, the first coded data 11 and the second coded data 12 and forwards it to the access device 4.
  • the access device 4 is advantageously configured to receive the symbolic code 13 from the control device 3 and show the symbolic code 13 on the display 41 .
  • the user can show the symbolic code 13 to the corresponding operating device 2 and retrieved within the database 30.
  • the operating device 2 is, in fact, advantageously configured to operate the opening or closing mechanism when the display 41 shows the symbolic code 13 generated by the computer 31 to the reader 20.
  • the computer 31 receives the information from the reader 20 and trivially compares the symbolic code 13 generated by the computer 31 with the symbolic code 13 shown by the display 41 . If the symbolic codes 13 match, the operating device 2 operates the door opening or closing mechanism.
  • the lock 1 essentially implements a two-factor authentication.
  • Such two-factor authentication is, in addition, transmitted via encrypted signals according to predetermined algorithms as described above.
  • the access device 4 preferably defines its own IP address 4a.
  • the IP address 4a may also be associated with a corresponding operating device 2, or corresponding first biometric data 10 and/or first coded data 11 , within the database 30.
  • the computer 31 may be configured to generate the symbolic code 13 exclusively when it recognises the IP address 4a.
  • the invention further comprises a novel process implementation of an electronic lock 1.
  • the process comprises at least one acquisition step, a forwarding step and a comparison step.
  • the second biometric data 10' and the third coded data 11 ' are acquired by the access device 4.
  • the same access device 4 could be used to configure the electronic lock 1 allowing the first biometric data 10' and the first coded data 11 ' to be acquired and associated with a specific operating device 2 and possibly a same IP address 4a.
  • the second biometric data 10' and the third coded data 11 ' are forwarded to the control device 3. Then, in the comparison phase, the second biometric data 10' and the third coded data 11 ' are compared with the first biometric data 10 and the first coded data 11 .
  • the procedure advantageously comprises a generation step in which the symbolic code 13 is generated. Then, the procedure advantageously comprises a sending step in which the symbolic code 13 is sent to the access device 4. Additionally, the process advantageously comprises a step in which the display 41 shows the symbolic code 13.
  • the process advantageously comprises a scanning step in which the reader 20 scans the display 41 and a verification step in which the computer 31 verifies that the symbolic code 13 shown on the display 41 matches the symbolic code 13 generated by it.
  • the process comprises an operating step in which the door opening or closing mechanism is operated if the symbolic code 13 matches, or rather if the previous verification step provides a positive result.
  • the lock 1 comprises a conversion device 5, it may be contemplated to operate in particular the safety means 9, via the operating device 2, and even more in detail the obstruction element 90.
  • procedure could also comprise a further verification step.
  • the computer 31 could verify that the IP address 4a of the access device 4 in use is associated with the operating device 2 and/or the first biometric data 10 and/or the first coded data 11 .
  • the process may comprise a further signalling step.
  • control device 3 could be operationally connected to a police station switchboard.
  • computer 31 could be configured to send alarm signals to the switchboard.
  • an alarm signal could be sent to the switchboard, via the computer 31 , if the symbolic code 13 shown on said display 41 does not correspond to the symbolic code 13 generated by the same computer 31 .
  • the alarm signal is sent if the symbolic code 13 is found not to correspond for at least two consecutive scans by said reader 20.
  • the invention may comprise, in a preferred but not exclusive embodiment, a novel process for converting a mechanical lock 100.
  • the process preferably comprises at least the constraining and engaging steps.
  • the casing 6 is constrained on the lock 100 including the key 101 such that the lock 100 and the key 101 are concealed. Further, the constraint is made such that the central axis 6a is aligned with the stem 101 a.
  • the gripping device 7 is engaged with the handle 101 b in such a way that the key 101 can rotate in solidarity with the gripping device 7 around the central axis 6a.
  • the conversion device 5 is already ready for use.
  • the invention additionally comprises a new implementation process of an electronic lock 1 .
  • the process comprises at least one acquisition step, a forwarding step and a comparison step.
  • the second biometric data 10' and the third coded data 11' are acquired by the access device 4.
  • the same access device 4 could be used to configure the electronic lock 1 allowing the first biometric data 10' and the first coded data 11 ' to be acquired and associated with a specific operating device 2 and possibly a same IP address 4a.
  • the second biometric data 10' and the third coded data 11 ' are forwarded to the control device 3. Then, in the comparison phase, the second biometric data 10' and the third coded data 11 ' are compared with the first biometric data 10 and the first coded data 11 .
  • the procedure advantageously comprises a generation step in which the symbolic code 13 is generated. Then, the procedure advantageously comprises a sending step in which the symbolic code 13 is sent to the access device 4. Additionally, the process advantageously comprises a step in which the display 41 shows the symbolic code 13.
  • the process advantageously comprises a scanning step in which the reader 20 scans the display 41 and a verification step in which the computer 31 verifies that the symbolic code 13 shown on the display 41 matches the symbolic code 13 generated by it.
  • the procedure comprises an operating step in which the door opening or closing mechanism is operated if the symbolic code 13 matches, i.e. if the previous verification step provides a positive result.
  • the process may also include a further verification step.
  • the computer 31 could verify that the IP address 4a of the access device 4 in use is associated with the operating device 2 and/or the first biometric data 10 and/or the first coded data 11 .
  • the process may comprise a further signalling step.
  • the control device 3 could be operationally connected to a police station switchboard.
  • the computer 31 could be configured to send alarm signals to the switchboard.
  • an alarm signal could be sent to the switchboard, via the computer 31 , if the symbolic code 13 shown on said display 41 does not correspond to the symbolic code 13 generated by the same computer 31 .
  • the alarm signal is sent if the symbolic code 13 is found not to correspond for at least two consecutive scans by said reader 20. In this way, the possibility of unnecessarily calling the police due to simple reading errors or due to incorrect selection of the operating device 2 by the user is reduced.
  • the electronic lock 1 , and implementation process thereof, according to the invention achieves important advantages.
  • the electronic lock 1 makes it possible to considerably reduce the size and weight of the keys for accessing the locks.
  • the lock 1 does not require physical keys but implements virtual keys that are generatable and usable by means of a simple smartphone, an object now extremely common in the life of each person.
  • Lock 1 and its implementation process make available and usable all the keys in a user's possession, preventing the user from forgetting or, even worse, losing them. In fact, it is very rare that a person loses their smartphone and it is possible, through the system implemented by lock 1 , to set up a set of virtual keys each associated to a specific operating device 2.
  • the lock 1 includes the conversion device, it is possible to transform a mechanical lock into an electronic one in a simple, inexpensive manner and without requiring invasive changes to the door locking structure that includes the lock.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Lock And Its Accessories (AREA)

Abstract

It is provided an electronic lock (1) comprising at least one operating device (2) configured to operate, on command, an opening or closing mechanism of a door and comprising an optical reader (20), a control device (3) including a database (30) including at least first biometric data (10) of a user and a first periodically variable coded data (11 ) associated with the operating device (2), a computer (31) operatively connected to the database (30) and the reader (20) and configured to generate a second periodically variable coded data (12) and associate it with the first biometric data (10) and the first coded data (11), an access device (4) and including acquisition means (40) configured to detect second biometric data (10') of a user and acquire a third coded data (11') settable by the user and a display (41), wherein the computer (31) is configured to receive the second biometric data (10') and the third coded data (11') and to generate a symbolic code (13) from first biometric data (10), first coded data (11) and second coded data (12) whenever the second biometric data (10') and third coded data (11') correspond to the first biometric data (10) and first coded data (11), wherein the access device (4) is configured to receive the symbolic code (13) and show it on the display (41), and wherein the operating device (2) is configured to operate the mechanism when the display (41) shows the symbolic code (13) generated by the computer (31) to the reader (20).

Description

DESCRIPTION
ELECTRONIC LOCK AND IMPLEMANTATION PROCESS OF SAID ELECTRONIC LOCK
The present invention relates to an electronic lock and an implementation process said electronic lock of the type specified in the preamble to the first claim.
In particular, the present invention relates to an electronic lock, and an implementation process said electronic lock, which does not require a specific physical means of opening, such as, for example, a key or card, or a corresponding key or card, or which alternatively allows a mechanical lock to be converted into a lock which is at least partially electronically controlled.
As is known, most popular locks comprise at least one bolt operable by a physical key and configured to position itself within a compartment to prevent movement of a door relative to a seat or frame.
For example, cylinder locks include a small rotor, or inner cylinder, connected to the bolt and held in place by bases that are positioned between the rotor and the stator, or rather the fixed part. Each plinth is then pushed down by a spring, and beneath it is a plunger also known as a pin. Insertion of the correct key raises the pins to the level of the rotor, so that, at the same time, the bases are brought to the level of the stator and the cylinder can rotate, moving the bolt by means of the lever or cam to which it is attached.
Therefore, in order to open a conventional door, it is necessary to have a key with a profile corresponding to the lock.
Other types of locks are also known.
For example, locks which can be opened by means of plastic cards, or keycards, containing a digital signature used in electronic access control are known. Keycards are usually almost rectangular in shape and can also serve as an identification card. There are several common types of keycards using, for example, barcodes, magnetic stripes, memory cards similar to smartcards but not capable of encryption, smartcards equipped with a microchip that can identify itself by means of cryptographic functions, and proximity cards equipped with RFID.
Keycard locks include, in addition to the latter, a reader capable of recognising the corresponding card when the card is swiped or inserted or simply placed in the vicinity of the sensor part of the reader. The latter case, in particular, is generally referred to as wireless keys. The known technique described includes some important drawbacks.
In particular, all locks include a physical key that must correspond to a respective opening mechanism or code reader. Therefore, the opening or closing of any lock depends on whether or not one has said key.
As is well known, keys are often lost or forgotten. Or, especially in the case of cards, which are often stored in wallets, they can be stolen.
In addition, if you have several keys to different locks, it can be inconvenient to always have each key to hand. In this sense, it is not unusual for bunches of keys to be very bulky and heavy. Furthermore, in the case of cards, these can take up too much space in the wallet, making it difficult, if not impossible, to have several keys available at all times.
In addition, electronic locks include mechatronic, remotely operable devices, i.e. actuators that react to electrical impulses sent by the control system. Therefore, if you have a conventional mechanical lock and want to convert it to an electronic one, the entire opening mechanism must be replaced. As well as being very costly, this is not always possible, since, for example, security doors are made up of purpose-built structures that may not be structurally compatible with mechanisms other than the original ones.
In this situation, the technical task at the basis of the present invention is to devise an electronic lock and implementation process for said electronic lock capable of substantially obviating at least part of the aforementioned drawbacks.
In the context of said technical task, it is an important scope of the invention to obtain an electronic lock and process of implementation of said electronic lock which allows to substantially reduce the size and weight of the keys for accessing the locks.
A further important scope of the invention is to achieve an electronic lock and implementation process for said electronic lock that allows all keys in a user's possession to be available and usable, preventing the user from at least partially forgetting or, even worse, losing them.
In addition, a further task of the invention is to realize an electronic lock and implementation process for said electronic lock which allows a mechanical lock to be converted into an electronic lock in a simple, inexpensive manner and without requiring invasive changes to the door locking structure including the lock.
The specified technical task and purposes are achieved by an electronic lock, and related implementation process of said electronic lock, as claimed in the appended claim 1 . Preferred technical solutions are disclosed in the dependent claims.
The features and advantages of the invention are hereinafter clarified by the detailed description of preferred implementations of the invention, with reference to the annexed drawings, wherein: the Fig. 1 shows a simplified schematic of an example of an electronic lock control system according to the invention and of the relative implementation process; the Fig. 2 shows a longitudinal sectional view of the conversion device of an electronic lock according to the invention; the Fig. 3 illustrates a perspective view of the conversion device of an electronic lock according to the invention; the Fig. 4a is a view of the conversion device of an electronic lock according to the invention positioned in front of a conventional lock for installation; and the Fig. 4b is a view of the device of Fig. 4a at the end of installation where the device is ready for use.
In the present document, the measurements, values, shapes and geometric references (such as perpendicularity and parallelism), when associated with words like “about” or other similar terms such as “approximately” or “substantially”, are to be considered as except for measurement errors or inaccuracies due to production and/or manufacturing errors, and, above all, except for a slight divergence from the value, measurements, shape, or geometric reference with which it is associated. For instance, these terms, if associated with a value, preferably indicate a divergence of not more than 10% of the value.
Moreover, when used, terms such as “first”, “second”, “higher”, “lower”, “main” and “secondary” do not necessarily identify an order, a priority of relationship or a relative position, but can simply be used to clearly distinguish between their different components.
Unless otherwise specified, as results in the following discussions, terms such as “treatment”, “computing”, “determination”, “calculation”, or similar, refer to the action and/or processes of a computer or similar electronic calculation device that manipulates and/or transforms data represented as physical, such as electronic quantities of registers of a computer system and/or memories in, other data similarly represented as physical quantities within computer systems, registers or other storage, transmission or information displaying devices.
The measurements and data reported in this text are to be considered, unless otherwise indicated, as performed in the International Standard Atmosphere ICAO (ISO 2533:1975).
With reference to the Figures, the electronic lock according to the invention is globally referred to as lock 1.
The lock 1 comprises, in summary, at least one operating device 2, a control device 3 and an access device 4. The operating device 2 is the part of the lock 1 communicating with the mechanism for opening or closing a door. Therefore, the operating device 2 is configured to operate, on command, the door opening or closing mechanism.
In this respect, the operating device 2 could simply comprise a mechatronic actuator capable of moving the mechanism when subjected to a given electrical stimulus. The operating device 2 could thus be integrated within, for example, a door. In general, the operating device 2 could be adapted or integrated with the opening or closing mechanism of a door, i.e., for example, a latch.
Or, the lock 1 could comprise, in a preferred but not exclusive embodiment, a conversion device 5. The conversion device 5, if present, preferably comprises, or interacts directly with, the operating device 2. Further, it is substantially capable of enabling conversion of any mechanical door lock 100.
The lock 100 thus includes, at least, the input portion into which the key 101 is normally inserted. The key 101 , regardless of shape and size defines a stem 101a and a handle 101b. The stem 101 a is the portion of the key 101 that connects the handle 101 b to the head of the key 101 that is capable of interacting with the internal mechanisms of the lock 100.
Alternatively, the shank 101 a may coincide with the head of the key 101 if the key 101 is a classic compact key 101 , for example a paracentric key.
The handle 101 b is the part that, generally, is gripped by the user to rotate the stem 101a, and thus the head of the key 101 , within the mechanism so as to operate the locking or unlocking of the lock 100.
In particular, the conversion device 5 is suitable for interacting with the handle 101 b of a key 101 already introduced into the keyhole of the lock 100.
In this respect, the conversion device 5 comprises at least one casing 6.
The casing 6 is substantially a box element. It further defines a central axis 6a. The central axis 6a is an axis passing through a back wall of the enclosure 6.
The latter is configured to be superimposed on the lock 100. Therefore, the enclosure 6 is suitable for covering the lock 100 so as to make it directly inaccessible from the side of the door on which the enclosure 6 is arranged.
Of course, the casing 6 may be secured to the door by conventional constraining means, bolting, nailing or otherwise. Preferably, the casing 6 is fixed to the door by non- resolvable constraining means or by gluing.
Thus, in particular, the casing 6 is superimposed on the lock 100 in such a way that the central axis 6a is aligned with the stem 101 a.
The conversion device 5 advantageously comprises other features.
Indeed, the conversion device 5 further comprises a gripping device 7.
The gripping device 7 is preferably configured to engage the handle 101 b in such a way that the gripping device 7 and the handle 101 b are integrally constrained. In detail, the gripping device 7 may comprise a gripper 70. The gripper 70 defines, therefore, an adjustable opening at least transversely to the central axis 6a. This means that the gripper 70 can easily be adjusted to grip handles 101 b of different thicknesses. The grippers 70 could also be adjustable along the central axis 6a in order to be able to move forward or backward with respect to the key 101 when the casing 6 is positioned on the door. This feature may be advantageous to make the grippers 70 compatible with any type of key 101 .
The device 5 further comprises manipulation means 8.
The manipulation means 8 are preferably integral with the gripping device 7. They are, therefore, loosely constrained to the casing 6 and rotatable about the central axis 6a. Therefore, the manipulation means 8 are nothing else than means for transmitting motion around the central axis 6a to the handle 101 b and thus to the entire key 101 . The manipulation means 8 may, moreover, be accessible or inaccessible from the outside.
For example, in a preferred but not exclusive embodiment, the manipulation means 8 are accessible from outside the housing 6 and are manually operable by a user.
An example of this type of manipulation means 8 is shown in Figs. 2-4b.
Alternatively, the manipulation means 8 may be non-accessible and remotely operable. In any case, when the manipulation means 8 rotate about the central axis 6a, they drag the handle 101 b of the key 101 and operate the internal mechanism of the mechanical lock 100.
Advantageously, the conversion device 5 also comprises safety means 9.
The safety means 9, in general, are configured to block and/or unlock, when operated, the rotation of the manipulation means 8 with respect to the gripping device 7.
The nature of the safety means 9 may change depending on the conformation of the manipulation means 8.
If the latter are manual, for example, the safety means 9 may comprise an obstruction element 90.
The obstruction element 90 is, therefore, configured to obstruct, on command, the rotation of the manipulation means 8 about the central axis 6a. Thus, the safety means 9 may further include, in detail, the operating device 2. The latter may be, in this configuration, configured to operate, on command, the obstruction element 90 so as to block or unlock the manipulation means 8 with respect to the housing 6.
Thus, the safety means 9 are preferably configured to block and/or unlock the rotation of the manipulation means 8 with respect to the gripping device 7 preferably when operated via the operating device 2.
Or, if the manipulation means 8 are inaccessible from the outside, the operating device 2 may be directly operatively connected to, or part of, the manipulation means 8 and may be configured to move the manipulation means 8, as well as to lock or unlock the manipulation means 8 and thus the gripping device 7. In other words, the locking phase may simply coincide with the non-handling phase and the unlocking phase may coincide with the handling phase.
In this regard, the operating device 2 may simply include a mechatronic actuator capable of moving the mechanism when subjected to a given electrical stimulus. In any case, mechanisms of this type are known in the current state of the art.
The conversion device 5, when arranged on a lock 100, may allow for simple implementation of the electronic lock 1 .
In any embodiment, i.e. with operating device 2 integrated into the door, or adapted to the door, or even part of, or interacting with, conversion device 5, operating device 2 additionally comprises a reader 20. Therefore, it is configured to scan external images. An example of a reader 20 may be given by a common EAN or QR barcode reader. Furthermore, the operating device 2 is configured to communicate with the outside world, for example in a network. For this, the operating device 2 may comprise connection means configured to allow transmission of the data scanned by the reader 20.
In addition, the operating device 2 may further comprise other components.
For example, the operating device 2 may comprise power supply means operatively connected to the reader 20. If present, the power supply means are configured to autonomously power the operating device 2. In this way, there is no need to connect the latter to an external electrical network on which to depend. Furthermore, the power supply means are also connected to the connection means.
In addition, the operating device 2 may also comprise a burglary sensor. The burglary sensor, if present, is configured to detect tampering with said opening or closing mechanism. Thus, the burglary sensor may visually and/or audibly signal a burglary attempt. Or, the burglar sensor may signal tampering to the control device 3.
The control device 3 is capable of remote communication with the operating device 2. Therefore, the control device 3 preferably also comprises connection means that enable network communication of the control device 3.
In particular, further, the control device 3 comprises at least one database 30. The database 30 is substantially a storage space within which one or more data may be recorded. The database may be virtual, for example of the Cloud type, or may be a physical medium internal to the control device 3.
The database 30, in any case, advantageously includes at least first biometric data 10 of a user. The first biometric data 10 is nothing other than data referring to a specific user referring to one or more physiological and/or behavioural characteristics. For example, biometric data may, as is known, correspond to simple fingerprints.
The database 30 also includes at least one first coded data 11.
The first coded data 11 is a data element that can be set or selected by the user himself. For example, it may be a word, or a phrase or other element that allows a means of encoding to be determined. Advantageously, the first coded data 11 is periodically variable in such a way that it is, periodically, differentiated from the previous data. Thus, the biometric data 10 and the first coded data 11 are associated, in the database 30, with the operating device 2. For example, the association may be made by defining an identification code of the operating device 2 associated with biometric data 10 and first coded data 11 . The association may take place by means of a program, for example implemented as a smartphone application or PC interface through which the identification code of the operating device 2 and the biometric data 10 and first coded data 11 connected thereto may be registered, as is similarly the case when products are registered for warranty management.
The control device 3 additionally comprises a computer 31. The computer 31 is essentially an electronic device capable of processing and processing input data to realise output data. In particular, the computer 31 is operatively connected to the database 30 and the reader 20. Thus, the control device 3 may substantially realise a server to which the operating device 2 may have access and which may control the operating device 2 itself.
Advantageously, the computer 31 is configured to generate a second coded data 12. The second coded data 12 is conceptually similar to the first coded data 11 . Therefore, the second coded data 12 is preferably also periodically variable. However, the second coded datum 12 is realised by the computer 31 itself and not by the user.
Thus, the second coded data 12 is also associated with the first biometric data 10 and the first coded data 11 . Even more in detail, the first coded data 11 and/or the second coded data 12 may be encrypted. Preferably, one or more of them is encrypted according to at least SHA-2 type algorithms. For example, the first encrypted data 11 and/or the second encrypted data 12 may be encrypted according to SHA 256 or even 516 algorithms. Of course, such algorithms may be recorded on the database 30 and executed by the computer 31.
The access device 4 is capable of remote communication with the control device 3. Therefore, the access device 4 may also include connection means capable of allowing it to navigate the network. Furthermore, the access device 4 is preferably a mobile electronic device that is easily transportable by a user. For example, the access device 4 may be a smartphone, tablet or other similar device.
In any case, the access device 4 preferably comprises at least acquisition means 40. The acquisition means 40 are configured to capture second biometric data 10' of a user.
The second biometric data 10' are substantially of the same type as the first biometric data 10. Therefore, they could coincide with, for example, a fingerprint and could be detected via touch systems by a device such as a smartphone.
Furthermore, the acquisition means 40 are capable of acquiring a third coded data 1T. The third coded data element 11 ' is preferably of the same type as the first coded data element 11 . It may, therefore, as already mentioned correspond to a word, or a sentence or other. For example, therefore, the acquisition means 40 may include a physical or virtual keyboard suitable to allow typing by the user so that the latter can set the third coded data 11
The access device 4 further comprises, in addition, a display 41. The display 41 is, as is known, a screen or equivalent configured to show one or more images.
In particular, advantageously, the display 41 is suitable for at least allowing a symbolic code 13 to be shown.
The symbolic code 13 is nothing more than a code that encapsulates specific data. Thus, for example, it may be one of a choice between a QR code and an EAN barcode or other.
In particular, the symbolic code 13 is the result of processing by the control device 3.
In fact, advantageously, the computer 31 is configured to receive the second biometric data 10' and the third coded data 11 ' and to generate the symbolic code 13 from the first biometric data 10, the first coded data 11 and the second coded data 12 whenever the second biometric data 10' and the third coded data 11 ' correspond respectively to the first biometric data 10 and the first coded data 11 .
In other words, once the data has been acquired by the acquisition means 40 of the access device 4, such data is sent over the network to the computer 31 which consults the database 30 and finds the data and the operating device 2, or possibly the operating device s 2 from which the correct one, corresponding to the data acquired, must be selected.
Then, the computer 31 composes the symbolic code 13 on the basis of the first biometric data 10, the first coded data 11 and the second coded data 12 and forwards it to the access device 4. Indeed, the access device 4 is advantageously configured to receive the symbolic code 13 from the control device 3 and show the symbolic code 13 on the display 41 .
Once the symbolic code 13 appears on the display, the user can show the symbolic code 13 to the corresponding operating device 2 and retrieved within the database 30. The operating device 2 is, in fact, advantageously configured to operate the opening or closing mechanism when the display 41 shows the symbolic code 13 generated by the computer 31 to the reader 20.
Thus, the computer 31 receives the information from the reader 20 and trivially compares the symbolic code 13 generated by the computer 31 with the symbolic code 13 shown by the display 41 . If the symbolic codes 13 match, the operating device 2 operates the door opening or closing mechanism.
Thus, the lock 1 essentially implements a two-factor authentication. Such two-factor authentication is, in addition, transmitted via encrypted signals according to predetermined algorithms as described above. Of course, in addition to the above, the access device 4 preferably defines its own IP address 4a.
The IP address 4a may also be associated with a corresponding operating device 2, or corresponding first biometric data 10 and/or first coded data 11 , within the database 30. Thus, the computer 31 may be configured to generate the symbolic code 13 exclusively when it recognises the IP address 4a.
This means that, essentially, the user connects a specific access device 4 to the control device 3 in order to activate the operating device 2.
The invention further comprises a novel process implementation of an electronic lock 1. The process comprises at least one acquisition step, a forwarding step and a comparison step.
In the acquisition step, the second biometric data 10' and the third coded data 11 ' are acquired by the access device 4. Of course, in a preliminary setup phase, the same access device 4 could be used to configure the electronic lock 1 allowing the first biometric data 10' and the first coded data 11 ' to be acquired and associated with a specific operating device 2 and possibly a same IP address 4a.
In the forwarding phase, the second biometric data 10' and the third coded data 11 ' are forwarded to the control device 3. Then, in the comparison phase, the second biometric data 10' and the third coded data 11 ' are compared with the first biometric data 10 and the first coded data 11 .
If the second biometric data 10' and the third coded data 11' are found to correspond with the first biometric data 10 and the first coded data 11 , the procedure advantageously comprises a generation step in which the symbolic code 13 is generated. Then, the procedure advantageously comprises a sending step in which the symbolic code 13 is sent to the access device 4. Additionally, the process advantageously comprises a step in which the display 41 shows the symbolic code 13.
Thus, the process advantageously comprises a scanning step in which the reader 20 scans the display 41 and a verification step in which the computer 31 verifies that the symbolic code 13 shown on the display 41 matches the symbolic code 13 generated by it.
In conclusion, the process comprises an operating step in which the door opening or closing mechanism is operated if the symbolic code 13 matches, or rather if the previous verification step provides a positive result. In the operating step therefore, if the lock 1 comprises a conversion device 5, it may be contemplated to operate in particular the safety means 9, via the operating device 2, and even more in detail the obstruction element 90.
Of course, the procedure could also comprise a further verification step.
In this case, for example, during the comparison phase, the computer 31 could verify that the IP address 4a of the access device 4 in use is associated with the operating device 2 and/or the first biometric data 10 and/or the first coded data 11 .
Furthermore, the process may comprise a further signalling step.
In this regard, the control device 3 could be operationally connected to a police station switchboard. Thus, the computer 31 could be configured to send alarm signals to the switchboard.
Thus, advantageously, in the signalling phase an alarm signal could be sent to the switchboard, via the computer 31 , if the symbolic code 13 shown on said display 41 does not correspond to the symbolic code 13 generated by the same computer 31 .
In particular, preferably, the alarm signal is sent if the symbolic code 13 is found not to correspond for at least two consecutive scans by said reader 20. In this way, the possibility of unnecessarily calling law enforcement agencies due to simple reading errors or due to incorrect selection of the operating device 2 by the user is reduced. Furthermore, the invention may comprise, in a preferred but not exclusive embodiment, a novel process for converting a mechanical lock 100. The process preferably comprises at least the constraining and engaging steps.
In the constraining step, the casing 6 is constrained on the lock 100 including the key 101 such that the lock 100 and the key 101 are concealed. Further, the constraint is made such that the central axis 6a is aligned with the stem 101 a.
In the coupling step, the gripping device 7 is engaged with the handle 101 b in such a way that the key 101 can rotate in solidarity with the gripping device 7 around the central axis 6a.
Essentially, therefore, the conversion device 5 is already ready for use.
The invention additionally comprises a new implementation process of an electronic lock 1 . The process comprises at least one acquisition step, a forwarding step and a comparison step.
In the acquisition step, the second biometric data 10' and the third coded data 11' are acquired by the access device 4. Of course, in a preliminary setup phase, the same access device 4 could be used to configure the electronic lock 1 allowing the first biometric data 10' and the first coded data 11 ' to be acquired and associated with a specific operating device 2 and possibly a same IP address 4a.
In the forwarding phase, the second biometric data 10' and the third coded data 11 ' are forwarded to the control device 3. Then, in the comparison phase, the second biometric data 10' and the third coded data 11 ' are compared with the first biometric data 10 and the first coded data 11 .
If the second biometric data 10' and the third coded data 11' are found to correspond with the first biometric data 10 and the first coded data 11 , the procedure advantageously comprises a generation step in which the symbolic code 13 is generated. Then, the procedure advantageously comprises a sending step in which the symbolic code 13 is sent to the access device 4. Additionally, the process advantageously comprises a step in which the display 41 shows the symbolic code 13.
Thus, the process advantageously comprises a scanning step in which the reader 20 scans the display 41 and a verification step in which the computer 31 verifies that the symbolic code 13 shown on the display 41 matches the symbolic code 13 generated by it.
In conclusion, the procedure comprises an operating step in which the door opening or closing mechanism is operated if the symbolic code 13 matches, i.e. if the previous verification step provides a positive result. Of course, the process may also include a further verification step.
In this case, for example, during the comparison step, the computer 31 could verify that the IP address 4a of the access device 4 in use is associated with the operating device 2 and/or the first biometric data 10 and/or the first coded data 11 .
Furthermore, the process may comprise a further signalling step. In this respect, the control device 3 could be operationally connected to a police station switchboard. Thus, the computer 31 could be configured to send alarm signals to the switchboard.
Thus, advantageously, in the signalling phase an alarm signal could be sent to the switchboard, via the computer 31 , if the symbolic code 13 shown on said display 41 does not correspond to the symbolic code 13 generated by the same computer 31 .
In particular, preferably, the alarm signal is sent if the symbolic code 13 is found not to correspond for at least two consecutive scans by said reader 20. In this way, the possibility of unnecessarily calling the police due to simple reading errors or due to incorrect selection of the operating device 2 by the user is reduced. The electronic lock 1 , and implementation process thereof, according to the invention achieves important advantages.
In fact, the electronic lock 1 , and the implementation process thereof, make it possible to considerably reduce the size and weight of the keys for accessing the locks.
In particular, the lock 1 does not require physical keys but implements virtual keys that are generatable and usable by means of a simple smartphone, an object now extremely common in the life of each person.
In addition, Lock 1 and its implementation process make available and usable all the keys in a user's possession, preventing the user from forgetting or, even worse, losing them. In fact, it is very rare that a person loses their smartphone and it is possible, through the system implemented by lock 1 , to set up a set of virtual keys each associated to a specific operating device 2.
It is therefore sufficient for the user to select the operating device 2 which he intends to activate, for example by means of a graphical interface which can be easily realised with an application, in order to initialise the implementation process as described above. In conclusion, if the lock 1 includes the conversion device, it is possible to transform a mechanical lock into an electronic one in a simple, inexpensive manner and without requiring invasive changes to the door locking structure that includes the lock.
The invention is susceptible to variations within the scope of the inventive concept as defined by the claims.
Within this scope, all details are substitutable by equivalent elements and the materials, shapes and dimensions can be any.

Claims

1. Electronic lock (1) comprising:
- at least one operating device (2) configured to operate, on command, an opening or closing mechanism of a door and including an optical reader (20) configured to scan external images,
- a control device (3) capable of communicating remotely with said operating device (2) and comprising:
- a database (30) including at least first biometric data (10) of a user and a first periodically variable coded data (11) associated with said operating device (2),
- a computer (31) operatively connected to said database (30) and said reader (20) and configured to generate a second periodically variable coded data (12) and associate said second coded data (12) with said first biometric data (10) and said first coded data (11),
- an access device (4) suitable for communicating remotely with said control device (3) and including:
- a acquisition means (40) configured to capture second biometric data (10') of a user and capture a third coded data (11 ') settable by said user,
- a display (41 ) configured to show one or more images, and characterised by that
- said computer (31) is configured to receive said second biometric data (10') and said third coded data (11 ') and to generate a symbolic code (13) from said first biometric data (10), said first coded data (11 ) and said second coded data (12) whenever said second biometric data (10') and said third coded data (11') correspond to said first biometric data (10) and said first coded data (11 ),
- said access device (4) is configured to receive from said control device (3) said symbolic code (13) and to show said symbolic code (13) on said display (41 ), and
- said operating device (2) is configured to operate said opening or closing mechanism when said display (41 ) shows to said reader (20) said symbolic code (13) generated by said computer (31).
2. Lock (1) according to any one of the preceding claims, wherein said access device (4) defines an own IP address (4a) associated with said operating device (2) in said database (30) and said computer (31 ) is configured to generate said symbolic code (13) exclusively when it recognizes said IP address (4a).
3. Lock (1 ) according to claim 1 , wherein said first coded data (11 ) and/or said second coded data (12) are encrypted according to algorithms of at least SHA-2 type.
4. Lock (1 ) according to any one of the preceding claims, wherein said database (30) defines a shared data structure of blockchain type.
5. Lock (1 ) according to any one of the preceding claims, wherein said symbolic code (13) is one at a choice between a QR code and a barcode.
6. Lock (1 ) according to any one of the preceding claims, wherein said operating device (2) comprises power means operatively connected to said reader (20) and configured to autonomously power said operating device (2).
7. Lock (1 ) according to any one of the preceding claims, wherein said operating device (2) comprises a burglar-proof sensor configured to detect tampering with said opening or closing mechanism and to report said tampering to said control device (3).
8. Lock (1) according to any one of the preceding claims, comprising a conversion device (5) including:
- a casing (6) defining a central axis (6a) and configured to be superimposed on a mechanical lock (100) of a door comprising a key (101) defining a stem (101a) and a handle (101 b) in such a way that said central axis (6a) is aligned with said stem (101 a), - a gripping device (7) configured to engage said handle (101 b) in such a way that said gripping device (7) and said handle (101 b) are constrained integrally,
- manipulation means (8) integral to said gripping device (7), firmly constrained to said housing (6) and rotatable about said central axis (6a), - safety means (9) including said operating device (2) and configured to block and/or unlock, when operated by said operating device (2), the rotation of said manipulation means (8) with respect to said gripping device (7).
9. Lock (1 ) according to claim 8, wherein said gripping device (7) comprises a gripper (70) whose opening is adjustable at least transversely to said central axis (6a).
10. Lock (1 ) according to any one of claims 8-9, wherein said safety means (9) comprise at least one obstruction element (90) configured to obstruct, on command, the rotation of said manipulation means (8) about said central axis (6a) and said operating device (2) is configured to operate, on command, said obstruction element (90) so as to lock or unlock said manipulation means (8) with respect to said casing (6).
11. Implementation process an electronic lock (1) according to any one of the preceding claims, comprising at least the steps of:
- acquiring by means of said access device (4) said second biometric data (1 O') and said third coded data (1 ),
- forwarding said second biometric data (10') and said third coded data (11') to said control device (3),
- comparing said second biometric data (10') and said third coded data (11') with, respectively, said first biometric data (10) and said first coded data (11 ), and characterised by comprising
- generating said symbolic code (13) when said second biometric data (10') and said third codified data (11 ') correspond respectively with said first biometric data (10) and said first codified data (11 ),
- sending said symbolic code (13) to said access device (4),
- showing said symbolic code (13) on said display (41 ),
- scanning said display (41 ) with said reader (20), - verifying that said symbolic code (13) shown on said display (41 ) corresponds to said generated symbolic code (13),
- operating said door opening or closing mechanism if said symbolic code (13) matches.
12. Process according to at least claims 11 and 2, further comprising verifying that said IP address (4a) is associated with said operating device (2) and/or said first biometric data (10) and/or said first coded data (11 ).
13. Process according to any one of claims 11 -12, wherein said control device (3) is operatively connected to a switchboard of a police station, and said process further comprising the steps of:
- sending an alarm signal to said switchboard, by means of said computer (31 ), if said symbolic code (13) shown on said display (41 ) does not correspond to said symbolic code (13) generated by said computer (31) for at least two consecutive scans by said reader (20).
14. Process for converting a mechanical lock (100) comprising a lock (1) according to any one of claims 8-10, characterized by comprising at least the steps of:
- constraining said housing (6) to said lock (100) including said key (101 ) in such a way that said lock (100) and said key (101) are concealed and said centre stem (6a) is aligned with said shank (101a), and
- engaging said gripping device (7) to said handle (101 b) in such a way that said key (101 ) can rotate integral with said gripping device (7) around said central axis (6a).
PCT/IB2022/052035 2021-06-01 2022-03-08 Electronic lock and implemantation process of said electronic lock WO2022254260A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IT202100014321 2021-06-01
IT102021000014321 2021-06-01

Publications (1)

Publication Number Publication Date
WO2022254260A1 true WO2022254260A1 (en) 2022-12-08

Family

ID=77519602

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2022/052035 WO2022254260A1 (en) 2021-06-01 2022-03-08 Electronic lock and implemantation process of said electronic lock

Country Status (1)

Country Link
WO (1) WO2022254260A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107945342A (en) * 2017-12-04 2018-04-20 郗瑛琦 A kind of application method of information system and its control method, box for material circulation and logistics tray
US10185921B1 (en) * 2015-06-29 2019-01-22 Good2Go, Inc. Facility and resource access system
US20200349786A1 (en) * 2017-09-28 2020-11-05 Gate Labs Inc. Access management system
IT201900011634A1 (en) * 2019-07-12 2021-01-12 Matichotels Srl Access release system of a structure and associated method
US10991240B2 (en) * 2015-10-10 2021-04-27 Videx, Inc. Electronic access control based on optical codes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10185921B1 (en) * 2015-06-29 2019-01-22 Good2Go, Inc. Facility and resource access system
US10991240B2 (en) * 2015-10-10 2021-04-27 Videx, Inc. Electronic access control based on optical codes
US20200349786A1 (en) * 2017-09-28 2020-11-05 Gate Labs Inc. Access management system
CN107945342A (en) * 2017-12-04 2018-04-20 郗瑛琦 A kind of application method of information system and its control method, box for material circulation and logistics tray
IT201900011634A1 (en) * 2019-07-12 2021-01-12 Matichotels Srl Access release system of a structure and associated method

Similar Documents

Publication Publication Date Title
US7218202B2 (en) Biometric key
US8952781B2 (en) Method and apparatus for access control using dual biometric authentication
US20080024272A1 (en) Biometric authentication lock machine
US20050077995A1 (en) Universal key security method and system
EP2172608B1 (en) Method for identifying keys for controlling locks
US20050226475A1 (en) Method of, and system for, accessing a home or dwelling
JP2006257871A (en) Biometric key
US20070234052A1 (en) Electromechanical lock system
CN101116114A (en) Improved security device
US20190180543A1 (en) Wireless Biometrics-Based Locking System
Teh et al. NFC smartphone based access control system using information hiding
WO2007043667A1 (en) Double key structure
WO2022254260A1 (en) Electronic lock and implemantation process of said electronic lock
JP2005036523A (en) Electronic lock control system and method, and portable information terminal and authentication device used for the same
US11893846B2 (en) Devices, systems, apparatuses, and methods for smart cam locks and key lock boxes
US20210407240A1 (en) Fingerprint Security System
Dewangan et al. A review on secured bank locker system using finger print, image and RFID technique
JP3391783B1 (en) Digital locking device
JP2004250952A (en) Locking/unlocking device of cabinet door
KR102251387B1 (en) Door lock authentication system for using room of public use space and Smart door lock thereof
JP3388735B2 (en) Locking device
KR100236407B1 (en) Locker and recording apparatus therewith
Sunitha et al. Biometric Door Access System Using Arduino
Gupta et al. A Cost Effective IoT-based Solution for Biometric Security Systems in Blood Banks
JP5120138B2 (en) Security equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22715374

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE