WO2012073265A1 - Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method - Google Patents

Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method Download PDF

Info

Publication number
WO2012073265A1
WO2012073265A1 PCT/IT2010/000483 IT2010000483W WO2012073265A1 WO 2012073265 A1 WO2012073265 A1 WO 2012073265A1 IT 2010000483 W IT2010000483 W IT 2010000483W WO 2012073265 A1 WO2012073265 A1 WO 2012073265A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
string
data
recipient
keys
Prior art date
Application number
PCT/IT2010/000483
Other languages
French (fr)
Other versions
WO2012073265A8 (en
Inventor
Rocco Vitali
Gianni Fantini
Alberto Andrini
Original Assignee
Cisa S.P.A
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisa S.P.A filed Critical Cisa S.P.A
Priority to PCT/IT2010/000483 priority Critical patent/WO2012073265A1/en
Publication of WO2012073265A1 publication Critical patent/WO2012073265A1/en
Publication of WO2012073265A8 publication Critical patent/WO2012073265A8/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/0088Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed centrally
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like

Definitions

  • the present invention relates to a method for the control and management of keys for access to spaces delimited by electronic locks and the like.
  • the present invention also relates to a device that can be enabled as a key according to the method.
  • electrostatic lock is used to reference a stand-alone device (i.e., a device that operates independently for example with respect to the electrical mains) which is battery-powered and is adapted to control the opening of doors: it can be installed easily on the leaf of doors, including existing doors, and requires no wiring.
  • These devices can be associated with keys of various kinds: contactless cards, magnetic cards, chip-cards and other remote control devices.
  • the main technical reference subject for the present invention is the subject of the inherent characteristics of contactless keys.
  • a string encoded on the key is read (by the device): if the string contains the authorizations required to open the lock, opening (access enabling) occurs.
  • the presence of at least one memory component ensures that all the operations for opening and closing the lock are logged, so as to allow subsequent reading thereof: in some cases it can in fact be useful to know the credentials of all those who entered the space, especially in the case of hotels and/or in the case of so-called "controlled" spaces (research and development departments in which confidential company information is accessible, rooms designed for cataloging confidential financial information, personnel departments, et cetera).
  • the aim of the present invention is to solve the problems described above, by proposing a method for the control and management of keys for access to spaces delimited by electronic locks and the like that is adapted to increase the level of safety of the information and of the credentials required to open the respective locks.
  • an object of the invention is to propose a method for the control and management of keys for access to spaces delimited by electronic locks and the like that is adapted to provide, even remotely, credentials for opening the lock or locks, eliminating the need for the requesting party to go to a specific media delivery site.
  • Another object of the invention is to propose a method for the control and management of keys for access to spaces delimited by electronic locks and the like that allows to store all the opening and closing sessions to which the specific lock is subjected, in order to always know its status and the credentials of those who are inside the space delimited by such lock.
  • Another object of the invention is to propose a device that can be enabled as a key, according to the method suitable to operate remotely, receiving credentials without having to be present at the media delivery site.
  • a further object of the present invention is to provide a method for the control and management of keys for access to spaces delimited by electronic locks and the like and a device that can be enabled as a key, according to the method, which have a low cost, are relatively simple to provide in practice and are safe in application.
  • a device that can be enabled as a key, according to the method, characterized in that it is constituted by a mobile telephone which is provided with a unit for transceiving NFC (Near Field Communication) radio frequency signals, which comprises an identification code and software for managing the NFC function in correlation with the entered data.
  • NFC Near Field Communication
  • kit for the application of the method characterized in that it comprises a computer provided with means for entering and sending data and requests for opening keys for specific electronic locks, a server provided with means for receiving requests and information from said computer, ith means for generating keys and with means for radio frequency transmission, in telephony frequencies, of strings of information, a device of the type of a mobile telephone which is provided with a unit for transceiving NFC (Near Field Communication) radio frequency signals, and at least one respective electronic lock provided with an element for receiving radio frequency signals emitted by said device arranged proximate to said element.
  • NFC Near Field Communication
  • Figure 1 is a schematic view of the components of the kit and of their correlation in the method for the control and management of keys according to the invention
  • Figure 2 is a schematic view of the operation for opening a lock performed with a device that can be enabled as a key according to the key control and management method according to the invention.
  • the reference numeral 1 generally designates a kit for applying the key control and management method according to the invention and the reference numeral 2 designates a device that can be enabled as a key.
  • the method for the control and management of keys for access to spaces 3 delimited by electronic locks and the like consists in performing a series of consecutive steps.
  • a) it is necessary to request, by means of a computer 4, which is connected by means of a specific data communications network to a specific key generation server 5, an adapted string, which constitutes the opening key for a respective electronic lock 6, in association with specific credentials of the recipient of the key, such credentials comprising the telephone number of such recipient.
  • the data communications network used is preferentially the Internet.
  • the computer 4 can thus be located at the site where the key request is received (by whom) will then be the final recipient); such location might be the reception of a hotel or of the tourist building, a travel agency, the administration center of a company, and the like.
  • the server 5 is instead preferably in a location that is distant from the installation site of the computer 4, for example at the company that delivers the service of supplying strings of characters that constitute the keys, in the company that produces the electronic locks or, in the case of tourist and hotel complexes, in the headquarters of the company that manages them.
  • a subsequent step b) of the method according to the invention it is necessary to create the string that constitutes the key in the key generation server 5: such string, therefore, cannot be accessed by the computer 4 and it is therefore impossible for an ill-intentioned individual to access the rooms protected by the electronic locks 6 by tampering with the computer 4.
  • step c) it is convenient for the server 5 to send by means of a line, preferably a telephone line (thus utilizing the satellites 7 and the normal radio links of telephone lines), the data 8 of the string that constitutes the key to the mobile telephone (device 2), provided with an NFC (Near Field Communication) function, of the recipient.
  • a line preferably a telephone line (thus utilizing the satellites 7 and the normal radio links of telephone lines)
  • the data 8 of the string that constitutes the key to the mobile telephone (device 2), provided with an NFC (Near Field Communication) function, of the recipient.
  • NFC Near Field Communication
  • the data 8 can also be sent by the server 5 by means of any type of transmission other than telephone transmission: for example by means of types of physical connection such as wireless, LAN, Bluetooth, GPRS and the like.
  • a last step d which consists in saving the string 8 that constitutes the key on the mobile telephone (device 2), for its use by means of the NFC function management software in order to enable the opening of the lock 6.
  • the credentials of the recipient of the key comprise the mobile telephone number (device 2), the identification code, within the service for supplying the strings 8 that constitute the keys, by adopting the NFC function, of the mobile telephone (device 2) and the data of the recipient.
  • the server 5 contains the identification data of all the locks 6 that it controls and the credentials of all potential recipients.
  • Each recipient in order to be able to access the service, must in fact register with it (for example online or at specific dedicated counters) by providing his data and the identification codes of his mobile telephone (device 2).
  • Analyzing in greater depth the string of data 8 that constitutes the key comprises a first portion of characters that define the actual key, a second portion of characters for enabling use of the first portion and adapted to verify the compliance of the identification code of the receiving mobile telephone (device 2) with respect to the code supplied by the computer 5 that emitted the request for the string 8.
  • the computer 4 through which the request is forwarded might also be itself constituted by a cellular telephone or smartphone; more specifically, it might also be the mobile telephone (device 2) of the requesting party by means of an adapted connection to the credential generation system.
  • the method according to the invention is therefore inherently safe, since if sending to an incorrect recipient occurs, such recipient cannot utilize the information that is present in the data string 8 because his telephone (device 2) does not have a code that complies with the code sent by the server 5.
  • the string of data 8 can comprise information on the time of enabling and disabling, the date and time, of the key; thus the recipient has available a key which is active only for the period for which he has been enabled by the server 5. In the case of a hotel booking, therefore, the recipient shall have a key which is active only for the period that corresponds to the booking that he has made.
  • step c) for sending the data 8 occurs preferably by means of text messages, multimedia messages, and the like.
  • the device 2 that can be enabled as a key according to the method is constituted by a mobile phone provided with an NFC (Near Field Communication) radio frequency transceiver unit.
  • NFC Near Field Communication
  • the device 2 comprises an identification code and software for management of the NFC function in correlation with the entered data.
  • NFC technology has evolved from a combination of contactless identification or RFID (Radio Frequency Identification) and other connectivity technologies.
  • RFID Radio Frequency Identification
  • NFC differently from the simpler RFID devices, allows bidirectional communication: when two NFC devices (the Initiator and the Target) are arranged mutually adjacent within a radius of 4 centimeters, a peer-to-peer network is created between the two and both can send and receive information.
  • NFC technology operates at a frequency of 13.56 MHz and can reach a maximum transmission speed of 424 kb/s.
  • the software is designed for the association of acoustic, visual and/or vibration signals to specific conditions of use and operation of the radio frequency transceiver unit with NFC function.
  • the bidirectionality of the radio frequency transceiver unit with NFC function allows those who have a device 2 (mobile phone) on which there is a key for at least one specific electronic lock to enable the opening of such lock also with other devices 2 or electronic cards, transponders and the like.
  • the kit 1 for the application of the method according to the invention comprises a computer 4 which is provided with means for the entry and sending of data and requests for opening keys for specific electronic locks.
  • the kit 1 further comprises a server 5 which is provided with means for receiving requests and information from the computer 4 (a transceiving operation that is normally performed over the Internet), with means for generating keys and with means for radio frequency transmission, on telephony frequencies, of strings of information 8.
  • a server 5 which is provided with means for receiving requests and information from the computer 4 (a transceiving operation that is normally performed over the Internet), with means for generating keys and with means for radio frequency transmission, on telephony frequencies, of strings of information 8.
  • the kit 1 must further necessarily comprise a device 2 of the type of a mobile phone provided with an NFC (Near Field Communication) radio frequency signal transceiving unit, and at least one respective electronic lock 6 which is provided with an element 9 for receiving radio frequency signals emitted by the device 2 located proximate to the element 9.
  • NFC Near Field Communication
  • a mobile phone as a device 2 is particularly advantageous, since it allows to use its peripherals to interact with the user: it is in fact possible to provide on the screen information regarding the use of the key string 8; likewise, it is also possible to provide acoustic and/or voice messages as well as vibrations, as a function of particular applications.
  • the device 2 can further query the lock 6 (if enabled appropriately) to retrieve all the information stored regarding who has opened the lock 6 in a certain period of time. This allows to obtain rapidly and simply information which is useful for verifying any anomalies in use or operation.
  • the present invention solves the problems described earlier, proposing a method for the control and management of keys for access to spaces 3 delimited by electronic locks 6 and the like which is adapted to increase the level of safety of the information and of the credentials required to open the respective locks 6: this is done by means of the remote enabling of the device 2 and thanks to the validation of the data 8 provided to the device 2 only upon a preliminary verification of the identification code of the device 2.
  • the method can indeed operate also and preferably remotely, managing the opening credentials of the lock(s) and eliminating the need for the requesting party to go to a specific media dispensing site.
  • the method according to the invention allows to store all the opening and closing sessions to which the specific lock 6 is subjected, in order to always know its status and the credentials of those who are inside the space 3 that is delimited by it.
  • the device 2 that can be enabled as a key is indicated specifically for remote operation, receiving the credentials without having to be present at the media dispensing site.
  • the materials used, as well as the dimensions, may be any according to requirements and to the state of the art.

Abstract

A method for the control and management of keys for access to spaces (3) delimited by electronic locks and the like, comprising the steps that consist in: requesting, with a computer (4) connected over a specific data communications network to a specific key generation server (5), a string which constitutes the opening key for a respective electronic lock (6), in association with specific credentials of the recipient of the key, the credentials comprising the telephone number of the recipient; creating the string that constitutes the key in the key generation server (5); sending over a line the data (8) of the string that constitutes the key to a mobile phone (2), provided with an NFC (acronym of Near Field Communication) function, of the recipient; saving the string of data (8) that constitutes the key on the mobile telephone (2), to use it by means of the software for the management of the NFC function in order to enable the opening of the lock (6).

Description

METHOD FOR THE CONTROL AND MANAGEMENT OF KEYS FOR ACCESS TO SPACES DELIMITED BY ELECTRONIC LOCKS AND THE LIKE, AND DEVICE THAT CAN BE ENABLED AS A KEY ACCORDING TO THE METHOD
Technical field
The present invention relates to a method for the control and management of keys for access to spaces delimited by electronic locks and the like. The present invention also relates to a device that can be enabled as a key according to the method.
Background art
It should be specified that in many installations preference is given to locks of the electronic type (or the like) over traditional mechanical locks because they are more versatile and can be reconfigured an unlimited number of times without having to intervene by replacing components and more generally by means of direct maintenance on the device (one normally operates over a data communications network).
The expression "electronic lock" is used to reference a stand-alone device (i.e., a device that operates independently for example with respect to the electrical mains) which is battery-powered and is adapted to control the opening of doors: it can be installed easily on the leaf of doors, including existing doors, and requires no wiring.
These devices can be associated with keys of various kinds: contactless cards, magnetic cards, chip-cards and other remote control devices. The main technical reference subject for the present invention is the subject of the inherent characteristics of contactless keys.
Essentially, by moving the key (more specifically, one of the components described above) closer to a particular portion of the device (the electronic lock), a string encoded on the key is read (by the device): if the string contains the authorizations required to open the lock, opening (access enabling) occurs. The presence of at least one memory component ensures that all the operations for opening and closing the lock are logged, so as to allow subsequent reading thereof: in some cases it can in fact be useful to know the credentials of all those who entered the space, especially in the case of hotels and/or in the case of so-called "controlled" spaces (research and development departments in which confidential company information is accessible, rooms designed for cataloging confidential financial information, personnel departments, et cetera).
Technology of the known type does not allow the user of the service (to whom the key must be made available) to request (and obtain) such key remotely: he must in fact be at a service center where it is possible to load the string of information onto a respective medium, which is then given to him.
For the person in charge of providing the service there is, moreover, a severe problem regarding the possibility to generate at his server any credential for access to the spaces. In theory, therefore, an ill-intentioned individual might obtain access credentials to all spaces if he were able to break through the information technology protections that are present on the server or if he obtained such credentials directly from the person in charge by threatening him.
Technology of the known type is therefore inherently unsafe due to the possible accessibility of the information and of the site where the media/ keys containing such opening credentials are dispensed.
Disclosure of the invention
The aim of the present invention is to solve the problems described above, by proposing a method for the control and management of keys for access to spaces delimited by electronic locks and the like that is adapted to increase the level of safety of the information and of the credentials required to open the respective locks.
Within this aim, an object of the invention is to propose a method for the control and management of keys for access to spaces delimited by electronic locks and the like that is adapted to provide, even remotely, credentials for opening the lock or locks, eliminating the need for the requesting party to go to a specific media delivery site.
Another object of the invention is to propose a method for the control and management of keys for access to spaces delimited by electronic locks and the like that allows to store all the opening and closing sessions to which the specific lock is subjected, in order to always know its status and the credentials of those who are inside the space delimited by such lock.
Another object of the invention is to propose a device that can be enabled as a key, according to the method suitable to operate remotely, receiving credentials without having to be present at the media delivery site.
A further object of the present invention is to provide a method for the control and management of keys for access to spaces delimited by electronic locks and the like and a device that can be enabled as a key, according to the method, which have a low cost, are relatively simple to provide in practice and are safe in application.
This aim and these objects, as well as others which will become better apparent hereinafter, are achieved by a method for the control and management of keys for access to spaces delimited by electronic locks and the like, comprising the steps that consist in
- requesting, with a computer connected over a specific data communications network to a specific key generation server, a string which constitutes the opening key for a respective electric lock, in association with specific credentials of the recipient of the key, said credentials comprising the telephone number of said recipient;
- creating the string that constitutes the key in said key generation server;
- sending over a line the data of the string that constitutes the key to a mobile telephone, provided with an NFC (acronym of Near Field Communication) function, of the recipient;
- saving the string that constitutes the key on said mobile telephone, to use it by means of the software for the management of the NFC function in order to enable the opening of the lock.
This aim and these objects are further achieved by means of a device that can be enabled as a key, according to the method, characterized in that it is constituted by a mobile telephone which is provided with a unit for transceiving NFC (Near Field Communication) radio frequency signals, which comprises an identification code and software for managing the NFC function in correlation with the entered data.
This aim and these objects are further achieved by means of a kit for the application of the method, characterized in that it comprises a computer provided with means for entering and sending data and requests for opening keys for specific electronic locks, a server provided with means for receiving requests and information from said computer, ith means for generating keys and with means for radio frequency transmission, in telephony frequencies, of strings of information, a device of the type of a mobile telephone which is provided with a unit for transceiving NFC (Near Field Communication) radio frequency signals, and at least one respective electronic lock provided with an element for receiving radio frequency signals emitted by said device arranged proximate to said element.
Brief description of the drawings
Further characteristics and advantages of the invention will become better apparent from the detailed description that follows of a preferred but not exclusive embodiment of the method for the control and management of keys for access to spaces delimited by electronic locks and the like and of the device that can be enabled as a key, according to the method according to the invention, illustrated by way of non-limiting example in the accompanying drawings, wherein:
Figure 1 is a schematic view of the components of the kit and of their correlation in the method for the control and management of keys according to the invention;
Figure 2 is a schematic view of the operation for opening a lock performed with a device that can be enabled as a key according to the key control and management method according to the invention.
Ways of carrying out the Invention
With reference to the figures, the reference numeral 1 generally designates a kit for applying the key control and management method according to the invention and the reference numeral 2 designates a device that can be enabled as a key.
The method for the control and management of keys for access to spaces 3 delimited by electronic locks and the like consists in performing a series of consecutive steps.
In a first step a) it is necessary to request, by means of a computer 4, which is connected by means of a specific data communications network to a specific key generation server 5, an adapted string, which constitutes the opening key for a respective electronic lock 6, in association with specific credentials of the recipient of the key, such credentials comprising the telephone number of such recipient.
Specifically, it is noted that the data communications network used is preferentially the Internet.
The computer 4 can thus be located at the site where the key request is received (by whom) will then be the final recipient); such location might be the reception of a hotel or of the tourist building, a travel agency, the administration center of a company, and the like.
The server 5 is instead preferably in a location that is distant from the installation site of the computer 4, for example at the company that delivers the service of supplying strings of characters that constitute the keys, in the company that produces the electronic locks or, in the case of tourist and hotel complexes, in the headquarters of the company that manages them. In a subsequent step b) of the method according to the invention it is necessary to create the string that constitutes the key in the key generation server 5: such string, therefore, cannot be accessed by the computer 4 and it is therefore impossible for an ill-intentioned individual to access the rooms protected by the electronic locks 6 by tampering with the computer 4.
In view of the installation site of the computer 4, it would be certainly easier, for anyone who wanted to attempt theft, to access it in order to steal the access keys, than to access the remote server 5, which is located at a considerable distance.
In a further step c) it is convenient for the server 5 to send by means of a line, preferably a telephone line (thus utilizing the satellites 7 and the normal radio links of telephone lines), the data 8 of the string that constitutes the key to the mobile telephone (device 2), provided with an NFC (Near Field Communication) function, of the recipient.
The data 8 can also be sent by the server 5 by means of any type of transmission other than telephone transmission: for example by means of types of physical connection such as wireless, LAN, Bluetooth, GPRS and the like.
The recipient thus simply has to perform a last step d), which consists in saving the string 8 that constitutes the key on the mobile telephone (device 2), for its use by means of the NFC function management software in order to enable the opening of the lock 6.
It is convenient to specify that the credentials of the recipient of the key, sent by the computer 4 in step a), comprise the mobile telephone number (device 2), the identification code, within the service for supplying the strings 8 that constitute the keys, by adopting the NFC function, of the mobile telephone (device 2) and the data of the recipient.
In this manner a step of validating the data 8 when they are received by the cellular telephone (device 2) of the recipient is possible: in fact, the data 8 received on the telephone (device 2) can be read and used only if the identification code of the telephone (device 2) corresponds to the one comprised in the received string. Supply of the access key is therefore dependent on a supplemental control of the match of the device 2 that received the data 8 with the validation requirements (identification codes) inherently associated with the data 8.
According to a constructive solution of unquestionable interest in practice and in application, the server 5 contains the identification data of all the locks 6 that it controls and the credentials of all potential recipients.
Each recipient, in order to be able to access the service, must in fact register with it (for example online or at specific dedicated counters) by providing his data and the identification codes of his mobile telephone (device 2).
Analyzing in greater depth the string of data 8 that constitutes the key, it can be noted that it comprises a first portion of characters that define the actual key, a second portion of characters for enabling use of the first portion and adapted to verify the compliance of the identification code of the receiving mobile telephone (device 2) with respect to the code supplied by the computer 5 that emitted the request for the string 8.
The computer 4 through which the request is forwarded might also be itself constituted by a cellular telephone or smartphone; more specifically, it might also be the mobile telephone (device 2) of the requesting party by means of an adapted connection to the credential generation system.
The method according to the invention is therefore inherently safe, since if sending to an incorrect recipient occurs, such recipient cannot utilize the information that is present in the data string 8 because his telephone (device 2) does not have a code that complies with the code sent by the server 5.
It is convenient to note that in a particularly efficient constructive possibility, the string of data 8 can comprise information on the time of enabling and disabling, the date and time, of the key; thus the recipient has available a key which is active only for the period for which he has been enabled by the server 5. In the case of a hotel booking, therefore, the recipient shall have a key which is active only for the period that corresponds to the booking that he has made.
It is specified that step c) for sending the data 8 occurs preferably by means of text messages, multimedia messages, and the like.
The device 2 that can be enabled as a key according to the method is constituted by a mobile phone provided with an NFC (Near Field Communication) radio frequency transceiver unit.
The device 2 comprises an identification code and software for management of the NFC function in correlation with the entered data.
NFC technology has evolved from a combination of contactless identification or RFID (Radio Frequency Identification) and other connectivity technologies. NFC, differently from the simpler RFID devices, allows bidirectional communication: when two NFC devices (the Initiator and the Target) are arranged mutually adjacent within a radius of 4 centimeters, a peer-to-peer network is created between the two and both can send and receive information. NFC technology operates at a frequency of 13.56 MHz and can reach a maximum transmission speed of 424 kb/s.
It is specified that in the device 2 the software is designed for the association of acoustic, visual and/or vibration signals to specific conditions of use and operation of the radio frequency transceiver unit with NFC function.
The bidirectionality of the radio frequency transceiver unit with NFC function allows those who have a device 2 (mobile phone) on which there is a key for at least one specific electronic lock to enable the opening of such lock also with other devices 2 or electronic cards, transponders and the like.
Of course, this possibility depends on the information that is present in the data string 8, which thus will also contain the enabling (or lack thereof) to the creation of duplicates. The kit 1 for the application of the method according to the invention comprises a computer 4 which is provided with means for the entry and sending of data and requests for opening keys for specific electronic locks.
The kit 1 further comprises a server 5 which is provided with means for receiving requests and information from the computer 4 (a transceiving operation that is normally performed over the Internet), with means for generating keys and with means for radio frequency transmission, on telephony frequencies, of strings of information 8.
The kit 1 must further necessarily comprise a device 2 of the type of a mobile phone provided with an NFC (Near Field Communication) radio frequency signal transceiving unit, and at least one respective electronic lock 6 which is provided with an element 9 for receiving radio frequency signals emitted by the device 2 located proximate to the element 9.
The use of a mobile phone as a device 2 is particularly advantageous, since it allows to use its peripherals to interact with the user: it is in fact possible to provide on the screen information regarding the use of the key string 8; likewise, it is also possible to provide acoustic and/or voice messages as well as vibrations, as a function of particular applications.
The device 2 can further query the lock 6 (if enabled appropriately) to retrieve all the information stored regarding who has opened the lock 6 in a certain period of time. This allows to obtain rapidly and simply information which is useful for verifying any anomalies in use or operation.
Advantageously, the present invention solves the problems described earlier, proposing a method for the control and management of keys for access to spaces 3 delimited by electronic locks 6 and the like which is adapted to increase the level of safety of the information and of the credentials required to open the respective locks 6: this is done by means of the remote enabling of the device 2 and thanks to the validation of the data 8 provided to the device 2 only upon a preliminary verification of the identification code of the device 2. Conveniently, the method can indeed operate also and preferably remotely, managing the opening credentials of the lock(s) and eliminating the need for the requesting party to go to a specific media dispensing site.
Positively, the method according to the invention allows to store all the opening and closing sessions to which the specific lock 6 is subjected, in order to always know its status and the credentials of those who are inside the space 3 that is delimited by it.
It is not secondary to point out that the device 2 that can be enabled as a key is indicated specifically for remote operation, receiving the credentials without having to be present at the media dispensing site.
The invention thus conceived is susceptible of numerous modifications and variations, all of which are within the scope of the appended claims; all the details may further be replaced with other technically equivalent elements.
In the exemplary embodiments shown, individual characteristics, given in relation to specific examples, may actually be interchanged with other different characteristics that exist in other exemplary embodiments.
Moreover, it is noted that anything found to be already known during the patenting process is understood not to be claimed and to be the subject of a disclaimer.
In practice, the materials used, as well as the dimensions, may be any according to requirements and to the state of the art.
Where technical features mentioned in any claim are followed by reference signs, those reference signs have been included for the sole purpose of increasing the intelligibility of the claims and accordingly such reference signs do not have any limiting effect on the interpretation of each element identified by way of example by such reference signs.

Claims

1. A method for the control and management of keys for access to spaces (3) delimited by electronic locks and the like, comprising the steps that consist in:
a) requesting, with a computer (4) connected over a specific data communications network to a specific key generation server (5), a string which constitutes the opening key for a respective electronic lock (6), in association with specific credentials of the recipient of the key, said credentials comprising the telephone number of said recipient;
b) creating the string that constitutes the key in said key generation server (5);
c) sending over a line the data (8) of the string that constitutes the key to a mobile telephone (2), provided with an NFC (acronym of Near Field Communication) function, of the recipient;
d) saving the string of data (8) that constitutes the key on said mobile telephone (2), to use it by means of the software for the management of the NFC function in order to enable the opening of the lock (6).
2. The method according to claim 1 , characterized in that said credentials of the recipient of the key comprise the number of the mobile phone (2), the identification code, within the service for the supply of the strings that constitute the keys by adopting the NFC function, of said mobile phone (2) and the data of the recipient.
3. The method according to claim 1, characterized in that said server contains the identification data of all the locks (6) that are controlled by it and the credentials of all the potential recipients registered beforehand to use the service.
4. The method according to* claims 1 and 2, characterized in that said data string (8) that constitutes the key comprises a first portion of characters that define the actual key and a second portion of characters for enabling the use of the first portion, suitable to verify the compliance of the identification code of the receiving mobile phone (2) to the code supplied by the computer (4) that issued the string request.
5. The method according to claim 4, characterized in that said data string (8) comprises information on the time of enabling and disabling, i.e., the date and time, of the key.
6. The method according to claim 1 , characterized in that sending occurs by means of text messages, multimedia messages and the like.
7. A device that can be enabled as a key according to the method of claim 1, characterized in that it is constituted by a mobile phone (2) provided with an NFC (Near Field Communication) radio frequency signal transceiving unit, which comprises an identification code, and software for the management of the NFC function in correlation with the entered data.
8. The device according to claim 7, characterized in that said software is designed for the association of acoustic, visual and/or vibration signals with specific conditions of use and operation of said radio frequency transceiving unit with NFC function.
9. A kit for the application of the method according to claim 1 , characterized in that it comprises a computer (4) provided with means for the entry and sending of data and requests for keys for opening specific electronic locks (6), a server (5) provided with means for receiving requests and information from said computer (4), means for generating keys and means for radio frequency transmission, on telephony frequencies, of strings of information (8), a device of the type of a mobile phone (2) provided with an NFC (Near Field Communication) radio frequency signal transceiving unit, and at least one respective electronic lock (6) provided with an element (8) for receiving radio frequency signals emitted by said device (2) arranged proximate to said element (8).
PCT/IT2010/000483 2010-12-02 2010-12-02 Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method WO2012073265A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IT2010/000483 WO2012073265A1 (en) 2010-12-02 2010-12-02 Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IT2010/000483 WO2012073265A1 (en) 2010-12-02 2010-12-02 Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method

Publications (2)

Publication Number Publication Date
WO2012073265A1 true WO2012073265A1 (en) 2012-06-07
WO2012073265A8 WO2012073265A8 (en) 2012-09-13

Family

ID=44202918

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IT2010/000483 WO2012073265A1 (en) 2010-12-02 2010-12-02 Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method

Country Status (1)

Country Link
WO (1) WO2012073265A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2672464A1 (en) * 2012-06-08 2013-12-11 BlackBerry Limited Communications system providing remote access via mobile wireless communications device and related methods
WO2014028617A1 (en) * 2012-08-16 2014-02-20 Google Inc. Near field communication based key sharing techniques
CN103679906A (en) * 2014-01-06 2014-03-26 杨海峰 Wireless network based access control system
CN103793966A (en) * 2012-11-02 2014-05-14 南京物联传感技术有限公司 NFC based door lock control system and method thereof
CN103793960A (en) * 2012-10-31 2014-05-14 株式会社易保 Method for mobile key service
CN103971427A (en) * 2013-02-06 2014-08-06 希姆通信息技术(上海)有限公司 Mobile terminal, entrance guard terminal, entrance guard system, security system and verification method
WO2014151249A1 (en) * 2013-03-15 2014-09-25 Sky Socket, Llc Controlling physical access to secure areas via client devices in a networked environment
CN104299307A (en) * 2014-11-11 2015-01-21 国网冀北电力有限公司廊坊供电公司 Lock group management system
WO2015114189A1 (en) * 2014-01-30 2015-08-06 Enrique Javier López López Device for managing entry and presence
CN106056711A (en) * 2016-06-07 2016-10-26 小笋科技(深圳)有限公司 Vacant parking space sharing method and system
EP3188136A1 (en) 2015-12-28 2017-07-05 Marques, SA Electronic door lock and operation method thereof
CN107251106A (en) * 2014-12-23 2017-10-13 法雷奥舒适驾驶助手公司 The method securely transmitted for virtual key and the mirror method for distinguishing for mobile terminal
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
AT520583A1 (en) * 2017-10-17 2019-05-15 Makivic Michael Method for managing and organizing door closing system in objects
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
US11339589B2 (en) 2018-04-13 2022-05-24 Dormakaba Usa Inc. Electro-mechanical lock core
EP3868986A4 (en) * 2018-08-30 2022-08-24 NEC Platforms, Ltd. Electronic lock control device, electronic lock control system, electronic lock control method, and program
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
US11913254B2 (en) 2017-09-08 2024-02-27 dormakaba USA, Inc. Electro-mechanical lock core
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030151493A1 (en) * 2002-02-13 2003-08-14 Swisscom Ag Access control system, access control method and devices suitable therefor
US20030208386A1 (en) * 2000-02-25 2003-11-06 Rayner Brondrup Wireless reservation, check-in, access control, check-out and payment
US20080261524A1 (en) * 2007-04-19 2008-10-23 Asif Grushkevich Method and System for a Bluetooth Device That Supports Multiple Connections
US20090183541A1 (en) * 2006-04-28 2009-07-23 Babak Sadighi Access Control System and Method for Operating Said System
WO2009094683A1 (en) * 2008-01-30 2009-08-06 Evva-Werk Spezialerzeugung Von Zylinder- Und Sicherheitsschlössern Gessellschaft M.B.H. & Co. Kg Method and device for regulating access control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030208386A1 (en) * 2000-02-25 2003-11-06 Rayner Brondrup Wireless reservation, check-in, access control, check-out and payment
US20030151493A1 (en) * 2002-02-13 2003-08-14 Swisscom Ag Access control system, access control method and devices suitable therefor
US20090183541A1 (en) * 2006-04-28 2009-07-23 Babak Sadighi Access Control System and Method for Operating Said System
US20080261524A1 (en) * 2007-04-19 2008-10-23 Asif Grushkevich Method and System for a Bluetooth Device That Supports Multiple Connections
WO2009094683A1 (en) * 2008-01-30 2009-08-06 Evva-Werk Spezialerzeugung Von Zylinder- Und Sicherheitsschlössern Gessellschaft M.B.H. & Co. Kg Method and device for regulating access control

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2672464A1 (en) * 2012-06-08 2013-12-11 BlackBerry Limited Communications system providing remote access via mobile wireless communications device and related methods
CN104823221A (en) * 2012-08-16 2015-08-05 谷歌公司 Near field communication based key sharing techniques
WO2014028617A1 (en) * 2012-08-16 2014-02-20 Google Inc. Near field communication based key sharing techniques
US9384613B2 (en) 2012-08-16 2016-07-05 Google Inc. Near field communication based key sharing techniques
CN103793960A (en) * 2012-10-31 2014-05-14 株式会社易保 Method for mobile key service
CN103793966A (en) * 2012-11-02 2014-05-14 南京物联传感技术有限公司 NFC based door lock control system and method thereof
CN103971427A (en) * 2013-02-06 2014-08-06 希姆通信息技术(上海)有限公司 Mobile terminal, entrance guard terminal, entrance guard system, security system and verification method
US9148416B2 (en) 2013-03-15 2015-09-29 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
AU2014235174B2 (en) * 2013-03-15 2016-09-15 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US10127751B2 (en) 2013-03-15 2018-11-13 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US9438635B2 (en) 2013-03-15 2016-09-06 Airwatch Llc Controlling physical access to secure areas via client devices in a network environment
WO2014151249A1 (en) * 2013-03-15 2014-09-25 Sky Socket, Llc Controlling physical access to secure areas via client devices in a networked environment
CN103679906B (en) * 2014-01-06 2016-10-05 杨海峰 Entrance guard management system and method based on wireless network
CN103679906A (en) * 2014-01-06 2014-03-26 杨海峰 Wireless network based access control system
WO2015114189A1 (en) * 2014-01-30 2015-08-06 Enrique Javier López López Device for managing entry and presence
US10643414B2 (en) 2014-04-07 2020-05-05 Videx, Inc. Electronic key device utilizing user input to facilitate access by authorized persons
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US11423723B2 (en) 2014-04-07 2022-08-23 Videx, Inc. Enhanced access control based on key proximity
CN104299307B (en) * 2014-11-11 2016-08-31 国网冀北电力有限公司廊坊供电公司 Lock cluster management system
CN104299307A (en) * 2014-11-11 2015-01-21 国网冀北电力有限公司廊坊供电公司 Lock group management system
CN107251106A (en) * 2014-12-23 2017-10-13 法雷奥舒适驾驶助手公司 The method securely transmitted for virtual key and the mirror method for distinguishing for mobile terminal
EP3188136A1 (en) 2015-12-28 2017-07-05 Marques, SA Electronic door lock and operation method thereof
CN106056711A (en) * 2016-06-07 2016-10-26 小笋科技(深圳)有限公司 Vacant parking space sharing method and system
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core
US11913254B2 (en) 2017-09-08 2024-02-27 dormakaba USA, Inc. Electro-mechanical lock core
AT520583A1 (en) * 2017-10-17 2019-05-15 Makivic Michael Method for managing and organizing door closing system in objects
US11339589B2 (en) 2018-04-13 2022-05-24 Dormakaba Usa Inc. Electro-mechanical lock core
US11447980B2 (en) 2018-04-13 2022-09-20 Dormakaba Usa Inc. Puller tool
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
EP3868986A4 (en) * 2018-08-30 2022-08-24 NEC Platforms, Ltd. Electronic lock control device, electronic lock control system, electronic lock control method, and program
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
US11580801B2 (en) 2019-09-06 2023-02-14 Videx, Inc. Access control system with dynamic access permission processing

Also Published As

Publication number Publication date
WO2012073265A8 (en) 2012-09-13

Similar Documents

Publication Publication Date Title
WO2012073265A1 (en) Method for the control and management of keys for access to spaces delimited by electronic locks and the like, and device that can be enabled as key according to the method
US10262486B2 (en) Systems and methods for remote access rights and verification
US9437063B2 (en) Methods and systems for multi-unit real estate management
US20180211456A1 (en) Cryptographic Key Management Via a Computer Server
CN107004314B (en) Remote programming for access control systems using virtual card data
CN104823221B (en) Key technology of sharing based on near-field communication
JP2020113312A (en) Time-bound secure access
US9659422B2 (en) Using temporary access codes
US11570623B2 (en) Secure communication platform
CN110033534B (en) Secure seamless access control
US20100201536A1 (en) System and method for accessing a structure using a mobile device
CN104484917B (en) Safe box renting system
JP2017210862A (en) Methods, programs and systems for location enabled electronic lock control
KR102085975B1 (en) System for Managing Door Lock information of Accommodation And Driving Method Thereof
US20150206367A1 (en) Control of operation of a lock
EP3819878B1 (en) Mobile digital locking technology
WO2021089907A1 (en) Mobile digital locking technology
WO2013102152A1 (en) Secure mechanisms to enable mobile device communication with a security panel
US9705861B2 (en) Method of authorizing a person, an authorizing architecture and a computer program product
WO2012019238A1 (en) System and method for converging rfid building security with pki techniques
JP2009271936A (en) Communication terminal device
KR101996890B1 (en) Control system and method for locking device
Law et al. The Integration of Smart Lock in Vacation Rental Management System
WO2020123580A1 (en) Wireless access control using an electromagnet
EP3496013A1 (en) Method for issuing a physical token

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10805529

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10805529

Country of ref document: EP

Kind code of ref document: A1