EP4358043A1 - Procédé de mise en service d'un dispositif de verrouillage électromécanique - Google Patents
Procédé de mise en service d'un dispositif de verrouillage électromécanique Download PDFInfo
- Publication number
- EP4358043A1 EP4358043A1 EP22202296.4A EP22202296A EP4358043A1 EP 4358043 A1 EP4358043 A1 EP 4358043A1 EP 22202296 A EP22202296 A EP 22202296A EP 4358043 A1 EP4358043 A1 EP 4358043A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- locking device
- key
- location
- locking
- specific
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 117
- 238000013475 authorization Methods 0.000 claims abstract description 170
- 238000012546 transfer Methods 0.000 claims abstract description 16
- 238000009434 installation Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 5
- 238000003780 insertion Methods 0.000 claims description 5
- 230000037431 insertion Effects 0.000 claims description 5
- 230000001960 triggered effect Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 11
- 230000000903 blocking effect Effects 0.000 description 6
- 238000004146 energy storage Methods 0.000 description 5
- 210000002023 somite Anatomy 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 208000012886 Vertigo Diseases 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000011990 functional testing Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 240000003517 Elaeocarpus dentatus Species 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B47/06—Controlling mechanically-operated bolts by electro-magnetically-operated detents
- E05B47/0611—Cylinder locks with electromagnetic control
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00841—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
Definitions
- the invention relates to a method for commissioning an electro-mechanical locking device at a location.
- the invention also shows a system for commissioning the locking device at a location with which the method can be carried out.
- EP1914368 A2 as a prior art document discloses that a locking device controls an electro-mechanical actuator by means of locking device electronics. This serves to transfer a rotor into a rotatable state.
- keys are known that can be inserted into electro-mechanical locking devices and exchange data with the locking device. If the data exchange results in authorization, the key can be turned in the locking device.
- the electro-mechanical device must first be put into operation.
- the locking device is first assigned the appropriate authorization during commissioning.
- the locking device is then brought to the installation location and inserted into a door lock.
- the invention shows a method for commissioning an electro-mechanical locking device at a location.
- the electro-mechanical locking device is preferably a locking cylinder, in particular a double or half cylinder, a furniture cylinder or a padlock or a similar device.
- the electro-mechanical locking device designed as a locking cylinder can be inserted into a lock (for example a mortise lock) on a door as a possible locking element.
- the padlock can be arranged on a door, for example.
- the locking device can be arranged on or in various locking elements, e.g. on or in doors, gates, drawers, barriers.
- the location of the locking device can be identified, in particular clearly, via the "location".
- several electro-mechanical locking devices are put into operation and the location is so specific that it only applies to one of the locking devices put into operation and not to several.
- the multiple locking devices can be designed differently, for example partly as a double cylinder, partly as a padlock or as a double cylinder with different lengths.
- the location can be, for example, a building and/or a cabinet, such as a switch cabinet, and/or a specific room within a building and/or a specific door. Furthermore, the location can also be outside a building, for example when using the locking device on a door or gate, a fence or a wall. Examples of a location are "hotel room 308", “office 416", “switch cabinet Luisenstrasse”, “basement building no. 1", “front door Amalienstrasse 13".
- the locking device comprises locking device electronics.
- the locking device electronics preferably comprise a processor, for example a microprocessor, and/or an electronic data memory.
- the locking device comprises an electro-mechanical actuator and a driver.
- the electro-mechanical actuator is controlled by the locking device electronics of the locking device in order to transfer the driver from a non-rotatable to a rotatable state.
- the actuator can be designed, for example, as a solenoid or as an electric motor.
- the driver is preferably designed to be rotationally asymmetrical and, in the rotatable state, enables a locking element, in particular a door, to be unlocked or locked during rotation.
- the driver can move the latch or bolt in the lock.
- the driver can correspond to a locking lug of a locking cylinder.
- the driver can include recesses in which locking elements can slide in order to unlock the shackle of a padlock.
- the electro-mechanical actuator in turn enables the driver to be transferred to the rotatable state when controlled accordingly by the locking device electronics. This can be done by unlocking or coupling.
- the locking device can comprise a housing in which a rotor is at least indirectly rotatably mounted.
- the previously locked rotor can be unlocked by means of the actuator, so that the rotor and the driver connected to the rotor can be rotated.
- the rotor can be coupled to the driver by means of the actuator, allowing the driver to rotate with the rotor.
- the uncoupled and/or locked state of the driver is referred to as the non-rotatable state.
- the coupled and/or unlocked state of the driver is referred to as the rotatable state.
- the locking device is assigned a unique electronic identifier and this identifier is stored in the locking device, preferably in the locking device electronics, in particular on a microchip.
- the identifier is, for example, a character string stored in the locking device.
- the key may contain a unique electronic key identifier. This is stored in the key's electronics.
- Step a. can preferably be carried out by the locking device electronics.
- the detection can take place by the locking device receiving electrical energy from the key. Additionally or alternatively, the locking device electronics can receive electronic data from the key.
- Step b. can preferably be carried out by the locking device electronics.
- step b. it is particularly intended that the driver is turned using the key. This is carried out manually by an installer. This gives the installer the certainty that the locking device can be operated correctly electromechanically.
- the locking device is in a factory state during steps a. and b.
- the factory state at least some of the configuration data is missing, preferably all of the configuration data that are provided in the operation to prevent access by unauthorized persons.
- electronic configuration data is stored in the locking device, which prevents access by unauthorized persons.
- access is prevented if the locking device receives an opening command from the key but cannot decrypt this opening command.
- the key has previously checked the access authorization, e.g. using the identifier.
- Access is prevented if, for example, Alternatively, it can be understood that the locking device, e.g. using the key identifier, checks the access authorization using a list of blocked authorizations, the so-called blacklist.
- the access authorization information received in step c. is therefore information that limits the control of the actuator to transfer the driver from the non-rotatable to the rotatable state. This reduces the number of keys that can be used to control the actuator to transfer the driver from the non-rotatable to the rotatable state.
- the invention provides that an installer can first check the electro-mechanical function of the locking device using steps a. and b., before the configuration data makes it difficult or impossible for the installer to check the electro-mechanical function of the locking device according to step c. Because the installer initially has the locking device in its factory state, it is easy to check the electro-mechanical function of the locking device. This means that the installer does not have to have different keys with different access authorizations ready in order to check different locking devices one after the other for their electro-mechanical function. Instead, one key is sufficient. This makes the commissioning process more efficient. If a locking device is not sufficiently functional electro-mechanically, it can be replaced without access authorization information having to be transferred from the non-functional locking device to the functional locking device.
- the access authorization information is received for the first time by the locking device in step c. This is therefore not an update of the access authorization information.
- the configuration data is stored in the data storage.
- the configuration data corresponds to the access authorization information.
- the locking device can be turned with any key in the factory state.
- the arbitrary key contains no access authorization or a very general access authorization or very general access authorization information that is accepted by the locking device.
- the term arbitrary key is understood to mean a key that can be used in a large number of of locking devices that have the same mechanical internal structure.
- the keys can therefore be structurally compatible with the locking element.
- these keys can be geometrically inserted and removed from the locking channel, have suitable electrical contacts for electrically contacting the corresponding contacts of the locking device, or the like. Because the driver can preferably be rotated using any key before step c., it is possible to first effectively check the electro-mechanical functioning of the locking device.
- the design according to the invention enables the installer in particular to take locking devices in their factory state to different locations and/or to install them without having to pay attention to access authorization information.
- the locking device is preferably installed at the location in its factory state. This means that the mechanical installation of the locking device can take place first, before step c. is carried out. This means that the installation takes place before the configuration data restricts or prevents access for the installer. Particularly preferably, step b. takes place at least partially after the locking device has been installed in or on a locking element, in particular a door. This allows the installer to not only test the locking device electro-mechanically, but also whether the locking element can be properly unlocked in the assembled state of the driver, e.g. whether the door can be unlocked with the lock with little friction by turning the driver.
- step b. is carried out at least in part to install the locking device on a locking element.
- the driver in particular the locking nose, is rotated into a position in which the locking device can be inserted into the locking element.
- the shackle of a padlock is unlocked in order to attach the padlock to the locking element. In this way, a necessary assembly step can also be used to check the electro-mechanical functionality of the locking device.
- step b it is also conceivable to carry out step b before and after assembly.
- step b the functional test routine is triggered independently of a locking system assignment of the locking device.
- the locking device In the configured state, the locking device is assigned to a locking system.
- the locking system there are several locking devices, which are put into operation in accordance with the method described here.
- the locking system provides for a specific access authorization concept. For example, several authorized persons can be assigned to the locking system, with each authorized person being assigned one or more of the locking devices as having access authorization.
- Those authorized to access the building can be divided into authorization groups.
- the locking system can apply to an apartment building.
- One authorization group can be intended for the caretaker, who can close all locking devices, with the exception of the locking devices on the individual apartments.
- Another authorization group can be intended for the apartment owners, who can, for example, close the locking devices on the front door and their own apartment.
- the locking system comprises a plurality of locking devices which are assigned to, or in particular belong to, an owner, e.g. a housing association.
- a locking system is additionally or alternatively characterized in that the locking system comprises at least one list of blocked locking authorizations, which is referred to as a blacklist.
- the blocked locking authorizations can relate to one or more locking devices of the locking system.
- the at least one blacklist is preferably limited to a single locking system. In other words, different locking systems differ in that they each have their own blacklists.
- the locking system can additionally or alternatively be characterized by the fact that the locking system has its own encryption information, e.g. its own encryption key and/or its own encryption algorithm.
- the encryption information can also be referred to as cryptographic information and/or the encryption key as a cryptographic key. Different locking systems therefore differ primarily in terms of the encryption information.
- step b. is carried out independently of a locking system assignment, an installer can check locking devices from different locking systems for their electro-mechanical functionality one after the other using just one key.
- the installer can check locking devices from different locking systems one after the other using just one key.
- different locking systems in different locations, whereby the installer must in particular rotate the driver for installation.
- the function check routine is triggered independently of a location area assignment of the locking device.
- a location area for example a part of a building with several doors - thus preferably refers to several locking devices, wherein the locking devices are arranged in the location area.
- the locking devices of a location area are preferably part of a single locking system.
- the locking system can comprise locking devices of several location areas.
- the locking system comprises the locking devices of a building and the location areas each comprise one floor of the building.
- the location area preferably comprises several locations at which locking devices are installed.
- step b. is carried out independently of a location area assignment, an installer can use just one key to check locking devices in different locations for their electro-mechanical functionality.
- the installer can use just one key to install locking devices in different locations in different locations, whereby the installer must in particular turn the driver for installation.
- step b. the function test routine is triggered independently of the location assignment of the locking device.
- exactly one locking device is assigned to a location.
- step b. is carried out independently of the location assignment, an installer can check several locking devices for their electro-mechanical functionality one after the other using just one key. In particular, the installer can install locking devices one after the other at different locations using just one key, whereby the installer must in particular turn the driver for installation.
- the key preferably comprises a key shaft.
- the key shaft can be inserted into the locking device, preferably into a locking channel of the locking device.
- the key together with the key shaft is preferably designed such that a torque can be transmitted to the locking device using the key via the key shaft.
- the mechanical movement of the locking device is therefore preferably carried out using the key.
- the key in particular via the key shaft, establishes an electrical connection to the locking device.
- the connection can be wireless or be wired.
- the key and the locking device comprise corresponding transmission devices for this purpose.
- “Wired” also referred to as non-wireless means that the connection is made via at least one conductor in the key that can be brought into electrical contact with the locking device electronics.
- the key and the locking device can comprise corresponding electrical contacts as transmission devices for this purpose.
- connection can be used to transmit data, in particular the identifier.
- the electrical connection makes it possible to exchange data, in particular non-wirelessly, between the key and the locking device.
- the transmission devices make it possible to transmit electrical energy (also referred to as current) from the key to the locking device.
- the function check routine is preferably triggered in step b. using a key that is structurally compatible with the locking device.
- the key that is structurally compatible with the locking device can be geometrically inserted and removed from the locking channel.
- the key that is structurally compatible with the locking device has a transmission device that matches the transmission device of the locking device.
- the same key can unlock all structurally compatible electro-mechanical locking devices of a manufacturer in the factory state by means of a general encryption key or without an encryption key.
- the key used in step a. is designed to convert drivers of locking devices that are in the configured state into the rotatable state using an access authorization.
- the same key can contain access authorizations for locking devices that are in the configured state.
- the installer also works as a caretaker. In this role, the installer can install the locking devices in the factory state and, once the work is done, use the same key to configured locking device on the caretaker's apartment. Additionally or alternatively, after step c., as part of the commissioning procedure, there may be at least one access authorization on the key in order to check access with authorization.
- the locking device electronics only control the actuator to move the driver into the rotatable state if the access authorization has been checked beforehand.
- the access authorization check takes place in the system, in particular in the key and/or in the locking device.
- the access authorization can be determined in particular by means of the electronic identifier of the key and/or the key identifier.
- the key can send the key identifier to the locking device and/or the locking device can send the identifier to the key.
- the electronic key determines the access authorization based on the electronic identifier of the locking device and sends an opening command to the locking device. Additionally or alternatively, the key can select access authorization information based on the electronic identifier and send the selected access authorization information to the locking device for checking. Additionally or alternatively, the locking device can check the access authorization of the key identifier, in particular based on a whitelist and/or a blacklist. Furthermore, the location can be checked, for example in the key. Furthermore, it can be provided that either the key and/or the locking device check a time-based access condition.
- step b. takes place without an access authorization that depends on the electronic identifier of the locking device having been checked beforehand. Additionally or alternatively, it is provided that step b. takes place without an access authorization that depends on the key identifier of the locking device having been checked beforehand. Additionally or alternatively, it is provided that step b. takes place without an access authorization that depends on the location having been checked beforehand. It is therefore preferably provided that the usual access authorization check that takes place in the configured state of the locking device does not take place in the factory state.
- step b. takes place without an access authorization that depends on an electronic identifier (ID) of the locking device or the electronic key identifier having been checked beforehand.
- step b. takes place without an access authorization that depends on an electronic identifier (ID) of the locking device, the electronic key identifier or the location having been checked beforehand.
- ID electronic identifier
- step b. takes place without an access authorization that depends on an electronic identifier (ID) of the locking device, the electronic key identifier or the location having been checked beforehand.
- the specifications mentioned in step b. preferably characterize the factory state of the locking device.
- the locking device in the factory state, can preferably trigger the function check routine independently of a locking system assignment, a location area assignment and/or a location assignment. Additionally or alternatively, in the factory state, the locking device can trigger the function check routine independently of an access authorization check that depends on the identifier, the key identifier and/or the location.
- the locking device is supplied with power to the actuator from an electrical energy storage device of the key, the key comprising the key shaft for insertion into the locking device and for transmitting electrical energy to the locking device.
- the key shaft in order to detect the key in step a., the key shaft must be inserted into the locking device. This makes it possible in particular for the corresponding transmission devices to be connected.
- the access authorization information in step c. comprises location-specific access authorization information. Access authorization information is thus received that is specific to the location.
- the location-specific authorization information relates to a specific location and thus preferably to exactly one locking device. In the factory state, however, the locking device is preferably free of location-specific access authorization information.
- steps a. and b. are carried out without the locking device having previously been electronically assigned to a location.
- access authorization information in step c. includes access authorization information specific to the local area. Access authorization information is thus received that is specific to the local area, in particular that is valid for the entire local area.
- the authorization information specific to the local area relates to a specific local area - for example a part of a building with several doors - and thus preferably to several locking devices. In the factory state, however, the locking device is preferably free of access authorization information specific to the local area.
- steps a. and b. are carried out without the locking device having previously been electronically assigned to a local area.
- access authorization information in step c. includes locking system-specific access authorization information. Access authorization information is thus received that is specific to the locking system, in particular is valid for the entire locking system.
- the locking system-specific access authorization information relates to a locking system as previously defined.
- the lock-specific access authorization information relates to several locking devices. In the factory state, however, the locking device is preferably free of locking system-specific access authorization information.
- steps a. and b. are carried out without the locking device being electronically assigned to a locking system.
- the access authorization information may comprise at least a blacklist, encryption information, in particular an encryption key, and/or locking device operating data.
- the blacklist includes a list of blocked access authorizations, in particular blocked key identifiers.
- the encryption information in particular the encryption key, is used for electronic decryption of electronic data that the locking device has received.
- the encryption information can thus also be referred to as cryptographic information and/or the encryption key as a cryptographic key.
- the locking device operating data includes data about the operation of the locking device, e.g. a period of time in which the actuator is energized in order to transfer the driver into the rotatable state and/or data relating to an acoustic and/or visual display of a state of the locking device.
- the locking device operating data can include a time period until the actuator is activated to return it to the non-rotatable state.
- the access authorization information contains a location-specific and/or location-area-specific and/or locking system-specific blacklist.
- the blacklist includes blocked authorizations that are blocked for the entire locking system and blocked authorizations that are only blocked for the location.
- the blacklist can thus be designed to be locking system-specific and location-specific.
- the blocking device in steps a. and b. is designed to be free of a location-specific and/or location-area-specific and/or locking system-specific blacklist.
- the blocking device in the factory state is designed to be free of a location-specific and/or location-area-specific and/or locking system-specific blacklist.
- the access authorization information contains location-specific and/or location-area-specific and/or locking system-specific encryption information, in particular a location-specific and/or location-area-specific and/or locking system-specific encryption key.
- the locking device is designed free of location-specific and/or location-area-specific and/or locking system-specific encryption information, in particular an encryption key.
- the locking device is designed free of location-specific and/or location-area-specific and/or locking system-specific encryption information, in particular an encryption key.
- the encryption information can be composed of different pieces of information.
- the encryption information includes information that is specific to the entire locking system and information that is only specific to the location.
- the encryption information can therefore be location- and locking system-specific. Because exactly one locking device is assigned to a location, location-specific encryption information is also understood to be encryption information that is specific to the identifier.
- the configuration data contains location-specific and/or location-area-specific and/or locking system-specific locking device operating data.
- the locking device is in steps a. and b. designed to be free of location-specific and/or location-area-specific and/or locking system-specific locking device operating data.
- a location-specific user input for defining the location is made by receiving the user input by a device, in particular a mobile device, before step c.
- the method according to the invention can also involve method steps that are not carried out by the locking device. Rather, the method step of receiving the user input is carried out by the device.
- the location-specific user input is received after steps a. and b.
- the locking device is in the factory state during reception.
- the device is preferably a mobile device, in particular a smartphone, tablet or laptop.
- the device can also be a terminal that is attached in or on the building, for example on the wall, and is used for room and/or building control. It is preferably provided that the device can establish a connection to the Internet and/or to a telecommunications network.
- the device can preferably communicate with a computing unit via the Internet or the telecommunications network.
- the computing unit can be located anywhere. In particular, it is intended that the device communicates with the computing unit wirelessly, in particular via the Internet or a telecommunications network.
- the computing unit can be a server, for example.
- the server can also be provided virtually, in particular as a cloud service.
- a corresponding database is stored in the computing unit.
- the device preferably has input means; for example a keyboard and/or a touchscreen.
- the input means serve in particular to enable the user, in particular the installer, to enter the location into the device.
- the device also preferably has output means; for example a screen, in particular a touchscreen, and/or a loudspeaker.
- the device preferably comprises electronics. The electronics serve in particular to process the user input and/or to output a message on the output means.
- the device "receives" the location-specific user input, which also includes that the user input can be made through an external input device, such as a keyboard wirelessly connected to the device.
- an external input device such as a keyboard wirelessly connected to the device.
- the location-specific user input is made on the device, i.e. the input device is located directly on the device, for example the touchscreen or the keyboard of the device.
- the installer makes the input manually on the input device, in particular on the screen.
- the location-specific user input is made by an input from the user, in particular the installer, on the touchscreen of the smartphone or tablet.
- the location-specific user input refers in particular to a user input of the location or a selection of the location, so that the information about the location, hereinafter referred to as location information, is available in the device.
- Examples of a user input of the location are "hotel room 308", “office 416”, “switch cabinet Luisenstrasse”, “basement building no. 1", front door Amalienstrasse 13" or an input on a two- or three-dimensional location map.
- This user input is particularly preferably carried out while the user, in particular the installer, is on site, i.e. at the location defined here.
- this reception of the location-specific user input on the device only takes place when the installer is on site together with the locking device to be installed.
- the installer does not have to stand directly in front of the locking element in which the locking device is installed; in particular not if the location is in an explosion-proof area or if there is no mobile phone reception directly at the location.
- the key may be designed for wireless communication with the device. Wireless communication with the device takes place in particular via active, wireless transmission of the key. In particular, short-range communication is used, for example via Bluetooth or ultrawideband (UWB).
- the key preferably comprises electronics. The electronics can be used to carry out the communication.
- the key identifier is sent from the key to the device.
- the device preferably sends the key identifier on to the computing unit.
- the computing unit can check, for example, which usage rights the key has and/or are to be assigned to the key.
- the device can send further data specifically to this one key.
- the procedural step of defining the location at which the locking device is to be installed by user input on the device serves to prepare for step c.
- the location information at which the locking device is to be installed makes it possible for the locking device to receive location-specific access authorization information. If the location is already assigned to a location area and/or a locking system, e.g. in the computing unit and/or the device, the location information can make it possible for location- and/or locking area-specific access authorization information to be received in step c. As part of the commissioning process, it is therefore easy for the installer to select any locking device in the factory state on site and then transfer it to the configured state.
- a locking system can be selected by receiving a locking system user input by the device, in particular a mobile device, before step c.
- the locking system is preferably selected manually.
- the user input is made in particular via the input device.
- the installer can select the locking system by manually entering it on the input device. For example, the user, in particular the installer, enters the locking system on the touchscreen.
- locking system-specific access authorization information can be received by the locking device in step c.
- the locking system-specific user input is received after steps a and b.
- the locking device is in the factory state during the input.
- the location-specific user input and/or locking system user input is/are carried out by selecting from selection lists and/or overview plans displayed on a screen of the device.
- the location information is newly created during the location-specific user input.
- the location-specific user input for defining the location, ie the input of the location information:
- the location-specific user input can be made by selecting a location from a selection list.
- the selection list is preferably displayed on the device screen. This selection list is sent to the device from a computing unit. The device receives the selection list from the computing unit.
- the user in particular the installer, can select the appropriate location on the device while he is on site to carry out commissioning.
- location-specific user input is preferably carried out or supplemented by free text input.
- This free text input is carried out in particular on the device. This allows new location information to be created.
- the location-specific user input can also be made or completed by selecting a location overview map.
- This location overview map is preferably sent from the computing unit to the device. Or the device receives the location overview map from the computing unit.
- the site overview plan can, for example, be a room overview plan that graphically represents the position of rooms within a building, so that, for example, by clicking on a specific room or door, the location is selected, thereby providing the location-specific user input.
- the site overview plan can be a building overview plan on which the installer selects a specific building in which to install the locking device.
- the site overview plan can also represent the various locations on a map, for example locations in the form of buildings or control cabinets that are widely distributed from one another.
- the user creates new location information.
- the user thus creates location information. This is conceivable in particular through free text input or through selection on the location overview plan.
- the individual location-specific user input can also be made using a combination of several different or the same methods described above. For example, a location can first be selected from the selection list and then supplemented with text input. In a similar way, a building can first be selected in the location overview plan and then the specific location can be defined in a more detailed location overview plan or via free text input or via the selection list.
- the locking system is selected from a predefined selection list.
- the user in particular the on-site installer, cannot create a new locking system.
- the locking system selection is taken into account in the location-specific user input.
- the device can have possible locations associated with the locking system stored electronically for at least one locking system.
- the location-specific user input for defining the location is preferably first made by selecting the locking system and then selecting the location in the locking system.
- a selection list of locations is provided for this purpose, which only shows locations of the selected locking system.
- a free text input of the location can be made after the locking system has been selected.
- the location can then be selected using a location overview map of the locking system. This location overview map has already been described above. Preferably, it can be provided that only locations of the respective locking system are shown on the location overview map.
- the computing unit and/or the device can, for example, use the location information to determine the location area in which the location where the locking device is installed is located in the location area on the location overview plan.
- possible locations are assigned to location areas in the computing unit and/or the device before the user input.
- the identifier is preferably assigned to the defined location to form an ID-location assignment.
- the ID-location assignment can be, for example, a data set in which the appropriate location is recorded for the ID. However, it is also considered an "ID-location assignment" if, for example, the ID and the location are stored in different tables and only the link between ID and location is stored. It is particularly preferred that that the assignment is made for the first time, which means that the specific identifier of the locking device is assigned to a location for the first time. Alternatively, the assignment can be made after an existing ID-location assignment has been deleted, but an assignment is preferably not possible as long as an assignment exists for the current ID.
- the selected locking system is preferably assigned to the identifier of the locking device to form an ID-locking system assignment.
- the ID location assignment and/or the ID locking system assignment preferably takes place in the device.
- the locking device can send the identifier to the device, in particular via the key.
- the key is inserted with its key shaft in the locking device, while the locking device sends the identifier to the key.
- the key being inserted in the locking device can be a prerequisite for the locking device sending the identifier to the key.
- the key being inserted in the locking device can be a prerequisite for the key receiving the identifier from the locking device.
- the key may be inserted with the key shaft in the locking device while the key transmits the identifier to the device.
- the key being inserted in the locking device may be a prerequisite for the key to send the identifier to the device.
- the key being inserted in the locking device may be a prerequisite for the device to receive the identifier from the key.
- the following method step is preferably provided: electronic sending of the identifier (ID) by the locking device to the computing unit before step c, in particular via the key and/or the device.
- ID the identifier of the locking device
- the identifier of the locking device is preferably sent indirectly by the locking device to the device.
- the locking device first sends the identifier to the key, in particular not wirelessly.
- the key then forwards the identifier of the locking device to the device, in particular wirelessly via short-range communication.
- the sending of the identifier serves to set up or supplement the database in the computing unit.
- the sending of the identifier preferably takes place after the ID-location assignment and/or the ID-locking system assignment have been formed.
- the device sends the location information obtained through the location-specific user input and/or the locking system information obtained through the locking system user input to the computing unit.
- the location information and/or locking system information is sent after the ID-location assignment and/or the ID-locking system assignment have been formed.
- the device receives access authorization information from the computing unit, in particular location-specific, location-area-specific and/or locking system-specific.
- the access authorization information received by the device can be identical to or different from the access authorization information in step c.
- the access authorization information received by the computing unit is modified in the device and/or key.
- the receipt of the access authorization information by the device serves to prepare for step c.
- This method step is carried out by the device. This method step takes place in particular after the method step of sending the location-specific and/or locking system-specific user input.
- the computing unit can use the location information and/or locking system information to send the appropriate access authorization information to the device.
- the access authorization information in particular location-specific and/or location-area-specific and/or locking system-specific, is sent from the key to the locking device.
- the commissioning method can therefore also include a step that is carried out by the key. This is the access authorization information that is received from the locking device in step c.
- the key comprises the key shaft, wherein the key with the key shaft is inserted into the locking device in order to send the access authorization information, in particular location-specific and/or location-area-specific and/or locking system-specific, to the locking device.
- the key has previously received access authorization information from the device, in particular location-specific, location-area-specific and/or locking system-specific.
- the access authorization information is particularly preferably sent from the computing unit to the device and from the device to the key.
- Step c then takes place, i.e. the access authorization information is sent from the key to the locking device or received by the locking device.
- the key modifies the access authorization information, in particular the encryption information.
- step c. the access authorization information, in particular location-specific and/or location-area-specific and/or locking system-specific, is sent from the key to the locking device.
- the key in step a. is a first key.
- the key for sending the access authorization information for step c. can be a second key. At least two keys are therefore used.
- the first installer can be provided to mount the locking device on or in the locking element. As already described, the first installer can also carry out steps a. and b. for this. It is preferably not necessary for the first installer to make a user input into the device.
- a second installer can be provided to have step c. carried out by the locking device. To do this, the installer preferably inserts the second key into the locking device.
- the second installer is provided in particular to make a user input into the device, in particular to define the location and/or the locking system. This allows the method to be made even more effective, since the first and second installers each carry out different subtasks specific to them.
- the first key and the second key can be mechanically identical.
- the first and the second key have different authorizations.
- the first installer may not be authorized at all to have the locking device carry out step c. and/or to carry out preparatory steps for carrying out step c.
- the first installer has no authorization to carry out a user input in the device to define the location and/or the locking system.
- the actuator is preferably only controlled to transfer the driver into the rotatable state if the location-, location-area- and/or locking system-specific access authorization has been checked beforehand.
- the method comprises the following further step, which is carried out by the locking device and/or the key: d. Denying access authorization for the key that sent the access authorization information to the locking device in order to check the function of the locking device in the configured state.
- the key is preferably the second key.
- the installer in particular the second installer, can check whether the access authorization information was received by the locking device in step c. and is now also being used to deny access authorization. It is preferably the same key that sent the access authorization information. The installer, in particular the second installer, can therefore check the successful commissioning with the same key that was used to carry out step c.
- the key itself carries out the verification.
- the access authorization may not depend on the key, in particular on the key identifier, but on the authorizations stored on the key, which can be verified using the identifier, for example.
- the key that sent the access authorization information to the locking device - in particular the above-mentioned second key - is granted access authorization so that the granting of access authorization can be verified.
- This is preferably a one-time access authorization for the key, in particular the second key.
- the granting of access authorization includes controlling the actuator in order to transfer the driver into the rotatable state.
- the denial of access authorization and/or the granting of access authorization may be a routine that is automatically executed by the system after step c. as part of the commissioning procedure.
- the method may comprise the following step: wireless transmission from the device to the key of a configuration message that a locking device is to be configured.
- This configuration message contains the information or is to be evaluated by the key to the effect that a locking device is to be configured.
- the key controls the locking device electronics accordingly so that it sends its identifier to the key and/or that the locking device electronics carries out step c. In particular, this can be followed by the refusal of access authorization and/or the granting of access authorization.
- the locking device used in the method preferably has a housing and an insert.
- the insert comprises a stator and the rotor.
- the stator is preferably attached to the housing in a form-fitting and/or force-fitting manner.
- the rotor is rotatably mounted in the stator. Because the stator and the housing are made in two parts, the stator can be inserted into different housings. This means that the housing can also be replaced on site if it proves to be unsuitable for installation or inoperable. This increases the effectiveness of commissioning.
- the insert preferably includes the locking device electronics and the actuator.
- the previously locked rotor can be unlocked using the actuator, so that the rotor and the driver connected to the rotor can rotate. Additionally or alternatively, the rotor can be coupled to the driver using the actuator.
- the locking device is preferably free of mechanical coding. This means that the rotation of the driver depends only on the user's electronic access authorization. Thus, a large number of locking devices have the same internal structure, such as a key channel, key withdrawal lock, electrical contacts, coupling element for the driver or the like. Accordingly, the key can be designed free of mechanical coding.
- the invention further comprises a system for commissioning a locking device at a location, in particular the locking device described above.
- a system for commissioning a locking device at a location in particular the locking device described above.
- the system comprises the electro-mechanical locking device with the locking device electronics, the actuator and the driver.
- the locking device is designed in particular as described above.
- the locking device is designed to carry out method steps, in particular steps a., b. and c. according to the method described above. In particular, the method steps described in connection with the locking device are carried out in the locking device.
- the system also includes the key, in particular the described key.
- the key is designed in particular to carry out the method steps according to the method described above, which are described in connection with the key.
- the system preferably comprises a computer program product for execution, in particular also storage, on a device, in particular the device described above.
- the computer program product is designed to carry out method steps of the described method on the device. In particular, the method steps that were previously described in connection with the device are thereby carried out on the device.
- the system may include the device and/or the computing unit.
- Fig.1 shows the system 2 purely schematically.
- This comprises an electro-mechanical locking device 30, here designed as a locking cylinder.
- the locking device 30 is inserted into a locking element 210 at a specific location 201-208 (see Fig.6 ) are used.
- various locking cylinders can be arranged as part of a locking system 200.
- Fig.6 shows a location overview plan of the locking system 200 with different locations 201-208, designed as different rooms.
- Each location 201-208 can be closed by a locking element 210, i.e. a door with a lock.
- Appropriate locking devices 30 are inserted into the locking elements 210.
- locations 201 and 205 are general rooms to which every user should have access and which form a first location area, while access to locations 202-204, 206-208 should only be granted to individual users. Locations 202-204, 206-208 form a second location area.
- Fig.1 that the system 2 comprises a key 20 and a device 10.
- a computing unit 60 can also be assigned to the system 2.
- the computing unit 60 is in particular a server, for example a virtual server in a cloud.
- the device 10 is in particular a mobile device, as explained in the general part of the description.
- the computing unit 60 and the mobile device 10 are designed for data communication, in particular wireless data communication.
- the mobile device can communicate with the computing unit 60 via the Internet and/or a telecommunications network.
- the mobile device 10 can be connected via a wireless Short-range connection, such as BLE or UWB, to communicate with key 20.
- the key 20 has a key shaft 21 for insertion into the locking device 30.
- the key 20 also has a button 22 for activating a communication connection between the key 20 and the device 10.
- a lighting device 23 on the key 20 corresponding signals that indicate the communication connection can be output.
- the lighting device 23 can indicate when a method step has been carried out or has failed.
- Electrical contacts are designed on the key shaft 21 as a transmission device 24 in order to transmit data and electrical energy to the locking device 30 and to receive data from the locking device 30.
- the locking device comprises a corresponding transmission device 37.
- the key 20 comprises an energy store in order to supply itself and the locking device 30 with electrical energy.
- the locking device 30 has a housing 31. On the housing 31 there is a stator 32 into which a rotor 33 is inserted. The key shaft 21 of the key 20 can be inserted into this rotor 33.
- the rotor 33 can only be turned by turning the key 20 if access authorization is present. If access authorization is not present, however, the rotor 33 remains locked. The access authorization is checked by the key 20 and the locking device 30.
- a driver 36 shown By rotating the rotor 33, i.e. when access authorization is present, a driver 36 shown, which in the present example is designed as a locking lug, can be rotated.
- the driver 36 is connected to the rotor 33 in a rotationally fixed manner, at least when the key 20 is inserted.
- a locking device electronics 34 is provided. This controls an actuator 35 of the locking device 30 in the configured state when access authorization is present. By appropriately controlling the actuator 35, the locking device 30 can allow the rotation of the rotor 33. If the rotation of the rotor 33 is permitted, the driver 36 is in a rotatable state. If the rotation of the rotor 33 is prevented, the driver 36 is in a non-rotatable state.
- the actuator 35 rotates an asymmetrical blocking element 39.
- the rotation of the blocking element 39 allows an unlocking movement of a locking bar 38.
- the locking bar 38 can engage in the stator 32 to block the rotation of the rotor 33.
- the rotation of the blocking element 39 allows the locking bar 38 to disengage from the stator 32.
- the locking device 30 includes an electronic identifier ID which is stored in the locking device electronics 34.
- the key 20 is designed without a mechanical coding. Thus, it can only be determined whether the user has authorization or not based on electronic access authorization information.
- the key 20 includes an electronic key identifier.
- the installer 70 can first mount the locking device 30 and then check it by means of steps 82 and 83 (not shown).
- the locking device 30 is in a factory state.
- the locking device electronics 34 can be caused to control the actuator 35 to unlock the rotor 33 using any mechanically suitable key 20. Due to the lack of mechanical coding, this applies to any key 20 whose transmission device 24 can be brought into contact with the transmission device 37 of the locking device.
- a generally valid access authorization information which is installed at the factory on every key 20 of the type, can be checked by the locking device 30.
- the installer 70 can very effectively install the locking devices 30 of the locking system 200. In this case, the installer 70 only has to ensure that the installer 70 installs the locking device 30 that is mechanically compatible with the locking element 210.
- the locking device 30 In the factory state, the locking device 30 lacks access authorization information that will be available for the locking system 200, the local area or the location of the installation during operation. In other words, steps 82 and 83 are carried out without the system 1 knowing the locking system affiliation of the locking device 30, the local area affiliation of the locking device 30 and the location affiliation of the locking device 30. This affiliation is only subsequently determined by the process steps that are described in the Figures 5 or 7 Thus, the locking devices 30 in their factory state are "bulk goods".
- the missing access authorization information may relate to a blacklist and/or cryptographic encryption information, in particular an encryption key.
- an access authorization check tailored to the locking system 200, the local area or the location is missing. Since an access authorization check in operation depends on the identifier ID and/or the key identifier, such an access authorization check in which the identifier ID and/or the key identifier are included is missing in the factory state.
- the installer in process steps 82, 83, 84, and possibly also in process steps 80, 81 is a first installer. He can carry out the mechanical installation and functional testing quickly and effectively without using the device 10.
- Access authorizations may have been assigned for key 20. This means that the same key 20 can be used to unlock a locking element on other locking devices that are already configured if the access authorization check is successful.
- Fig.5 illustrates, according to a first embodiment, further steps of the method 1 for commissioning the electro-mechanical locking device 30 at the location 201-208.
- Fig.5 shows purely schematically in a left column process steps that are primarily assigned to the installer 70 or the computing unit 60.
- the installer 70 of the Figure 5 can optionally correspond to a second installer.
- the second installer can use a different key 20 than the installer, whereby the keys of the two installers are mechanically identical.
- the second column shows process steps that are primarily associated with the device 10.
- the third column shows process steps that are primarily associated with the key 20.
- the fourth column shows process steps that are primarily associated with the locking device 30.
- step 125 the following steps can optionally follow and are not shown: Because the computing unit 60 knows the key identifier of the key 20 used for configuration and the identifier, a one-time access authorization is assigned for the key 20.
- the system 200 carries out an access authorization check and signals the access authorization. The installer can check this, for example, by turning the driver. Additionally or alternatively, in particular afterwards, a new access authorization check is carried out automatically or after a user input on the device 10, in which case the system 200 comes to the conclusion that access is to be denied to the key 20. This is displayed visually and/or acoustically on the device 10 and/or on the key 20.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Lock And Its Accessories (AREA)
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP22202296.4A EP4358043A1 (fr) | 2022-10-18 | 2022-10-18 | Procédé de mise en service d'un dispositif de verrouillage électromécanique |
| PCT/EP2023/078908 WO2024083877A1 (fr) | 2022-10-18 | 2023-10-18 | Procédé de fonctionnement d'un dispositif de verrouillage électromécanique |
| AU2023362354A AU2023362354B2 (en) | 2022-10-18 | 2023-10-18 | Method for operating an electromechanical locking device |
| EP23787145.4A EP4605913A1 (fr) | 2022-10-18 | 2023-10-18 | Procédé de fonctionnement d'un dispositif de verrouillage électromécanique |
| CN202380073090.4A CN120077416A (zh) | 2022-10-18 | 2023-10-18 | 用于调试机电锁定设备的方法 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP22202296.4A EP4358043A1 (fr) | 2022-10-18 | 2022-10-18 | Procédé de mise en service d'un dispositif de verrouillage électromécanique |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP4358043A1 true EP4358043A1 (fr) | 2024-04-24 |
Family
ID=83902898
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP22202296.4A Withdrawn EP4358043A1 (fr) | 2022-10-18 | 2022-10-18 | Procédé de mise en service d'un dispositif de verrouillage électromécanique |
| EP23787145.4A Pending EP4605913A1 (fr) | 2022-10-18 | 2023-10-18 | Procédé de fonctionnement d'un dispositif de verrouillage électromécanique |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP23787145.4A Pending EP4605913A1 (fr) | 2022-10-18 | 2023-10-18 | Procédé de fonctionnement d'un dispositif de verrouillage électromécanique |
Country Status (3)
| Country | Link |
|---|---|
| EP (2) | EP4358043A1 (fr) |
| CN (1) | CN120077416A (fr) |
| WO (1) | WO2024083877A1 (fr) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0816600A2 (fr) * | 1996-07-02 | 1998-01-07 | Sociedad de Gestion de Bienes de Equipo Electrico, S.L. (SGB) | Système à clé unique |
| US6147622A (en) * | 1998-09-16 | 2000-11-14 | S.D.S. Smart Data & Security Systems Ltd. | Electronic lock system |
| US6374653B1 (en) * | 1997-12-22 | 2002-04-23 | Security People, Inc. | Mechanical/electronic lock and key therefor |
| EP1914368A2 (fr) | 2006-10-18 | 2008-04-23 | ISEO SERRATURE S.p.A. | Serrure électronique pour portes et fenêtres |
| DE102015109789A1 (de) * | 2015-06-18 | 2016-12-22 | Inform Systems AG | Zugangskontrollsystem zur Zugangskontrolle zu einem Bereich und Verfahren zur Inbetriebnahme eines Zugangskontrollsystems zur Zugangskontrolle zu einem Bereich |
| EP1899924B1 (fr) | 2005-06-10 | 2017-08-30 | Assa Ab | Cle de verrouillage et son procede de fabrication |
| EP3300036A1 (fr) * | 2016-09-26 | 2018-03-28 | Aug. Winkhaus GmbH & Co. KG | Installation électronique de fermeture et procédé de fonctionnement d'une installation électronique de fermeture |
-
2022
- 2022-10-18 EP EP22202296.4A patent/EP4358043A1/fr not_active Withdrawn
-
2023
- 2023-10-18 EP EP23787145.4A patent/EP4605913A1/fr active Pending
- 2023-10-18 WO PCT/EP2023/078908 patent/WO2024083877A1/fr not_active Ceased
- 2023-10-18 CN CN202380073090.4A patent/CN120077416A/zh active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0816600A2 (fr) * | 1996-07-02 | 1998-01-07 | Sociedad de Gestion de Bienes de Equipo Electrico, S.L. (SGB) | Système à clé unique |
| US6374653B1 (en) * | 1997-12-22 | 2002-04-23 | Security People, Inc. | Mechanical/electronic lock and key therefor |
| US6147622A (en) * | 1998-09-16 | 2000-11-14 | S.D.S. Smart Data & Security Systems Ltd. | Electronic lock system |
| EP1899924B1 (fr) | 2005-06-10 | 2017-08-30 | Assa Ab | Cle de verrouillage et son procede de fabrication |
| EP1914368A2 (fr) | 2006-10-18 | 2008-04-23 | ISEO SERRATURE S.p.A. | Serrure électronique pour portes et fenêtres |
| DE102015109789A1 (de) * | 2015-06-18 | 2016-12-22 | Inform Systems AG | Zugangskontrollsystem zur Zugangskontrolle zu einem Bereich und Verfahren zur Inbetriebnahme eines Zugangskontrollsystems zur Zugangskontrolle zu einem Bereich |
| EP3300036A1 (fr) * | 2016-09-26 | 2018-03-28 | Aug. Winkhaus GmbH & Co. KG | Installation électronique de fermeture et procédé de fonctionnement d'une installation électronique de fermeture |
Non-Patent Citations (1)
| Title |
|---|
| "VIDEX SCORES AGAIN", LOCKSMITH LEDGER INTERNATIONAL, CYGNUS BUSINESS MEDIA, FORT ATKINSON, WI, US, vol. 60, no. 7, 1 June 2000 (2000-06-01), pages 8 - 10, 12, XP000976305, ISSN: 1050-2254 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4605913A1 (fr) | 2025-08-27 |
| WO2024083877A1 (fr) | 2024-04-25 |
| CN120077416A (zh) | 2025-05-30 |
| AU2023362354A1 (en) | 2025-05-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3103057B1 (fr) | Procédé d'accès à une baie physiquement sécurisée ainsi qu'infrastructure informatique | |
| EP4602580B1 (fr) | Procédé de mise en service d'un dispositif de verrouillage électromécanique | |
| WO2024083939A1 (fr) | Procédé pour mettre en fonctionnement un dispositif de verrouillage électromécanique | |
| EP3542350A1 (fr) | Système de contrôle d'accès avec mise à jour d'état automatique | |
| EP3007139B1 (fr) | Systeme de fermeture de porte | |
| EP2624223A2 (fr) | Procédé et dispositif de contrôle d'accès | |
| AT516288B1 (de) | Verfahren und Vorrichtung zum Verwalten von Zutrittsberechtigungen | |
| WO2019166216A1 (fr) | Système d'autorisation de conduite | |
| DE102015108026B4 (de) | Schließanlage und Verfahren zum Betrieb einer Schließanlage für eine Gebäudetür | |
| DE102005034618B4 (de) | Elektronische Schließeinrichtung und Schließverfahren | |
| EP4358043A1 (fr) | Procédé de mise en service d'un dispositif de verrouillage électromécanique | |
| WO2022180097A1 (fr) | Système de porte destiné à une ou plusieurs portes et contenant de multiples composants de porte ainsi qu'un premier bus de communication | |
| EP3027827B1 (fr) | Poignée de fenêtre, verrouillable de façon électromagnétique | |
| WO2022180088A1 (fr) | Procédé d'installation d'une pluralité de composants de porte | |
| EP3065110B1 (fr) | Verrou modulaire de haute securite et son procede de mise a jour | |
| DE102015108028B4 (de) | Verfahren zum Betrieb einer Schließanlage sowie Schließanlage | |
| DE102018114253A1 (de) | Verfahren zur Regelung eines Zugangsregimes zu einem Objekt, Schließeinheit und Schließsystem | |
| EP4050578A1 (fr) | Système de porte pour au moins une porte pourvue de plusieurs parties de porte, ainsi que d'un premier bus de communication | |
| WO2017144649A1 (fr) | Sécurisation d'autorisations d'accès à des installations fixes | |
| AU2023362354B2 (en) | Method for operating an electromechanical locking device | |
| EP4050545A1 (fr) | Procédé d'installation d'une pluralité de composants de porte | |
| EP2266292A1 (fr) | Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration | |
| CA3271090A1 (fr) | Procédé de fonctionnement d'un dispositif de verrouillage électromécanique | |
| EP2468025B1 (fr) | Procédé et dispositif pour gérer une cellule de radiotéléphonie privée | |
| CA3271089A1 (fr) | Procédé pour mettre en fonctionnement un dispositif de verrouillage électromécanique |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20241025 |