WO2024083878A1 - Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung - Google Patents
Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung Download PDFInfo
- Publication number
- WO2024083878A1 WO2024083878A1 PCT/EP2023/078910 EP2023078910W WO2024083878A1 WO 2024083878 A1 WO2024083878 A1 WO 2024083878A1 EP 2023078910 W EP2023078910 W EP 2023078910W WO 2024083878 A1 WO2024083878 A1 WO 2024083878A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- location
- locking
- key
- locking device
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00841—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
- G07C2009/00865—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication
Definitions
- the invention relates to a method for commissioning an electromechanical locking device at a location.
- the invention also shows a system for commissioning the locking device at a location, with which the method can be carried out.
- EP 1 899 924 B1 Keys are known from the prior art, for example EP 1 899 924 B1, which can be inserted into electro-mechanical locking devices and exchange data with the locking device. If the data exchange results in authorization, the key can be turned in the locking device. However, the electro-mechanical device must first be put into operation. For example, the locking device is first assigned an authorization and then inserted into a door lock during commissioning.
- the object of the present invention is to provide a method for commissioning an electro-mechanical locking device at a location that can be carried out as efficiently and/or safely as possible. Furthermore, the object of the present invention is to provide a corresponding system for carrying out the method.
- the object is achieved by the features of the independent claims.
- the dependent claims relate to preferred embodiments of the invention. Features and details that are described in connection with the method according to the invention also apply in connection with the system according to the invention and vice versa.
- a method that can be carried out with a system according to claim 15 and/or a system with which a method according to one of claims 1 to 14 can be carried out is protected.
- the invention shows a method for installing an electro-mechanical locking device at a location.
- the electro-mechanical locking device is preferably a locking cylinder, in particular a double or half cylinder, a furniture cylinder or a padlock or a similar device.
- the electro-mechanical locking device designed as a locking cylinder can be inserted into a lock (for example a mortise lock) on a door.
- the padlock can be arranged on a door, for example.
- the locking device can be arranged on or in various locking elements, e.g. on or in doors, gates, drawers, barriers.
- the location of the locking device can be identified, in particular unambiguously, via the "location".
- location Preferably, it is provided that several electro-mechanical locking devices are put into operation according to the method described below and the location is so specific that it only applies to one of the locking devices put into operation and not to several.
- the location may, for example, be a building and/or a cabinet, such as a switch cabinet, and/or a specific room within a building and/or a specific door. Furthermore, the location may also be outside a building, for example when using the locking device on a door or gate, a fence or a wall.
- Method step a First, in the process of the method according to the invention, a location-specific user input is received by a device for defining the location. This generates location information.
- the device is preferably a mobile device, in particular a smartphone, tablet or laptop.
- the device can also be a terminal that is attached in or to the building, for example to the wall, and is used for room and/or building control. It is preferably provided that the device can establish a connection to the Internet and/or to a telecommunications network.
- the device has input means, for example a keyboard and/or a touchscreen.
- the user preferably enters the input manually in the input device. This preferably involves receiving a manually entered, location-specific user input in step a.
- the input means serve in particular to enable the user to enter the location into the device.
- the device also preferably has output means; for example a screen, in particular a touchscreen, and/or a loudspeaker.
- the device preferably comprises electronics. The electronics serve in particular to process the user input and/or to output a message on the output means.
- the device "receives" the location-specific user input, which also includes the fact that the user input can be made using an external input device, for example a keyboard wirelessly connected to the device.
- an external input device for example a keyboard wirelessly connected to the device.
- the location-specific user input is made on the device, i.e. the input means is located directly on the device, for example the touchscreen or the keyboard of the device. The user thus manually enters information about the location on the device.
- the location-specific user input is made by the user entering information on the touchscreen of the smartphone or tablet.
- the location-specific user input is used to provide the device with information about the location, hereinafter referred to as location information.
- location information refers in particular to a user input of the location or a selection of the location. Examples of a user input of the location or location information are "hotel room 308", “office 416", “switch cabinet Luisenstrasse", “basement building no. 1" or an input on a two- or three-dimensional location overview map.
- This user input is particularly preferably carried out while the user, in particular the fitter, is on site, i.e. at the location defined here. It is particularly intended that this reception of the location-specific user input on the device only takes place when the fitter is on site together with the locking device to be installed.
- the fitter does not have to stand directly in front of the locking element into which the locking device is to be installed. is installed; especially not if the location is in an explosion-proof area or if there is no mobile phone reception in the immediate vicinity.
- the method according to the invention makes it possible for the user to select any locking device - which has not yet been configured - on site.
- an identifier is assigned to the defined location to form an ID-location assignment.
- the ID-location assignment can, for example, be a data set in which the appropriate location is recorded for the ID. However, it is also considered an "ID-location assignment" if, for example, the ID and the location are stored in different tables and only the link between ID and location is stored.
- the locking device preferably comprises locking device electronics.
- the method provides that a unique electronic identifier is assigned to the locking device and that this identifier is stored in the locking device electronics, in particular on a microchip.
- the identifier is, for example, a character string stored in the locking device.
- the assignment is made for the first time, which means that the specific identifier of the locking device is assigned to a location for the first time.
- the assignment is made after an existing ID-location assignment has been deleted, but an assignment is preferably not possible as long as an assignment exists for the current ID.
- Process step c After the ID-location assignment has been created, the device sends it to a processing unit.
- the ID and location can also be sent at different times, but the link between the ID and the associated location must be ensured.
- the computing unit can be located anywhere.
- the ID location assignment is preferably sent via the Internet or the telecommunications network.
- the device communicates with the computing unit wirelessly, in particular via the Internet or a telecommunications network.
- the computing unit can be a server, for example.
- the server can also be provided virtually, in particular as a cloud service.
- a corresponding database is stored in the computing unit.
- the ID-location assignment preferably takes place on site.
- this achieves the advantage that the identifier is assigned to the location in a secure manner and is made available to the computing unit as such an assignment. This assignment can be achieved efficiently by entering location information into the device.
- the method preferably also includes inserting the locking device into the associated locking element at the defined location.
- the locking element in particular door and/or lock, is already installed at the location at this time.
- the insertion takes place before, during or after method steps a, b, c - preferably immediately before or after the location-specific user input. In one example, the insertion takes place before step a.
- the identifier is at least indirectly sent to the device by the locking device.
- the device can receive the identifier at least indirectly from the locking device.
- the sending or receiving takes place at least partially wirelessly, in particular by means of active wireless transmission, e.g. via a radio connection.
- wireless short-range communication is used. This makes it possible to transmit the identifier when locking devices are already installed.
- the wireless connection is preferably limited to short distances, for example to distances of less than 20 meters. In this case, a appropriate short-range communication technology, such as Bluetooth Low Energy (BLE) or Ultra-Wideband (UWB) is used.
- BLE Bluetooth Low Energy
- UWB Ultra-Wideband
- the device is especially designed to receive corresponding wireless short-range communication signals.
- the locking device can send the identifier directly to the device, in particular wirelessly. As will be explained in more detail, however, it is preferably provided that the locking device first sends the identifier to a key and the key forwards the identifier to the device. Preferably, the sending takes place before step b.
- the assignment i.e. the formation of the ID-location assignment, is preferably carried out by the device, in particular in the device.
- the device receives the identifier of the locking device to be assigned.
- the device then combines the location information and the identifier to form the ID-location assignment.
- the electronics of the device can include an electronic processor.
- the location-specific user input can be made by selecting a location from a selection list.
- This selection list is sent from the computing unit to the device.
- the device receives the selection list from the computing unit. The user can select the appropriate location on the device, particularly while on site to carry out commissioning.
- location-specific user input is preferably carried out or supplemented by free text input.
- This free text input is carried out in particular on the device.
- the location-specific user input can also be made or completed by selecting on a location overview map.
- This location overview map is preferably sent from the computing unit to the device sent. Or the device receives the site overview plan from the computing unit.
- the selection list and/or the location overview plan is displayed on the device, in particular on the output means, in particular the screen.
- the selection is made by the user on the device.
- the location overview plan can, for example, be a room overview plan that graphically represents the position of rooms within a building, so that, for example, by clicking on a specific room or door, the location is selected, thereby providing the location-specific user input.
- the location overview plan can be a building overview plan on which the user selects a specific building in which the locking device is to be installed.
- the location overview plan can also represent the various locations on a map, for example locations in the form of buildings or control cabinets that are widely distributed from one another.
- the user creates new location information. This means that the user generates location information through the user input before this generated location information has been stored in the computing unit. This means that a location that is not stored as such in the computing unit can be taken into account as the installation location of the locking device. The user thus creates location information. This is conceivable in particular through free text input or through selection on the location overview map.
- the individual location-specific user input can also be made by a combination of several different or the same methods described above. For example, a location can first be selected from the selection list and then supplemented by text input. In a similar way, for example, a building can first be selected in the location overview plan and then The specific location can be defined using a more detailed location map, free text input, or the selection list.
- the method preferably takes into account the fact that there are so-called locking systems.
- locking systems there are several locking devices, which are put into operation in particular according to the method described here.
- the locking system provides for a specific access authorization concept. For example, several authorized persons can be assigned to the locking system, with each authorized person being assigned one or more of the locking devices as being authorized to access.
- Those authorized to access the building can be divided into authorization groups.
- the locking system can apply to an apartment building.
- One authorization group can be intended for the caretaker, who can close all locking devices, with the exception of the locking devices on the individual apartments.
- Another authorization group can be intended for the apartment owners, who can, for example, close the locking devices on the front door and their own apartment.
- the locking devices of a locking system belong to a common owner.
- a locking system is additionally or alternatively characterized in that the locking system comprises at least one list of blocked locking authorizations, which is referred to as a blacklist.
- the blocked locking authorizations can relate to one or more locking devices of the locking system.
- the at least one blacklist is preferably limited to a single locking system. In other words, different locking systems differ in that they each have their own blacklists.
- the locking system can additionally or alternatively be characterized by the fact that the locking system has its own encryption information, e.g. its own encryption key and/or its own encryption algorithm.
- the encryption information can also be referred to as cryptographic information and/or the encryption key referred to as a cryptographic key.
- different locking systems differ primarily in terms of the encryption information.
- the method comprises the following steps:
- Locking system selection is preferably made by a locking system user input into the device. This allows the user to select a corresponding locking system - especially before the location-specific user input.
- the user input is made in particular via the input device.
- the user preferably enters the locking system selection manually into the device.
- a selection list for the locking system selection is preferably displayed on the device, preferably on the output device, particularly preferably the screen. The selection is made by the user on the device. For example, the user enters the locking system on the touchscreen.
- the selected locking system is preferably assigned to the identifier of the locking device to form an ID-locking system assignment. This is done in particular by the device, preferably in the device.
- the device then preferably sends the ID locking system assignment to the computing unit.
- the locking system is selected from a predefined selection list.
- the user especially the on-site fitter, cannot create a new locking system.
- the ID locking system assignment and the ID location assignment can be combined to form an ID locking system location assignment. It is conceivable that in step c. the ID locking system location assignment is sent to the computing unit. Preferably, the locking system selection is taken into account in the location-specific user input.
- the device can have possible locations associated with at least one locking system stored electronically.
- the computing unit particularly after it has received the ID-locking system assignment, particularly preferably sends information about the possible locations that match the locking system to the device. Or the device receives possible locations of the locking system from the computing unit.
- the location-specific user input for defining the location is preferably first carried out by selecting the locking system and then selecting the location in the locking system.
- a selection list of locations is provided for this purpose, which only shows locations of the selected locking system.
- the location can be entered freely in text.
- the location can be selected using a location overview map of the locking system. This location overview map has already been described above. Preferably, it can be provided that only locations of the respective locking system are shown on the location overview map.
- a key in particular the key already mentioned above, is used in the method.
- This key has in particular a key shaft that can be inserted into the locking device.
- the key together with the key shaft is preferably designed in such a way that a torque can be transmitted to the locking device via the key shaft.
- the mechanical movement of the locking device is therefore preferably carried out with the key and not by a motor drive in the locking device.
- the key in particular via the key shaft, establishes an electrical connection to the locking device.
- the connection can be used to transmit data, in particular the identifier.
- the connection can be wireless or wired.
- “Wired” also referred to as non-wireless means that the connection is made via at least one conductor in the key that can be brought into electrical contact with the locking device electronics.
- the key and the locking device can comprise corresponding electrical contacts for this purpose.
- the electrical connection makes it possible to exchange data, especially not wirelessly, between the key and the locking device. Furthermore, it is possible to transfer electrical energy (also known as current) from the key to the locking device.
- the key preferably has an electronic key identifier, for example a character string stored in the key. Furthermore, the key is preferably designed for wireless communication with the device. The wireless communication takes place via active wireless transmission, e.g. via radio. In particular, short-range communication, for example via Bluetooth or ultrawideband (UWB), is used.
- active wireless transmission e.g. via radio.
- short-range communication for example via Bluetooth or ultrawideband (UWB)
- UWB ultrawideband
- the key preferably comprises electronics.
- the electronics can be used to carry out communication with the locking device and/or the device.
- the key identifier is sent from the key to the device.
- the device preferably sends the key identifier on to the computing unit.
- the computing unit can check, for example, which usage rights the key has and/or are to be assigned to the key.
- the device can send further data specifically to this one key.
- the identifier of the locking device is preferably sent indirectly by the locking device to the device.
- the locking device sends the identifier initially sends it to the key, in particular not wirelessly.
- the key then forwards the identifier of the locking device to the device, in particular wirelessly via short-range communication.
- the key is inserted with its key shaft in the locking device, while the locking device sends the identifier to the key.
- the key being inserted in the locking device can be a prerequisite for the locking device sending the identifier to the key.
- the key being inserted in the locking device can be a prerequisite for the key receiving the identifier from the locking device.
- the key may be inserted with the key shaft in the locking device while the key transmits the identifier to the device.
- the key being inserted in the locking device may be a prerequisite for the key to send the identifier to the device.
- the key being inserted in the locking device may be a prerequisite for the device to receive the identifier from the key.
- the key at least temporarily during the method, is inserted with its key shaft in the locking device in order to thereby supply the locking device with electrical energy.
- the key at least temporarily during the method, is inserted with its key shaft in the locking device, wherein the locking device electronics of the locking device are woken up by the insertion of the key to send the identifier.
- the key sends the identifier to the device wirelessly.
- a button on the key that is pressed by the user, whereupon the communication connection between the key and the device is established. This allows the key to be in a power-saving mode most of the time until the button is pressed.
- the following step takes place before the identifier is sent to the device: a configuration message is sent wirelessly from the device to the key. This configuration message contains the information or is to be evaluated by the key to indicate that a locking device is to be configured. Based on this configuration message, it is preferably provided that the key controls the locking device electronics accordingly so that it sends its identifier to the key.
- the following method steps are preferably provided: i. Receipt of location and/or locking system-specific authorization information sent by the computing unit by the device.
- the authorization information is sent by the computing unit and received accordingly by the device. This preferably takes place after step c, i.e. after the ID-location assignment, in particular the ID-location-locking system assignment, has been sent to the computing unit. Based on this ID-location assignment, in particular on the ID-location-locking system assignment, the computing unit can compile the required authorization information for the locking device and send it to the device.
- a data set can be transmitted from the computing unit to the device before step c, which enables the device to generate the authorization information based on the ID-location assignment, in particular on the ID-location-locking system assignment. This can be particularly useful if no data connection can be established between the device and the computing unit on site and the ID-location assignment is only transmitted to the computing unit later.
- the authorization information is location and/or locking system specific, which means that the authorization information matches the location and/or the locking system.
- the authorization information is at least locking system specific.
- the authorization information may contain a location- and/or locking system-specific blacklist and/or location- and/or locking system-specific electronic encryption information, in particular a location- and/or locking system-specific encryption key.
- the locking device then receives authorization information.
- the authorization information can correspond to the authorization information that the device received from the computing unit.
- the authorization information that was received from the computing unit is modified in the device and/or key.
- authorization information is sent from the device to the key.
- the authorization information is modified in the key and sent to the locking device. It can thus be provided that between the receipt of authorization information by the key and the sending of the authorization information to the locking device, the key modifies the authorization information, in particular the encryption information.
- the encryption information received by the locking device can be composed of different pieces of information.
- the encryption information includes information that is specific to the entire locking system and information that is only specific to the location.
- the encryption information can thus be location- and locking system-specific. Because exactly one locking device is assigned to a location, location-specific encryption information is also understood to be encryption information that is specific to the identifier.
- the authorization information can, for example, first be sent wirelessly to the key and then sent, modified or unmodified, wired or wirelessly, from the key to the locking device.
- the locking device comprises an electromechanical actuator and a driver.
- the driver is preferably designed to be rotationally asymmetrical and, in the rotatable state, enables a locking element, in particular a door, to be unlocked or locked during rotation.
- the driver can move the latch or bolt in the lock.
- the driver can correspond to a locking lug of a locking cylinder.
- the driver can include recesses in which locking elements can slide in order to unlock the shackle of a padlock.
- the electro-mechanical actuator is controlled by the locking device electronics of the locking device in order to achieve rotation of the driver.
- the actuator can thus cause the driver to be transferred from a non-rotatable state to a rotatable state. If the locking device is designed as a locking cylinder and is inserted into a corresponding lock, for example, the driver can move the latch or the bolt in the lock in the rotatable state.
- the electro-mechanical actuator in turn, enables the driver to rotate when controlled by the locking device electronics. During operation of the locking device, this happens in particular depending on whether the authorization information stored in the locking device matches the corresponding authorization information of the inserted key.
- the actuator can be designed as a solenoid or as an electric motor.
- the locking device can comprise a rotor.
- the rotor is at least indirectly mounted in a housing.
- the actuator can be used to unlock the previously locked rotor, so that the rotor and the driver connected to the rotor can rotate.
- the rotor can be coupled to the driver by means of the actuator.
- the locking device is preferably free of mechanical coding. This means that the rotation of the driver depends only on the user's electronic locking authorization. Thus, a large number of locking devices have the same internal structure, such as a key channel, key withdrawal lock, electrical contacts, coupling element for the driver or the like.
- the electro-mechanical actuator is activated by waking up the locking device electronics at any time before receiving the authorization information in accordance with step ii. in order to achieve rotation of the driver.
- the authorization information is only received by the locking device during the commissioning described here, in particular in step ii.
- the locking device can be rotated with any key.
- the arbitrary key does not contain any authorization information or very general authorization information that is accepted by the locking device.
- An arbitrary key is understood to mean a key that is compatible with a large number of locking devices that have the same mechanical internal structure. For example, these keys must be geometrically insertable and removable from the locking channel, have suitable electrical contacts for electrically contacting the corresponding contacts of the locking device, and the like. Because the driver can be rotated before step ii using any key, i.e. structurally suitable keys, it is possible to first check the mechanical functioning of the locking device, in particular before the identifier of the locking device is stored in the computing unit.
- step a Inserting the key, so that the driver can be rotated by activating the actuator. The driver is then rotated, particularly manually.
- the driver is rotated into a position in which the locking device can be inserted into the locking element (for example into the door); and inserting the locking device into or onto the locking element at that location.
- the driver of a padlock is rotated into a position that allows the shackle to be opened.
- the key used comprises a, in particular multi-colored, lighting device which indicates a method step of the method described here and/or a state of the key and/or a state of the locking device and/or a result of a method step of the method described here, in particular the failure of a method step.
- the key preferably comprises an electrical energy storage device.
- the key checks, in particular before sending the identifier of the locking device, whether a limit of a charge state of the key's electrical energy storage device is undershot. If the limit is undershot, the process is aborted. In particular, the key then sends a corresponding message to the device.
- the locking device used in the method preferably has a housing and an insert.
- the insert comprises a stator and the rotor.
- the stator is preferably attached to the housing in a form-fitting and/or force-fitting manner.
- the rotor is rotatably mounted in the stator. Because the stator and the housing are made in two parts, the stator can be inserted into different housings. This means that the housing can also be replaced on site if it turns out not to be suitable for installation.
- the insert preferably includes the locking device electronics and the actuator.
- the invention further comprises a system for commissioning a locking device at a location, in particular the locking device described above.
- the system comprises a computer program product for executing, in particular also storing, on a device, in particular the device described above.
- the computer program product is designed to carry out method steps of the described method on the device.
- the method steps that were previously described in connection with the device are thereby carried out on the device.
- the system preferably comprises an electro-mechanical locking device with an electronic identifier and locking device electronics.
- the locking device is designed in particular as described above.
- the locking device is designed to carry out method steps according to the method described above. In particular, the method steps described in connection with the locking device are carried out in the locking device.
- the system also comprises the key, in particular the key described.
- the key is designed in particular to carry out the method steps according to the method described above, which are described in connection with the key.
- the system may include the device and/or the computing unit.
- Fig. 1 shows a system according to the invention for carrying out the method according to the invention according to all embodiments
- Fig. 2 shows an insert of a locking device of the system according to the invention from Fig. 1,
- Fig. 3 is an exploded view of the insert from Fig. 2,
- Fig. 5 further method steps of the method according to the invention according to a first embodiment
- Fig. 6 is a schematic representation of locations of a locking system used in the method according to the invention according to all embodiments.
- Fig. 7 further method steps of the method according to the invention according to a second embodiment.
- Fig. 1 shows the system 2 purely schematically.
- This comprises an electromechanical locking device 30, here designed as a locking cylinder.
- the locking device 30 is inserted into a locking element 210 at a specific location 201-208 (see Fig. 6).
- Fig. 6 shows a location overview plan of the locking system 200 with different locations 201-208, designed as different rooms.
- Each location 201-208 is connected by a locking element 210, i.e. a door with Lock, lockable.
- Corresponding locking devices 30 are inserted into the locking elements 210.
- Fig. 1 shows that the system 2 comprises a key 20 and a device 10.
- a computing unit 60 can also be assigned to the system 2.
- the computing unit 60 is in particular a server, for example a virtual server in a cloud.
- the device 10 is in particular a mobile device, as explained in the general part of the description.
- the computing unit 60 and the mobile device are designed for data communication, in particular wireless data communication.
- the mobile device can communicate with the computing unit 60 via the Internet and/or a telecommunications network.
- the mobile device can communicate with the key 20 via a wireless short-range communication connection, for example BLE or UWB.
- the key 20 has a key shaft 21 for insertion into the locking device 30.
- the key 20 also has a button 22 for activating a communication connection between the key 20 and the device 10.
- a light device 23 on the key 20 can be used to output corresponding signals that indicate the communication connection.
- the light device 23 can indicate when a method step has been carried out or has failed.
- Electrical contacts are formed on the key shaft 21 in order to transmit data and electrical energy to the locking device 30 and to receive data from the locking device 30.
- the key 20 comprises an energy storage device in order to supply itself and the locking device 30 with electrical energy.
- Fig. 1 shows that the locking device 30 has a housing 31. On the housing 31 there is a stator 32 into which a rotor 33 is inserted. The key shaft 21 of the key 20 can be inserted into this rotor 33.
- the rotor 33 can be rotated by turning the key 20, provided that the correct authorization information is exchanged between the key 20 and the locking device 30.
- the driver 36 shown can be rotated.
- the driver 36 and the rotor 33 are connected in a rotationally secure manner, at least when the key 20 is inserted.
- a locking device electronics 34 is provided. This controls an actuator 35 of the locking device 30. By appropriately controlling the actuator 35, the locking device 30 can allow the rotation of the rotor 33.
- the driver 36 is in a rotatable state. If the rotation of the rotor 33 is prevented, the driver 36 is in a non-rotatable state.
- the actuator 35 rotates an asymmetrical blocking element 39.
- the rotation of the blocking element 39 allows an unlocking movement of a locking bar 38.
- the locking bar 38 can engage in the stator 32 to block the rotation of the rotor 33.
- the rotation of the blocking element 39 allows the locking bar 38 to disengage from the stator 32.
- the locking device 30 includes an electronic identifier ID which is stored in the locking device electronics 34.
- the key 20 is designed without a mechanical coding. Thus, it can only be determined on the basis of electronic authorization information whether the user has authorization or not.
- Fig. 4 illustrates method steps 85 of the method according to the invention, which can be carried out optionally. Accordingly, within the scope of method 1 for commissioning the electromechanical locking device 30 at a location 201-208, the following can optionally be carried out:
- a user 70 also referred to as an installer
- 81 Inserting the stator 32 and the rotor 33: The stator 32 and the rotor 33 are then assembled, in particular as a common insert, into the appropriate housing 31 .
- Inserting the key 20 Preferably, the key 20 is inserted into the locking device 30 before the locking device 30 is mounted in the locking element 210 (e.g. lock).
- the locking element 210 e.g. lock
- Unlocking The actuator 35 is controlled by the locking device electronics 34 so that it allows movement of the driver 36.
- the user 70 can turn the driver 36, in particular manually, by transmitting torque from the key 20 to the rotor 33 via the key shaft 21. This allows the mechanical functioning of the locking device 30 to be checked. If necessary, the driver 36 can be turned into the required position so that the locking device 36 can be inserted into the closure element 210 and thus mounted therein.
- Fig. 5 illustrates further steps of method 1 for commissioning the electro-mechanical locking device 30 at the location 201-208.
- Fig. 5 shows purely schematically in a left column the method steps that are primarily assigned to the user 70 or the computing unit 60.
- the second column shows method steps that are primarily assigned to the device 10.
- the third column shows method steps that are primarily assigned to the key 20.
- the fourth column shows method steps that are primarily assigned to the locking device 30.
- the device 10 receives a corresponding input from the user 70 so that the program, in particular a computer program product, can be started on the device 10 is started. This also means that a program that has already been started is called up and thus placed on the user interface of the device 10.
- Reception for user authentication In this method step, the user 70 can be authenticated by the device 10 to determine whether he is authorized for further method steps. For this purpose, a direct input, for example a password, can be made on the device 10. However, reception also means that the device 10 records, for example, biometric data of the user 70 in order to ensure authentication.
- Reception for device-side wireless communication In this method step, it can be taken into account that wireless communication between the device 10 and the key 20 and/or between the device 10 and the computing unit 60 only takes place when the user 70 confirms this by a corresponding input.
- Issuing a request to press a button on the key In this method step, the user 70 can be prompted by means of the device 10, for example a display on the screen, to press the button 22 on the key 20.
- step 107 Checking the charging status: In particular, after receiving in step 106 that the button 22 has been pressed, the key 20 a check of the charge level of the energy storage of the key 20.
- step 110 Sending the configuration message: However, if the charge level is not too low according to method step 108, the key 20 informs the device 10 of this and a configuration message is sent from the device 10 to the key 20.
- the content of this configuration message is that a new locking device 30 is to be configured.
- a message is preferably output on the device 10, which informs the user 70 that the key 20 must now be inserted into the locking device 30. For example, a corresponding output is made on the display of the device 10.
- the user 70 then inserts the key 20 into the locking device 30.
- the locking device 30 and receives in this way the Identifier.
- the key 20 then forwards the identifier to the device 10 via the wireless communication link with the device 10.
- the computing unit 60 sends this information to the device 10. In the device 10, either method step 116 or 117 then takes place based on this information.
- Locking system selection In the next step, a locking system selection can be made on device 10, in which - as explained in detail in the general part of the description - the user 70 selects a locking system 200. For this purpose, a locking system user input 72 is made by the user 70 on device 10.
- the user 70 makes a location-specific user input 71 on the device 10 so that the device 10 can receive the location-specific user input 71.
- the location-specific user input 71 is a location-specific user input 71 on the device 10 so that the device 10 can receive the location-specific user input 71.
- the location-specific user input 71 is a location-specific user input 71 on the device 10 so that the device 10 can receive the location-specific user input 71.
- the location-specific user input 71 the location-specific user input
- step a. of the method according to the invention corresponds to step a. of the method according to the invention.
- the device 10 uses the identifier of the locking device 30 forwarded in accordance with method step 113. During the assignment, the device 10 forms an ID-location assignment; that is, a connection between the identifier and the defined location 201-208. This corresponds to step b. of the method according to the invention.
- a connection can also be made between the defined locking system 200 and the defined location 201-208 by generating an ID-locking system assignment.
- an ID-location-locking system assignment is generated.
- the ID location assignment can be sent from the device 10 to the computing unit 60.
- the ID locking system assignment is also sent to the computing unit 60 or the ID location locking system assignment is sent. This corresponds to step c. of the method according to the invention.
- the computing unit 60 sends authorization information, as explained in the general part of the description, to the device 20.
- the authorization information is based in particular on the ID-location assignment and/or on the ID-locking system assignment.
- the arrow between method steps 120 and 121 shows the chronological order of the steps in the device 10, namely that the device 10 first sends the assignment in step 120 and then receives the access authorization information in step 121.
- 122 Sending the authorization information to the key 20: As soon as the device 10 has received the authorization information in method step 121, it can send it to the key 20, in particular wirelessly, according to method step 122.
- Receipt of the authorization information at the locking device 30 The authorization information forwarded by the key 20 is received in the locking device 30, in particular the locking device electronics 34, according to method step 124. This at least partially defines in the locking device 30 which signals a key 20 must or may not send to the locking device electronics 34, so that the actuator 35 can be controlled such that the rotor 33 can be rotated by means of the key 20.
- the locking device 30 can send a confirmation to the device 10, in particular via the key 20, which states that the authorization information has been received accordingly. This is done via the key 20 (not shown).
- Fig. 7 illustrates further steps of the method 1 for commissioning the electro-mechanical locking device 30 at the location 201-208 according to a second embodiment.
- the methods 1 according to the invention and the systems 2 of the two embodiments are identical - with the exception of the differences described below:
- Locking system selection can be made on the device 10, in which - as explained in detail in the general part of the description - the user 70 selects a locking system 200.
- a locking system user input 72 is made by the user 70 on the device 10.
- step 117 the optional steps 103 and 104 may follow, as described in connection with Fig. 5.
- Step 111 This is followed by step 111. Step 111 describes in this
- the key 20 is designed in such a way that it is woken up by insertion.
- steps 105 and 106 can be omitted, so that no button operation on the key 20 is necessary.
- the key 20 is connected non-wirelessly to the locking device 30 and receives the identifier in this way. The key 20 then forwards the identifier to the device 10 via the wireless communication connection with the device 10.
- the charge level of the energy storage device of the key 20 can also be checked according to step 107. If the charge level is too low, the process is aborted. In particular, a corresponding message is sent to the device 10, informing the user 70 that the charge level is too low.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
Claims
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US19/121,600 US20260112220A1 (en) | 2022-10-18 | 2023-10-18 | Method for operating an electromechanical locking device |
| EP23787146.2A EP4602580B1 (de) | 2022-10-18 | 2023-10-18 | Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung |
| AU2023361988A AU2023361988B2 (en) | 2022-10-18 | 2023-10-18 | Method for operating an electromechanical locking device |
| CN202380073071.1A CN120167071A (zh) | 2022-10-18 | 2023-10-18 | 用于使机电锁定设备投入运行的方法 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP22202298.0 | 2022-10-18 | ||
| EP22202298.0A EP4358044A1 (de) | 2022-10-18 | 2022-10-18 | Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024083878A1 true WO2024083878A1 (de) | 2024-04-25 |
Family
ID=83902777
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2023/078910 Ceased WO2024083878A1 (de) | 2022-10-18 | 2023-10-18 | Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20260112220A1 (de) |
| EP (2) | EP4358044A1 (de) |
| CN (1) | CN120167071A (de) |
| AU (1) | AU2023361988B2 (de) |
| WO (1) | WO2024083878A1 (de) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4704057A1 (de) | 2024-08-28 | 2026-03-04 | dormakaba Schweiz AG | Verfahren zum ändern einer konfiguration einer sperrvorrichtung |
| WO2026046699A1 (de) | 2024-08-28 | 2026-03-05 | Dormakaba Schweiz Ag | Schliesssystem und verfahren zur inbetriebnahme eines schlüssels |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120096131A1 (en) * | 2008-09-30 | 2012-04-19 | Honeywell International Inc. | Systems and methods for interacting with access control devices |
| EP2701124A1 (de) * | 2012-08-21 | 2014-02-26 | Bekey A/S | Kontrolle des Zugangs zu einem Standort |
| US20170092030A1 (en) * | 2015-09-30 | 2017-03-30 | Ford Global Technologies, Llc | System and method for range-boosted key fob |
| EP1899924B1 (de) | 2005-06-10 | 2017-08-30 | Assa Ab | Verriegelungsschlüssel und verfahren zu seiner herstellung |
| EP3300036A1 (de) * | 2016-09-26 | 2018-03-28 | Aug. Winkhaus GmbH & Co. KG | Elektronische schliessanlage und verfahren zum betrieb einer elektronischen schliessanlage |
| US20200098216A1 (en) * | 2016-06-14 | 2020-03-26 | dormakaba Switzerland Ltd | Method and devices for configuring access control devices at an installation site |
| EP4053808A1 (de) * | 2021-03-01 | 2022-09-07 | Honeywell International Inc. | Gebäudezugang unter verwendung einer mobilen vorrichtung |
-
2022
- 2022-10-18 EP EP22202298.0A patent/EP4358044A1/de not_active Withdrawn
-
2023
- 2023-10-18 EP EP23787146.2A patent/EP4602580B1/de active Active
- 2023-10-18 WO PCT/EP2023/078910 patent/WO2024083878A1/de not_active Ceased
- 2023-10-18 US US19/121,600 patent/US20260112220A1/en active Pending
- 2023-10-18 AU AU2023361988A patent/AU2023361988B2/en active Active
- 2023-10-18 CN CN202380073071.1A patent/CN120167071A/zh active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1899924B1 (de) | 2005-06-10 | 2017-08-30 | Assa Ab | Verriegelungsschlüssel und verfahren zu seiner herstellung |
| US20120096131A1 (en) * | 2008-09-30 | 2012-04-19 | Honeywell International Inc. | Systems and methods for interacting with access control devices |
| EP2701124A1 (de) * | 2012-08-21 | 2014-02-26 | Bekey A/S | Kontrolle des Zugangs zu einem Standort |
| US20170092030A1 (en) * | 2015-09-30 | 2017-03-30 | Ford Global Technologies, Llc | System and method for range-boosted key fob |
| US20200098216A1 (en) * | 2016-06-14 | 2020-03-26 | dormakaba Switzerland Ltd | Method and devices for configuring access control devices at an installation site |
| EP3300036A1 (de) * | 2016-09-26 | 2018-03-28 | Aug. Winkhaus GmbH & Co. KG | Elektronische schliessanlage und verfahren zum betrieb einer elektronischen schliessanlage |
| EP4053808A1 (de) * | 2021-03-01 | 2022-09-07 | Honeywell International Inc. | Gebäudezugang unter verwendung einer mobilen vorrichtung |
Non-Patent Citations (2)
| Title |
|---|
| "VIDEX SCORES AGAIN", LOCKSMITH LEDGER INTERNATIONAL, CYGNUS BUSINESS MEDIA, FORT ATKINSON, WI, US, vol. 60, no. 7, 1 June 2000 (2000-06-01), pages 8 - 10, 12, XP000976305, ISSN: 1050-2254 * |
| ANONYMOUS: "Cutoff voltage - Wikipedia", 5 January 2022 (2022-01-05), XP093030048, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=Cutoff_voltage&oldid=1063815877> [retrieved on 20230308] * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4704057A1 (de) | 2024-08-28 | 2026-03-04 | dormakaba Schweiz AG | Verfahren zum ändern einer konfiguration einer sperrvorrichtung |
| WO2026046699A1 (de) | 2024-08-28 | 2026-03-05 | Dormakaba Schweiz Ag | Schliesssystem und verfahren zur inbetriebnahme eines schlüssels |
| WO2026046698A1 (de) | 2024-08-28 | 2026-03-05 | Dormakaba Schweiz Ag | Verfahren zum ändern einer konfiguration einer sperrvorrichtung |
| DE102024124579A1 (de) | 2024-08-28 | 2026-03-05 | Dormakaba Schweiz Ag | Schließsystem und Verfahren zur Inbetriebnahme eines Schlüssels |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4602580A1 (de) | 2025-08-20 |
| US20260112220A1 (en) | 2026-04-23 |
| AU2023361988A1 (en) | 2025-05-01 |
| CN120167071A (zh) | 2025-06-17 |
| AU2023361988B2 (en) | 2026-04-23 |
| EP4358044A1 (de) | 2024-04-24 |
| EP4602580B1 (de) | 2026-03-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3542350B1 (de) | Zugangskontrollsystem mit automatischer statusaktualisierung | |
| EP4602580B1 (de) | Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung | |
| EP3103057B1 (de) | Verfahren zum zugang zu einem physisch abgesicherten rack sowie computernetz-infrastruktur | |
| EP2977964B1 (de) | Verfahren zur nutzerbezogene Berechtigungen erfordernden Steuerung eines Gerätes über ein mobiles Endgerät | |
| WO2024083939A1 (de) | Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung | |
| EP2956913A1 (de) | Anordnung zum autorisierten ansprechen mindestens eines in einem gebäude befindlichen bauelements | |
| DE10134262A1 (de) | Fernsteuerbare Türschließvorrichtung | |
| WO2018166942A1 (de) | Verfahren zur zugangskontrolle | |
| EP1321901B1 (de) | Verfahren zur Regelung des Zutrittsregimes zu einem Objekt | |
| EP4050577A1 (de) | Verfahren zur inbetriebnahme eines türsystems | |
| EP3096299B1 (de) | Schliessanlage und verfahren zum betrieb einer schliessanlage für eine gebäudetür | |
| EP4358043A1 (de) | Verfahren zur inbetriebnahme einer elektro-mechanischen sperrvorrichtung | |
| EP3582192B1 (de) | Verfahren zur regelung eines zugangsregimes zu einem objekt, schliesseinheit und schliesssystem | |
| WO2022180088A1 (de) | Verfahren zur installation von mehreren türkomponenten | |
| EP3065110B1 (de) | Modulares hochsicherheitsschloss und updateverfahren hierfür | |
| EP3096298B1 (de) | Verfahren zum betrieb einer schliessanlage und schliessanlage | |
| EP4050545A1 (de) | Verfahren zur installation von mehreren türkomponenten | |
| DE102004056987A1 (de) | Schließvorrichtung und Schließanlage, umfassend wenigstens eine Schließvorrichtung | |
| WO2019080985A1 (de) | Elektromechanisches verschlusssystem unter verwendung von einem schwenkhebel-, drehriegel-, kompressionsverschluss | |
| EP1828993A1 (de) | Zutrittskontrollanlage mit mehreren schliessvorrichtungen | |
| CA3271089A1 (en) | Method for commissioning an electromechanical locking device | |
| DE102024104177A1 (de) | Verfahren und System zum Betätigen eines intelligenten Schlosses sowie Computerprogrammprodukt | |
| DE202005022088U1 (de) | Elektronische Schließeinrichtung | |
| CH710781A2 (de) | Zugangskontrollverfahren, Zugangskontrollanordnung und Zugangskontrollgerät. | |
| DE202005022089U1 (de) | ELektronische Schließeinrichtung |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23787146 Country of ref document: EP Kind code of ref document: A1 |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 202517035365 Country of ref document: IN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202380073071.1 Country of ref document: CN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: AU2023361988 Country of ref document: AU |
|
| ENP | Entry into the national phase |
Ref document number: 2023361988 Country of ref document: AU Date of ref document: 20231018 Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023787146 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2023787146 Country of ref document: EP Effective date: 20250514 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWP | Wipo information: published in national office |
Ref document number: 202380073071.1 Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 202517035365 Country of ref document: IN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2023787146 Country of ref document: EP |
|
| WWG | Wipo information: grant in national office |
Ref document number: 2023787146 Country of ref document: EP |