[go: up one dir, main page]

HK1242032B - First entry notification - Google Patents

First entry notification Download PDF

Info

Publication number
HK1242032B
HK1242032B HK18101127.4A HK18101127A HK1242032B HK 1242032 B HK1242032 B HK 1242032B HK 18101127 A HK18101127 A HK 18101127A HK 1242032 B HK1242032 B HK 1242032B
Authority
HK
Hong Kong
Prior art keywords
mobile device
lock
guest
information
reader
Prior art date
Application number
HK18101127.4A
Other languages
Chinese (zh)
Other versions
HK1242032A1 (en
Inventor
Halvor Aase
Original Assignee
Assa Abloy Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Assa Abloy Ab filed Critical Assa Abloy Ab
Publication of HK1242032A1 publication Critical patent/HK1242032A1/en
Publication of HK1242032B publication Critical patent/HK1242032B/en

Links

Description

首次进入通知First entry notification

相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS

本申请要求于2014年9月10日提交的美国临时专利申请No.62/048702的权益,兹将其全部内容以引证的方式合并于本文中。This application claims the benefit of U.S. Provisional Patent Application No. 62/048,702, filed September 10, 2014, which is hereby incorporated by reference in its entirety.

技术领域Technical Field

本公开一般涉及访问控制系统以及操作访问控制系统的方法。The present disclosure generally relates to access control systems and methods of operating access control systems.

背景技术Background Art

智能卡、芯片卡或集成电路卡(ICC)为具有嵌入式集成电路的任何袖珍卡。智能卡通常由塑料制成。智能卡的一个常见用途是用于酒店等的安全。A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with an embedded integrated circuit. Smart cards are typically made of plastic. A common use of smart cards is for security in hotels, etc.

酒店和其他多房间设施常使用与用于物理保护设施内的房间的访问控制系统相分离的物业管理系统。例如,酒店传统上使用它们的物业管理系统来管理和分发客房并追踪交易,诸如客人在餐厅、服务员、迷你酒吧的消费和其他室内消费。在客人在酒店前台登记入住期间,通常每间客房都在物业管理系统创建新的客人账户。Hotels and other multi-room facilities often utilize property management systems that are separate from the access control systems used to physically secure the rooms within the facility. For example, hotels have traditionally used their property management systems to manage and assign guest rooms and track transactions such as guest spending at restaurants, waitstaff, mini-bars, and other in-room purchases. During guest check-in at the hotel front desk, a new guest account is typically created in the property management system for each room.

发明内容Summary of the Invention

在客人能够绕过前台登记入住手续的环境中,酒店面临新的挑战。这些挑战中的其中一个与在物业管理系统里完成客人登记入住手续有关,虽然客人从未来到前台办理登记入住。人们期望能让客人绕过前台以使客人体验行政上更好和更少的负担。然而,不使客人到达前台的情况下,需要一种方式将客人的入住从访问控制系统传回物业管理系统,虽然这两种系统为单独和分立的系统。In an environment where guests can check in without the front desk, hotels face new challenges. One of these challenges is completing a guest check-in in the property management system, even though the guest never came to the front desk to check in. There's a desire to allow guests to bypass the front desk to make the guest experience more administratively efficient and less burdensome. However, without requiring the guest to visit the front desk, a way is needed to communicate the guest's check-in from the access control system back to the property management system, even though these two systems are separate and independent.

因此,本公开的一个方面允许访问控制系统检测、记录和自动分发关于给定电子钥匙第一次到达或进入给定的‘离线锁’的信息。以前,这种信息的自动分发对于‘在线锁’已是可能的,但是对于‘离线锁’是不可能的。Thus, one aspect of the present disclosure allows an access control system to detect, record, and automatically distribute information about the first time a given electronic key arrives at or enters a given 'offline lock.' Previously, automatic distribution of this information was possible for 'online locks,' but not for 'offline locks.'

‘在线锁’是具有内置网络能力的锁,该网络能力使锁能够自动向访问控制系统回报事件。典型事件可以是钥匙使用、门打开等等。使用的典型网络可以是有线或无线以太网、射频网络等等。An 'online lock' is a lock with built-in networking capabilities that enables it to automatically report events to the access control system. Typical events might be key usage, door opening, etc. Typical networks used might be wired or wireless Ethernet, RF networks, etc.

相反地,‘离线锁’是不具有这种网络能力的锁,因此,没有先前向访问控制系统自动回报锁事件的装置。In contrast, an 'offline lock' is a lock that has no such network capabilities and, therefore, has no means of automatically reporting lock events to the access control system.

在一些实施方式中,提出的访问控制系统包括下面的组件:In some embodiments, the proposed access control system includes the following components:

a1)访问码/证书的生成:生成能够被存储在电话(或其他移动设备)的并且然后在锁处使用的电子钥匙;a1) Generation of access codes/credentials: Generates an electronic key that can be stored on a phone (or other mobile device) and then used at the lock;

a2)电子钥匙到目标电话/设备的安全分发;a2) Secure distribution of electronic keys to target phones/devices;

a3)电话/设备上用来存储电子钥匙并且通常使用射频(RF)通信将电子钥匙发送给锁的软件;a3) Software on the phone/device that stores the electronic key and sends it to the lock, typically using radio frequency (RF) communications;

a4)从电话/设备接收电子钥匙、解密电子钥匙并且决定是否授权访问的离线锁电子产品和固件。a4) Offline lock electronics and firmware that receives the electronic key from the phone/device, decrypts the electronic key, and decides whether to authorize access.

在一些实施方式中,电子钥匙可经由电子钥匙递送路径分发给移动设备。作为非限制性实例,电子钥匙是响应外部系统(例如,物业管理系统)的请求而产生的。钥匙安全地分发到预期接收者的电话/移动设备上的软件应用上。依据加密要求、顾客偏好等等,这种分发使用设备可用的标准网络和协议,比如,Wifi或蜂窝数据。当电话/移动设备被呈现给访问控制系统内的锁时,钥匙经由RF、蓝牙、红外线或一些其他的非接触式递送机制被发送到电子锁产品,在电子锁产品内,锁(例如,固件)上的访问控制逻辑检查钥匙且确定是否授权访问。In some embodiments, an electronic key may be distributed to a mobile device via an electronic key delivery path. As a non-limiting example, an electronic key is generated in response to a request from an external system (e.g., a property management system). The key is securely distributed to a software application on the intended recipient's phone/mobile device. Depending on encryption requirements, customer preferences, etc., this distribution uses standard networks and protocols available to the device, such as Wi-Fi or cellular data. When the phone/mobile device is presented to a lock within an access control system, the key is sent to the electronic lock product via RF, Bluetooth, infrared, or some other contactless delivery mechanism. Within the electronic lock product, the access control logic on the lock (e.g., firmware) checks the key and determines whether access is authorized.

在一些实施方式中,锁是离线的,这就意味着锁本身不能经由共享网络向访问控制系统报告所产生的信息。在所提议的系统中,与钥匙递送路径反向的路径用来将信息从锁传回并且到访问控制系统。不是使用‘在线锁’可用的专用网络,而是使用了电话/移动设备可用的网络。这支持更多的‘离线锁’被用在访问控制系统中,这样大大降低了与实施一系统相关的总成本(例如,因为不需要专用配线或联网组件来支持报告机构)。In some embodiments, the lock is offline, meaning the lock itself cannot report generated information to the access control system via a shared network. In the proposed system, a path reverse to the key delivery path is used to transmit information from the lock back to the access control system. Rather than using a dedicated network available to 'online locks,' the network available to phones/mobile devices is used. This allows more 'offline locks' to be used in access control systems, significantly reducing the overall cost associated with implementing a system (e.g., because no dedicated wiring or networking components are required to support the reporting mechanism).

关于返回路径,当电话/移动设备呈现给锁时,来自锁的信息经由RF、蓝牙、红外线或一些其他非接触式递送机制从电子锁产品和固件被发送到电话/移动设备的软件应用。包含在该通信内的信息可包括但不限于:当前时间(例如,对应于交易时间)、锁的身份、访问控制决定的结果(是否授权访问)以及该钥匙是否首次在该锁上使用或该钥匙是否首次同任一一把锁一起使用。软件应用然后使用电话/移动设备的可用网络和/或协议将该信息发送回访问控制系统的发起部。一旦从电话/移动设备接收到该信息,访问控制系统的发起部可登记该钥匙已达成目的地且已被使用。另外,到达/首次进入(first entry)信息可从访问控制系统的各个点发送回其他外部系统(例如,物业管理系统)。Regarding the return path, when the phone/mobile device is presented to the lock, information from the lock is sent from the electronic lock product and firmware to the phone/mobile device's software application via RF, Bluetooth, infrared, or some other contactless delivery mechanism. Information included in this communication may include, but is not limited to: the current time (e.g., corresponding to the transaction time), the lock's identity, the result of the access control decision (whether access is granted), and whether this is the first time the key has been used on that lock or with any lock. The software application then sends this information back to the origination portion of the access control system using the phone/mobile device's available network and/or protocol. Upon receiving this information from the phone/mobile device, the origination portion of the access control system can register that the key has reached its destination and has been used. Additionally, arrival/first entry information can be sent from various points in the access control system back to other external systems (e.g., a property management system).

虽然本公开的实例将主要结合酒店或类似类型的多房间设施的访问控制系统来讨论,但应理解的是,本公开的实施方式并不限制于此。作为一些非限制实例,本公开的实施方式可被用在访问控制系统的以下类型:酒店(有客人达到其房间);住宅(有工人到达家);办公室(有职员达到开始工作)等等。While examples of the present disclosure will primarily be discussed in conjunction with access control systems for hotels or similar types of multi-room facilities, it should be understood that embodiments of the present disclosure are not limited thereto. As some non-limiting examples, embodiments of the present disclosure may be used in the following types of access control systems: hotels (where guests arrive at their rooms); residences (where workers arrive at their homes); offices (where employees arrive to start work), and the like.

在本公开的酒店实施的实施方式的具体实例中,可出现下面这些步骤:(1)酒店操作员在酒店安排物业管理系统请求为客人生成房间访问钥匙;(2)生成电子钥匙,并发送电子钥匙到该客人的电话/移动设备上的访问控制系统应用上;(3)客人到达酒店,呈现电话机以打开合适的锁;(4)将信息(例如,房间标识符/成功/首次使用/等等)发送回电话应用;(5)电话应用将上述信息发送回访问控制系统的发起部;然后,(6)信息还分发返回给酒店操作员。一旦酒店操作员接收到信息,该信息可潜在地与其他信息(例如,步骤(5)期间哪个网络携带电子钥匙和访问信息往来于移动设备)一起存储在物业管理系统数据库内。应理解,在一些实施方式中,上面所列的步骤中的某些可并行/同时执行而非顺次执行。作为非限制实例,步骤(4)、(5)和/或(6)可在同一交易中发生,如在步骤(3)中客人将电话机呈现给合适的锁时所使用的一样,因此,免除了客人多次向锁呈现电话机的需要。In a specific example of an embodiment of a hotel implementation of the present disclosure, the following steps may occur: (1) The hotel operator arranges for the property management system to request that a room access key be generated for a guest at the hotel; (2) An electronic key is generated and sent to the access control system application on the guest's phone/mobile device; (3) The guest arrives at the hotel and presents the phone to open the appropriate lock; (4) Information (e.g., room identifier/success/first use/etc.) is sent back to the phone application; (5) The phone application sends the above information back to the initiator of the access control system; and then, (6) the information is also distributed back to the hotel operator. Once the hotel operator receives the information, the information can potentially be stored in the property management system database along with other information (e.g., which network carried the electronic key and access information to and from the mobile device during step (5)). It should be understood that in some embodiments, some of the steps listed above may be performed in parallel/simultaneously rather than sequentially. As a non-limiting example, steps (4), (5) and/or (6) may occur in the same transaction as that used when the guest presents the phone to the appropriate lock in step (3), thereby eliminating the need for the guest to present the phone to the lock multiple times.

可从附图和下面的详细描述中进一步理解本发明。尽管本描述记载了特定细节,但应理解,本发明的某些实施方式可在没有这些特定细节的情况下实施。也应理解的是,在一些实例中,众所周知的电路、组件和技术未详细示出,以避免使对本发明的理解晦涩。The present invention can be further understood from the accompanying drawings and the following detailed description. Although this description records specific details, it should be understood that certain embodiments of the present invention can be practiced without these specific details. It should also be understood that in some instances, well-known circuits, components, and techniques are not shown in detail to avoid obscuring the understanding of the present invention.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

结合附图来描述本公开:The present disclosure is described with reference to the accompanying drawings:

图1为描绘根据本公开的实施方式的通信系统的方框图;FIG1 is a block diagram illustrating a communication system according to an embodiment of the present disclosure;

图2为描绘根据本公开的至少一些实施方式的移动设备的组件的方框图;2 is a block diagram depicting components of a mobile device according to at least some embodiments of the present disclosure;

图3为描绘根据本公开的至少一些实施方式的锁/读取器的组件的方框图;3 is a block diagram depicting components of a lock/reader according to at least some embodiments of the present disclosure;

图4为描绘根据本公开的实施方式的生成和传送钥匙到移动设备的方法的流程图;4 is a flow chart depicting a method of generating and transmitting keys to a mobile device according to an embodiment of the present disclosure;

图5为描绘根据本公开的实施方式的报告首次交互数据的方法的流程图;FIG5 is a flowchart depicting a method for reporting first interaction data according to an embodiment of the present disclosure;

图6为描绘根据本公开的实施方式的分发首次交互数据的方法的流程图;FIG6 is a flowchart illustrating a method for distributing first interaction data according to an embodiment of the present disclosure;

图7为描绘根据本公开的实施方式的使用钥匙递送路径和钥匙递送路径的反向路径的步骤的流程图;7 is a flow chart depicting steps for using a key delivery path and a reverse path of the key delivery path according to an embodiment of the present disclosure;

图8为描绘根据本公开的实施方式的响应于在物业管理系统接收到首次进入的指示执行登记入住处理的方法的流程图;以及8 is a flow chart depicting a method for performing a check-in process in response to receiving an indication of a first entry at a property management system according to an embodiment of the present disclosure; and

图9为描绘根据本公开的实施方式的生成直接去房间登记入住报告的方法的流程图。9 is a flow chart depicting a method of generating a direct-to-room check-in report according to an embodiment of the present disclosure.

具体实施方式DETAILED DESCRIPTION

随后的描述仅提供实施方式,而不是旨在限制权利要求的范围、适用性和构造。相反,随后的描述将为本领域的技术人员提供实施所描述的实施方式的启用描述。应当理解,在不脱离所附权利要求书的精神和范围的情况下,可以对元件的功能和布置进行各种改变。The following description provides only embodiments and is not intended to limit the scope, applicability, and configuration of the claims. Instead, the following description will provide those skilled in the art with an enabling description for implementing the described embodiments. It should be understood that various changes may be made to the function and arrangement of elements without departing from the spirit and scope of the appended claims.

下面的描述将提供系统的各种实施方式或特性,所述系统可包括促进多个组件之间交互的访问控制系统。虽然结合与酒店等的物业管理系统交互的访问控制系统讨论了本公开的实施方式,但应理解本公开的实施方式并不限于此。The following description will provide various embodiments or features of a system that may include an access control system that facilitates interaction between multiple components. Although embodiments of the present disclosure are discussed in conjunction with an access control system that interacts with a property management system of a hotel or the like, it should be understood that embodiments of the present disclosure are not limited thereto.

现在参考图1-9,将根据本公开的至少一些实施方式描述与访问控制系统和操作访问控制系统的方法相关的各种细节和特征。首先参考图1,将根据本公开的至少一些实施方式描述通信系统100。系统100示出为包括一个或多个通信网络104、访问控制网络108和可选择的信赖网络112。虽然被描述为两个分离且不同的网络,但是应理解,通信网络104可作为单一的网络实施。同样地,尽管网络104和信赖网络112被描述为分离的网络,但应该理解,网络可被组合或一个网络(例如,信赖网络112)可通过通信隧道(例如,虚拟专用网(VPN)、广域网(WAN)等等)叠加在通信网络104的顶部。因此,在不偏离本公开的范围的情况下,通信网络104可包括叠加在其上的信赖网络112。With reference now to Figures 1-9, various details and features related to access control systems and methods of operating access control systems will be described in accordance with at least some embodiments of the present disclosure. Referring first to Figure 1, a communication system 100 will be described in accordance with at least some embodiments of the present disclosure. System 100 is shown as including one or more communication networks 104, an access control network 108, and an optional trust network 112. Although described as two separate and distinct networks, it should be understood that the communication network 104 can be implemented as a single network. Similarly, although the network 104 and the trust network 112 are described as separate networks, it should be understood that the networks can be combined or one network (e.g., the trust network 112) can be overlaid on top of the communication network 104 via a communication tunnel (e.g., a virtual private network (VPN), a wide area network (WAN), etc.). Thus, without departing from the scope of the present disclosure, the communication network 104 can include the trust network 112 overlaid thereon.

访问控制网络108可提供一个或多个访问控制服务器140与多个读取器128、登记入住设备148以及访问控制系统的其他组件之间的连接。因此,访问控制网络108可支持物理访问控制系统(PACS)等的管理和实施。访问控制网络108可使用任何类型的已知通信协议来携带在连接到访问控制网络的组件之间的信息。可在访问控制网络108内使用的该协议或网络的非限制实例包括RS-232、RS-485、韦根协议、以太网、以太网供电(PoE)、ZigBee、Wi-Fi(例如,IEEE 802.11,IEEE 802.11的变体或IEEE 802.11的拓展)、互联网协议(IP)网络或任何其他类型的有线或无线协议。The access control network 108 can provide connectivity between one or more access control servers 140 and a plurality of readers 128, check-in devices 148, and other components of the access control system. Thus, the access control network 108 can support the management and implementation of physical access control systems (PACS), among others. The access control network 108 can use any type of known communication protocol to carry information between components connected to the access control network. Non-limiting examples of such protocols or networks that can be used within the access control network 108 include RS-232, RS-485, Wiegand, Ethernet, Power over Ethernet (PoE), ZigBee, Wi-Fi (e.g., IEEE 802.11, a variant of IEEE 802.11, or an extension of IEEE 802.11), an Internet Protocol (IP) network, or any other type of wired or wireless protocol.

通信网络104可对应用于在兼容的通信设备之间携带信息的私人的、半私人的或公共通信网络。在一些实施方式中,通信网络104可对应不可信或不安全的通信网络。通信网络104的非限制实例包括电话网络、蜂窝网络、IMS网络、广域网(例如,因特网)、局域网、IP网、SNMP网或任何其他已知类型的网络构架。电子邮件消息、SMS消息、MMS消息、SNMP消息、使用HTTP或SHTTP传输的消息或使用HTTP或SHTTP传输的消息的变体、使用FTP交换的消息、使用RTP或UDP交换的消息等等中的一个或多个可被用来在访问控制服务器140和移动设备116之间携带信息。在一些实施方式中,也可使用基于IP的语音(VoIP)等等在访问控制服务器140和移动设备116之间携带信息。The communication network 104 may correspond to a private, semi-private, or public communication network for carrying information between compatible communication devices. In some embodiments, the communication network 104 may correspond to an untrusted or unsecured communication network. Non-limiting examples of the communication network 104 include a telephone network, a cellular network, an IMS network, a wide area network (e.g., the Internet), a local area network, an IP network, an SNMP network, or any other known type of network architecture. One or more of email messages, SMS messages, MMS messages, SNMP messages, messages transmitted using HTTP or SHTTP or variants thereof, messages exchanged using FTP, messages exchanged using RTP or UDP, and the like may be used to carry information between the access control server 140 and the mobile device 116. In some embodiments, voice over IP (VoIP) and the like may also be used to carry information between the access control server 140 and the mobile device 116.

读取器128可对应于任何类型的交互设备或者限制或控制对一个或多个受保护的资产进行访问的交互设备的集合。在一些实施方式中,读取器128可被配置为经由通信信道136与移动设备116直接交换通信。通信信道136在某些实施方式中可以是非接触式通信信道。可选择地或另外地,通信信道136可以是基于接触的通信信道。在一些实施方式中,射频(RF)波形式的电磁辐射可用于在通信信道136上携带信息。可选择地或另外地,通信信道136可利用光、磁、声音或任何其他媒介来在读取器128和移动设备116之间携带信息。通信信道136也可被表征为被用来交换信息的通信协议。在一些实施方式中,信号调制(例如,振幅调制、频率调制、相位调制及其组合和其变体等等)被用来在读取器128和移动设备116之间传送数据。通信信道136上使用的(多个)协议的一些非限制实例包括ISO14443、ISO15693、ISO18092、FeliCa、近场通信(NFC)、蓝牙、Wi-Fi(例如,802.11N,及其变体或对其的扩展)、ZigBee、GSM、及它们的组合等等中限定的协议。应进一步理解,依据移动设备116和读取器128的能力,在设备之间能够建立多个通信信道136。例如,读取器128和移动设备116可使用第一协议(例如,蓝牙或低功耗蓝牙(BLE))建立第一通信信道以及利用第二协议(例如NFC、红外线等等)建立第二通信信道。应理解,通信信道136可对应于只有当移动设备116和读取器128在彼此预定距离内(例如,对于NFC来说距离小于0.5米,对于BLE来说距离小于50米或者对于Wi-Fi来说距离小于200米)才能创建的基于相近度的通信信道。通信信道136可进一步表征为由设备(例如,读取器128和移动设备116)用来彼此认证的认证协议。通信信道136上可使用的认证协议的实例包括SEOS和FIDO。Reader 128 may correspond to any type of interactive device or a collection of interactive devices that restrict or control access to one or more protected assets. In some embodiments, reader 128 may be configured to exchange communications directly with mobile device 116 via communication channel 136. Communication channel 136 may be a contactless communication channel in some embodiments. Alternatively or additionally, communication channel 136 may be a contact-based communication channel. In some embodiments, electromagnetic radiation in the form of radio frequency (RF) waves may be used to carry information on communication channel 136. Alternatively or additionally, communication channel 136 may utilize light, magnetism, sound, or any other medium to carry information between reader 128 and mobile device 116. Communication channel 136 may also be characterized as a communication protocol used to exchange information. In some embodiments, signal modulation (e.g., amplitude modulation, frequency modulation, phase modulation, combinations thereof, and variations thereof, etc.) is used to transmit data between reader 128 and mobile device 116. Some non-limiting examples of the protocol(s) used on the communication channel 136 include protocols defined in ISO 14443, ISO 15693, ISO 18092, FeliCa, near field communication (NFC), Bluetooth, Wi-Fi (e.g., 802.11N, and its variants or extensions thereto), ZigBee, GSM, combinations thereof, and the like. It should be further understood that, depending on the capabilities of the mobile device 116 and the reader 128, multiple communication channels 136 can be established between the devices. For example, the reader 128 and the mobile device 116 can establish a first communication channel using a first protocol (e.g., Bluetooth or Bluetooth Low Energy (BLE)) and a second communication channel using a second protocol (e.g., NFC, infrared, etc.). It should be understood that the communication channel 136 can correspond to a proximity-based communication channel that can only be established when the mobile device 116 and the reader 128 are within a predetermined distance of each other (e.g., less than 0.5 meters for NFC, less than 50 meters for BLE, or less than 200 meters for Wi-Fi). The communication channel 136 can be further characterized as an authentication protocol used by devices (eg, reader 128 and mobile device 116) to authenticate each other. Examples of authentication protocols that can be used over the communication channel 136 include SEOS and FIDO.

尽管文中使用了术语“读取器”来指用于控制对受保护资产(例如,诸如房间的门、保险箱等的物理资产)的访问的设备或设备集合,但应理解,术语“读取器”、“锁”等等可交替使用。例如,图1所示的联网读取器128也可称为‘在线锁’。同理,作为在文中进一步讨论的,非联网读取器132可同义地称为‘离线锁’。换句话说,术语“锁”、“读取器”以及其他类似术语的使用可用于描述电机械设备或用于保护和保障诸如物理资产的资产的设备集合。此外,文中所讨论的读取器或锁可用来保护和确保逻辑资产安全,比如,银行账户、电脑网络资源等等。Although the term "reader" is used herein to refer to a device or collection of devices used to control access to a protected asset (e.g., a physical asset such as a room door, a safe, etc.), it should be understood that the terms "reader," "lock," and the like may be used interchangeably. For example, the networked reader 128 shown in FIG. 1 may also be referred to as an 'online lock.' Similarly, as discussed further herein, the non-networked reader 132 may be synonymously referred to as an 'offline lock.' In other words, the use of the terms "lock," "reader," and other similar terms may be used to describe an electromechanical device or collection of devices used to protect and secure an asset, such as a physical asset. Additionally, the readers or locks discussed herein may be used to protect and secure logical assets, such as bank accounts, computer network resources, and the like.

除了描述为被连接到访问控制网络108的传统读取器128之外,通信系统100还包括一个或多个非联网读取器132或‘离线锁’。非联网读取器132与读取器128的不同可在于:非联网读取器132可以不用原生地或永久地连接到访问控制网络108,这限制非联网读取器132与访问控制服务器140或基于特设的其他设备通信的能力。因此,本公开的实施方式暗示使用通信信道136来促进从非联网读取器132到移动设备116的信息通信,且最终将信息返回到访问控制服务器140和其他设备。因此,除了非联网读取器132缺少与访问控制网络108通信的通信接口或这种接口会被禁用或不用外,非联网读取器132的组件可类似于读取器128的组件或与读取器128的组件相同。In addition to the conventional readers 128 described as being connected to the access control network 108, the communication system 100 also includes one or more non-networked readers 132 or 'offline locks'. The non-networked readers 132 may differ from the readers 128 in that the non-networked readers 132 may not be natively or permanently connected to the access control network 108, which limits the ability of the non-networked readers 132 to communicate with the access control server 140 or other devices on an ad hoc basis. Thus, embodiments of the present disclosure contemplate the use of a communication channel 136 to facilitate the communication of information from the non-networked readers 132 to the mobile devices 116, and ultimately return the information to the access control server 140 and other devices. Thus, the components of the non-networked readers 132 may be similar to or identical to the components of the readers 128, except that the non-networked readers 132 may lack a communication interface for communicating with the access control network 108 or such interface may be disabled or unused.

移动设备116可对应于任何类型的电子设备,并且如名字所暗示的,电子设备在本质上是便携的。作为一些实例,移动设备116可对应于用户携带的蜂窝电话或智能电话。移动设备116的其他实例包括但不限于可穿戴设备(例如,眼镜、手表、鞋、衣服、珠宝、手带、贴纸型等等)。如图1所示,移动设备116可设有访问控制应用120,访问控制应用120存储一个或多个钥匙124。(多个)钥匙132可被传送到与尝试进入读取器128,132所保护的资产的移动设备116的持有者有关的读取器128,132上。例如,移动设备116的用户或持有者可将移动设备116呈现给读取器128,132。Mobile device 116 can correspond to any type of electronic device, and as the name implies, electronic devices are portable in nature. As some examples, mobile device 116 can correspond to a cellular phone or smart phone carried by a user. Other examples of mobile device 116 include, but are not limited to, wearable devices (e.g., glasses, watches, shoes, clothing, jewelry, wristbands, stickers, etc.). As shown in Figure 1, mobile device 116 can be provided with access control application 120, which stores one or more keys 124. (Multiple) keys 132 can be transmitted to readers 128, 132 associated with the holder of mobile device 116 attempting to enter the asset protected by reader 128, 132. For example, the user or holder of mobile device 116 can present mobile device 116 to reader 128, 132.

在一些实施方式中,(多个)钥匙124可经由通信网络104从访问控制服务器140分发给移动设备116。在其他实施方式中,(多个)钥匙124可经由登记入住设备148传送给移动设备116,登记入住设备148经由访问控制网络108从(多个)访问控制服务器140接收钥匙。在Davis等人的美国专利No.8074271和Lowe的美国专利No.7706778中描述了第一钥匙递送机制的额外细节,这两个专利在此都以引用的方式全部结合于本文中。在Elfstrom等人的美国专利No.8730004中描述了第二钥匙递送机制(例如,登记入住设备148的使用)的额外细节,该专利的全部内容在此以引用的方式结合于本文中。004专利描述的访问控制模块可具有类似于在文中描述的读取器128和132的特点。更进一步地,读取器128的联网和通信行为可类似于Alexander等人在美国专利No.8102799中描述的母子设备,该专利的全部内容在此以引用的方式全部结合于本文中。In some embodiments, the key(s) 124 may be distributed from the access control server 140 to the mobile device 116 via the communication network 104. In other embodiments, the key(s) 124 may be transmitted to the mobile device 116 via a check-in device 148, which receives the keys from the access control server(s) 140 via the access control network 108. Additional details of the first key delivery mechanism are described in U.S. Patent No. 8,074,271 to Davis et al. and U.S. Patent No. 7,706,778 to Lowe, both of which are hereby incorporated by reference in their entireties. Additional details of the second key delivery mechanism (e.g., the use of the check-in device 148) are described in U.S. Patent No. 8,730,004 to Elfstrom et al., the entire contents of which are hereby incorporated by reference in their entireties. The access control module described in the 004 patent may have features similar to those of the readers 128 and 132 described herein. Still further, the networking and communication behavior of the reader 128 may be similar to the parent-child device described in US Pat. No. 8,102,799 to Alexander et al., the entire contents of which are hereby incorporated by reference herein.

如果NFC被用于通信信道136,那么读取器128,132与移动设备116可使其接口/天线在读取器和/或移动设备116将彼此认证或相互彼此认证的点彼此感应耦合。紧接着认证,读取器128,132可从移动设备116请求钥匙124或多个钥匙或移动设备116可向读取器128,132提供钥匙124或多个钥匙。一旦从移动设备116接收到(多个)钥匙124,读取器128,132可分析(多个)钥匙124且确定(多个)钥匙124是否有效,并且如果有效,允许移动设备116的持有人/用户访问读取器128,132保护的资产。应理解,移动设备116可交替或另外被配置为分析从读取器128,132接收到的与做出访问控制的决定有关和/或与决定是否向读取器128,132提供(多个)钥匙124有关的信息。If NFC is used for the communication channel 136, the readers 128, 132 and the mobile device 116 may inductively couple their interfaces/antennas to one another at a point where the readers and/or mobile device 116 authenticate one another or each other. Following authentication, the readers 128, 132 may request the key 124 or keys from the mobile device 116 or the mobile device 116 may provide the key 124 or keys to the readers 128, 132. Upon receiving the key(s) 124 from the mobile device 116, the readers 128, 132 may analyze the key(s) 124 and determine whether the key(s) 124 are valid, and if so, allow the owner/user of the mobile device 116 access to the asset protected by the readers 128, 132. It should be understood that the mobile device 116 may alternatively or additionally be configured to analyze information received from the readers 128, 132 in connection with making access control decisions and/or in connection with determining whether to provide the key(s) 124 to the readers 128, 132.

如果BLE或其他的一些非感应协议(例如Wi-Fi)被用于通信信道136,那么,读取器128,132与移动设备116可在彼此配对或以其他方式连接之前执行发现例程以建立通信信道136。然而,建立信道136后,读取器128,132与移动设备116则可彼此认证并且交换例如(多个)钥匙124的相关信息,以使得访问控制决定被做出。如果做出积极的访问控制决定(例如,确定(多个)钥匙124是有效的且允许移动设备116访问读取器128,132保护的资产),那么,读取器128,132可发起一个或多个动作使得移动设备116的持有者或用户访问读取器128,132保护的资产。If BLE or some other non-sensing protocol (e.g., Wi-Fi) is used for the communication channel 136, then the readers 128, 132 and the mobile device 116 may perform a discovery routine to establish the communication channel 136 before pairing or otherwise connecting with each other. However, after establishing the channel 136, the readers 128, 132 and the mobile device 116 may authenticate each other and exchange information related to, for example, the key(s) 124 so that an access control decision can be made. If a positive access control decision is made (e.g., a determination that the key(s) 124 are valid and that the mobile device 116 is allowed to access the asset protected by the readers 128, 132), then the readers 128, 132 may initiate one or more actions to enable the owner or user of the mobile device 116 to access the asset protected by the readers 128, 132.

如在文中将进一步讨论的,从联网读取器128到访问控制服务器140和/或到物业管理系统144的信息的报告是相对直截了当的。例如,当用户将移动设备116呈现给读取器128时,关于交换的信息可从读取器128经由访问控制网络108提供给访问控制服务器140或物业管理系统144。另一方面,非联网读取器132不具有直接向访问控制服务器140或物业管理系统144报告相同类型的信息的原生能力。因此,人们期望非联网读取器132利用通信信道136作为用于将关于第一交互(或首次钥匙使用或其他一些交易信息)的信息传回访问控制服务器140或物业管理系统144的机构。此外,一旦移动设备116(或更具体地,移动设备116上运行的访问控制应用120)拥有来自非联网读取器132的交互数据,移动设备116可决定是否经由通信网络104向访问控制服务器140报告该信息或决定是否可以且应该利用信赖网络112直接向物业管理系统144报告该信息。作为非限制实例,非联网读取器132可向移动设备116指示:信赖网络112将被用来向物业管理系统114回传交互数据,这是因为信赖网络112可在管理物业管理系统144的实体(例如,酒店操作员)的控制下。在一些实施方式中,移动设备116可经由通信网络104和信赖网络112(经由两条报告消息)同时向(多个)访问控制服务器140和物业管理系统报告交互数据。As will be discussed further herein, reporting of information from the networked reader 128 to the access control server 140 and/or to the property management system 144 is relatively straightforward. For example, when a user presents the mobile device 116 to the reader 128, information regarding the exchange can be provided from the reader 128 to the access control server 140 or the property management system 144 via the access control network 108. On the other hand, the non-networked reader 132 does not have the native ability to report the same type of information directly to the access control server 140 or the property management system 144. Therefore, it is desirable for the non-networked reader 132 to utilize the communication channel 136 as a mechanism for transmitting information regarding the first interaction (or first key use or some other transaction information) back to the access control server 140 or the property management system 144. Furthermore, once the mobile device 116 (or more specifically, the access control application 120 running on the mobile device 116) has the interaction data from the non-networked reader 132, the mobile device 116 can decide whether to report the information to the access control server 140 via the communication network 104 or whether the information can and should be reported directly to the property management system 144 using the trusted network 112. As a non-limiting example, the non-networked reader 132 can indicate to the mobile device 116 that the trusted network 112 will be used to transmit the interaction data back to the property management system 114 because the trusted network 112 may be under the control of the entity that manages the property management system 144 (e.g., the hotel operator). In some embodiments, the mobile device 116 can report the interaction data to the access control server(s) 140 and the property management system simultaneously via the communication network 104 and the trusted network 112 (via two reporting messages).

现在参考图2,将根据本公开的至少一些实施方式描述移动设备116的额外细节。在其他项目中,移动设备116被示出为包括存储一个或多个操作系统(O/S)208和钥匙212的计算机存储器204。移动设备116还示出为包括处理器216、一个或多个驱动器220、用户接口224、读取器接口228、网络接口232和电力模块236。移动设备116的合适实例包括但不限于智能电话、PDA、笔记本电脑、个人电脑、平板电脑、上网本、可穿戴设备等等。2 , additional details of the mobile device 116 will be described in accordance with at least some embodiments of the present disclosure. Among other items, the mobile device 116 is shown as including computer memory 204 storing one or more operating systems (O/S) 208 and a key 212. The mobile device 116 is also shown as including a processor 216, one or more drivers 220, a user interface 224, a reader interface 228, a network interface 232, and a power module 236. Suitable examples of the mobile device 116 include, but are not limited to, smartphones, PDAs, laptops, personal computers, tablets, netbooks, wearable devices, and the like.

存储器204可对应于任何类型的非暂时性计算机可读媒介。在一些实施方式中,存储器204可包括易失性存储器或非易失性存储器以及针对它们的控制器。移动设备116中可使用的存储器204的非限制性实例包括RAM、ROM、缓存存储器、快闪存储器、固态存储器或其变体。The memory 204 may correspond to any type of non-transitory computer-readable medium. In some embodiments, the memory 204 may include volatile memory or non-volatile memory and controllers therefor. Non-limiting examples of the memory 204 that may be used in the mobile device 116 include RAM, ROM, cache memory, flash memory, solid-state memory, or variations thereof.

O/S 208可对应于一个或多个操作系统。O/S 208的性质可取决于移动设备116的硬件和移动设备116的构成因素。O/S 208可视为存储在存储器204内的处理器可执行的应用。O/S 208是特殊类型的通用应用,其使得存储在存储器204内的其他应用(例如,浏览器、电子邮件应用、SMS应用等等)利用移动设备116的各种硬件组件和(多个)驱动器220。在一些实施方式中,O/S 208可包括促进应用与移动设备116的某些硬件组件的交互的一个或多个API。此外,O/S 208可提供查看和访问存储在存储器208内的各种应用和存储在208内的其他数据的机构。O/S 208 may correspond to one or more operating systems. The nature of O/S 208 may depend on the hardware of mobile device 116 and the form factor of mobile device 116. O/S 208 can be considered an application stored in memory 204 and executable by the processor. O/S 208 is a special type of general-purpose application that enables other applications stored in memory 204 (e.g., a browser, an email application, an SMS application, etc.) to utilize the various hardware components of mobile device 116 and driver(s) 220. In some embodiments, O/S 208 may include one or more APIs that facilitate interaction between applications and certain hardware components of mobile device 116. In addition, O/S 208 may provide a mechanism for viewing and accessing the various applications stored in memory 208 and other data stored in 208.

钥匙212可类似于图1中描述的钥匙124或与图1中描述的钥匙124相同。在一些实施方式中,(多个)钥匙212可与O/S 208存储在相同的物理存储器204内。在其他实施方式中,(多个)钥匙212可存储在与用于存储O/S 208和其他应用的计算机存储器分离的物理计算机存储器内。甚至更具体地,(多个)钥匙212可保存在安全或加密的计算机存储器内,从而防止包含在其内的钥匙被未授权方获得或操纵。根据某些事件发生和/或用户输入,可预测对钥匙的访问。例如,在(多个)钥匙212要被分发给读取器128,132时,用户可被要求在用户接口224输入有效密码或PIN。Key 212 may be similar to or identical to key 124 described in FIG. 1 . In some embodiments, key(s) 212 may be stored in the same physical memory 204 as O/S 208. In other embodiments, key(s) 212 may be stored in physical computer memory separate from the computer memory used to store O/S 208 and other applications. Even more specifically, key(s) 212 may be stored in secure or encrypted computer memory to prevent the keys contained therein from being obtained or manipulated by unauthorized parties. Access to the keys may be predictable based on the occurrence of certain events and/or user input. For example, a user may be required to enter a valid password or PIN at user interface 224 before key(s) 212 are distributed to reader 128 , 132 .

处理器216可对应于包含在具有存储器204的移动设备116的壳体内一个或多个微处理器。在一些实施方式中,处理器216在单个集成电路(IC)或几个IC芯片上合并移动设备116的中央处理器(CPU)的功能。处理器216可以是多用途的可编程设备,其接收数字数据作为输入,根据存储在其内部存储器内的指令处理数字数据且提供结果作为输出。处理器216可因其具有内部存储器而实施顺序数字逻辑。正如众所周知的微处理器,处理器206可对以二进制数制表示的数字和符号进行运算。Processor 216 may correspond to one or more microprocessors contained within the housing of mobile device 116 with memory 204. In some embodiments, processor 216 incorporates the functionality of the central processing unit (CPU) of mobile device 116 on a single integrated circuit (IC) or several IC chips. Processor 216 may be a multi-purpose programmable device that receives digital data as input, processes the digital data according to instructions stored in its internal memory, and provides results as output. Processor 216 may implement sequential digital logic due to its internal memory. As is well known with microprocessors, processor 216 may operate on numbers and symbols represented in the binary number system.

(多个)驱动器220可对应于向移动设备116的硬件组件提供具体指令的硬件、软件和/或控制器,从而促进它们的操作。例如,用户接口224、读取器接口228和网络接口232可各自具有提供合适的控制信号影响其操作的专用驱动器220。(多个)驱动器220也可包括根据期望的协议适当控制各种硬件组件的软件或逻辑电路。例如,读取器接口228的驱动器220可适合确保读取器接口228遵从合适的基于相近度的协议(例如,BLE、NFC、红外线、超声波、IEEE802.11N等等)使得读取器接口228可交换通信。同样地,网络接口232的驱动器220可适合确保网络接口232遵循合适的网络通信协议(例如(在ISI模型的一层或多层的)TCP/IP、UDP、RTP、GSM、LTE、Wi-Fi等等)使得网络接口232能经由通信网络104、信赖网络112等等交换通信。正如能被领会的一样,(多个)驱动器220也可被配置为控制有线硬件组件(例如,USB驱动器、以太网驱动器等等)。Driver(s) 220 may correspond to hardware, software, and/or controllers that provide specific instructions to the hardware components of mobile device 116, thereby facilitating their operation. For example, user interface 224, reader interface 228, and network interface 232 may each have a dedicated driver 220 that provides appropriate control signals to affect their operation. Driver(s) 220 may also include software or logic circuitry that appropriately controls various hardware components according to desired protocols. For example, driver 220 for reader interface 228 may be adapted to ensure that reader interface 228 complies with an appropriate proximity-based protocol (e.g., BLE, NFC, infrared, ultrasound, IEEE 802.11N, etc.) so that reader interface 228 can exchange communications. Similarly, driver 220 for network interface 232 may be adapted to ensure that network interface 232 complies with an appropriate network communication protocol (e.g., TCP/IP (at one or more layers of the ISI model), UDP, RTP, GSM, LTE, Wi-Fi, etc.) so that network interface 232 can exchange communications via communication network 104, trusted network 112, etc. As can be appreciated, the driver(s) 220 may also be configured to control wired hardware components (eg, USB drivers, Ethernet drivers, etc.).

如上所提及的,用户接口224可包括一个或多个用户输入设备和/或一个或多个用户输出设备。在用户接口224内可包括的合适的用户输入设备的实例包括但不限于按钮、键盘、鼠标、笔、相机、麦克风等等。可包括在用户接口224内的合适的用户输出设备的实例包括但不限于显示屏、灯、扬声器等等。应理解,用户接口224也可包括组合的用户输入和用户输出设备,比如,触敏显示器等等。As mentioned above, the user interface 224 may include one or more user input devices and/or one or more user output devices. Examples of suitable user input devices that may be included in the user interface 224 include, but are not limited to, buttons, keyboards, mice, pens, cameras, microphones, and the like. Examples of suitable user output devices that may be included in the user interface 224 include, but are not limited to, display screens, lights, speakers, and the like. It should be understood that the user interface 224 may also include combined user input and user output devices, such as, touch-sensitive displays, and the like.

读取器接口228可对应于促进移动设备116和读取器128,132之间通信的硬件。读取器接口228可包括蓝牙接口(例如,天线和相关电路)、Wi-Fi/802.11N接口(例如,天线和相关电路)、NFC接口(例如,天线和相关电路)、红外线接口(例如,LED、光电二极管和相关电路)和/或超声接口(例如,扬声器、麦克风和相关电路)。在一些实施方式中,读取器接口228具体设置为促进经由通信信道136或多个通信信道136进行基于相近度的通信。The reader interface 228 may correspond to hardware that facilitates communication between the mobile device 116 and the readers 128, 132. The reader interface 228 may include a Bluetooth interface (e.g., an antenna and associated circuitry), a Wi-Fi/802.11N interface (e.g., an antenna and associated circuitry), an NFC interface (e.g., an antenna and associated circuitry), an infrared interface (e.g., an LED, a photodiode, and associated circuitry), and/or an ultrasound interface (e.g., a speaker, a microphone, and associated circuitry). In some embodiments, the reader interface 228 is specifically configured to facilitate proximity-based communication via the communication channel 136 or multiple communication channels 136.

网络接口232可包括促进与其他通信设备通过通信网络104或信赖网络112进行通信的硬件。如上所述,网络接口232可包括以太网端口、Wi-Fi卡、网络接口卡(NIC)、蜂窝接口(例如,天线、滤波器和相关电路)等等。网络接口232可被配置为促进移动设备116和通信网络104,112之间的连接且还可被配置为根据通信网络104,112使用的协议编码和解码通信(例如,数据包)。The network interface 232 may include hardware that facilitates communication with other communication devices over the communication network 104 or the trusted network 112. As described above, the network interface 232 may include an Ethernet port, a Wi-Fi card, a network interface card (NIC), a cellular interface (e.g., an antenna, filters, and associated circuitry), etc. The network interface 232 may be configured to facilitate connections between the mobile device 116 and the communication networks 104, 112 and may also be configured to encode and decode communications (e.g., data packets) according to the protocols used by the communication networks 104, 112.

电力模块236可包括内置电源(例如,电池)和/或电力转换器,电力转换器促进外部提供的交流电转换为用于向移动设备116的各种组件供电的直流电。在一些实施方式中,电力模块236也可包括浪涌保护电路的一些实施以保护移动设备116的组件免于电涌。The power module 236 may include a built-in power source (e.g., a battery) and/or a power converter that facilitates conversion of externally provided alternating current (AC) power to direct current (DC) power for powering the various components of the mobile device 116. In some embodiments, the power module 236 may also include some implementation of surge protection circuitry to protect components of the mobile device 116 from power surges.

现在参考图3,将根据本公开的至少一些实施方式描述非联网读取器132的额外细节。非联网读取器132在图3中描述,但应理解,类似的组件可包括在联网读取器128内。联网读取器128和非联网读取器132的区别可对应于下面这个事实:联网读取器128具有将读取器128经由有线或无线通信信道连接到访问控制网络108的网络接口。然而,非联网读取器132缺乏网络接口或这种接口被非联网读取器132去激活或者不可用。在一些实施方式中,与网络之间具有间歇但非连续的通信能力的读取器可被认为是非联网读取器132。因此,没有按需经由通信网络进行通信的能力的任何读取器可被认为是非联网读取器132。3 , additional details of the non-networked reader 132 will be described in accordance with at least some embodiments of the present disclosure. The non-networked reader 132 is depicted in FIG3 , but it should be understood that similar components may be included within the networked reader 128 . The distinction between the networked reader 128 and the non-networked reader 132 may correspond to the fact that the networked reader 128 has a network interface that connects the reader 128 to the access control network 108 via a wired or wireless communication channel. However, the non-networked reader 132 lacks a network interface or such an interface is deactivated or unavailable by the non-networked reader 132 . In some embodiments, a reader that has intermittent, but non-continuous, communication capability with a network may be considered a non-networked reader 132 . Thus, any reader that does not have the ability to communicate on demand via a communication network may be considered a non-networked reader 132 .

除了其他项外,读取器132示出为包括存储访问控制逻辑308、使用记录312和首次使用信息316的计算机存储器304。移动设备132还示出为包括处理器320、一个或多个驱动器324、用户接口224、证书接口332和电力模块336。Reader 132 is shown as including computer memory 304 storing, among other items, access control logic 308, usage log 312, and first use information 316. Mobile device 132 is also shown as including processor 320, one or more drivers 324, user interface 224, credential interface 332, and power module 336.

在一些实施方式中,访问控制逻辑308实施为固件,虽然作为软件或在专用集成电路(ASIC)中实施访问控制逻辑308也是可能的。在一些实施方式中,使用记录312可包含关于读取器132和证书之间的交互的信息,如移动设备116和传统的访问控制卡或钥匙链之间,可被称为证书类设备。可存储在使用记录312内的信息的类型包括与证书类设备交互的日期和时间、这种交互是否与特定设备的首次或随后的交互相对应、交互期间使用的哪把钥匙、访问控制逻辑308做出的访问控制决定的结果等等。除了使用记录312之外,存储器304也可包含针对钥匙首次使用实例和/或特定证书类设备与读取器132之间首次交互的事例的首次使用信息。In some embodiments, access control logic 308 is implemented as firmware, although it is also possible to implement access control logic 308 as software or in an application specific integrated circuit (ASIC). In some embodiments, usage log 312 may include information about interactions between reader 132 and credentials, such as between mobile device 116 and a traditional access control card or key fob, which may be referred to as a credential-like device. The types of information that may be stored in usage log 312 include the date and time of the interaction with the credential-like device, whether such interaction corresponds to the first or subsequent interaction with a particular device, which key was used during the interaction, the results of the access control decision made by access control logic 308, and the like. In addition to usage log 312, memory 304 may also include first-time use information for instances of first-time use of a key and/or the first instance of interaction between a particular credential-like device and reader 132.

在一些实施方式中,钥匙124,212可在其被首次使用后更新,从而让后续所有的读取器知道其不是作为该钥匙在访问控制系统中使用的第一事例来接收钥匙124,212。例如,钥匙124,212在首次传输到读取器128,132后,可用旗标或标识更新钥匙124,212。该钥匙124,212所用的随后传输或使用包括表示钥匙不再是首次使用的更新旗标或标识。因此,当读取器128,132接收到钥匙124,212且该钥匙未被标记为先前使用过,那么,读取器128,132将知道在其首次使用期间接收钥匙124,212。这条信息可同交易时间、移动设备116的身份、读取器128,132的身份以及是否同意或拒绝访问一起保存在首次使用信息316内。首次使用信息316和/或来自使用记录312的信息可随后由读取器132经由通信信道136传回移动设备116,随后传输到(多个)访问控制服务器140和/或物业管理系统144。In some embodiments, a key 124, 212 can be updated after its first use, so that all subsequent readers know that they are not receiving the key 124, 212 as the first instance of that key being used in an access control system. For example, after the key 124, 212 is first transmitted to a reader 128, 132, the key 124, 212 can be updated with a flag or identifier. Subsequent transmissions or uses of the key 124, 212 include an updated flag or identifier indicating that the key is no longer being used for the first time. Thus, when a reader 128, 132 receives a key 124, 212 and the key is not marked as previously used, the reader 128, 132 will know that it received the key 124, 212 during its first use. This information can be stored in first-use information 316 along with the transaction time, the identity of the mobile device 116, the identity of the reader 128, 132, and whether access was granted or denied. The first-time usage information 316 and/or information from the usage log 312 may then be transmitted by the reader 132 back to the mobile device 116 via the communication channel 136 and subsequently transmitted to the access control server(s) 140 and/or the property management system 144 .

读取器132的处理器320本质上类似于移动设备116的处理器。在一些实施方式中,相较于处理器216的处理能力,处理器320的处理能力可以是有限的。举个例子,处理器320可包括IC芯片或多个IC芯片,IC芯片或多个IC芯片被配置为执行硬件或存储在存储器304内的指令。The processor 320 of the reader 132 is substantially similar to the processor of the mobile device 116. In some embodiments, the processing power of the processor 320 may be limited compared to the processing power of the processor 216. For example, the processor 320 may include an IC chip or multiple IC chips configured to execute hardware or instructions stored in the memory 304.

同样地,(多个)驱动器324可包括促进读取器132的组件的操作的软件、固件或嵌入式硬件。例如,用户接口328可具有专用驱动器324。证书接口332也可具有专用驱动器324。读取器132的其他组件也可有其自己的驱动器324。Likewise, driver(s) 324 may include software, firmware, or embedded hardware that facilitates the operation of components of reader 132. For example, user interface 328 may have a dedicated driver 324. Credentials interface 332 may also have a dedicated driver 324. Other components of reader 132 may also have their own drivers 324.

用户接口328可对应用户输入和/或用户输出设备。在读取器132内,用户接口328传统上为相对简单的设备,但简单不是一种要求。例如,用户接口328可包括简单的视觉显示器(例如,光、LED、八段显示器等等)或更精密的视觉显示器(例如,LCD屏)。用户接口328的用户输入部可包括PIN板、指纹传感器、视网膜扫描仪等等。用户接口328也可有助于与读取器132的听觉交互。例如,用户接口328可包括蜂鸣器、扬声器、麦克风、光电检测器、相近度检测器等等。作为选择或另外地,用户接口328可包括组合的用户输入和用户输出设备,例如,具有可配置按钮的触敏显示器。The user interface 328 may correspond to a user input and/or user output device. Within the reader 132, the user interface 328 is traditionally a relatively simple device, but simplicity is not a requirement. For example, the user interface 328 may include a simple visual display (e.g., a light, an LED, an eight-segment display, etc.) or a more sophisticated visual display (e.g., an LCD screen). The user input portion of the user interface 328 may include a PIN pad, a fingerprint sensor, a retinal scanner, etc. The user interface 328 may also facilitate auditory interaction with the reader 132. For example, the user interface 328 may include a buzzer, a speaker, a microphone, a photodetector, a proximity detector, etc. Alternatively or additionally, the user interface 328 may include a combined user input and user output device, such as a touch-sensitive display with configurable buttons.

证书接口332可包括促进通信信道136的建立的硬件、电路等。作为一些非限制性实例,证书接口332可包括天线、调谐电路、BLE天线、Wi-Fi天线、磁条读取器、光电检测器、红外线发射器、麦克风、扬声器等等。Credential interface 332 may include hardware, circuitry, and the like that facilitates establishment of communication channel 136. As some non-limiting examples, credential interface 332 may include an antenna, a tuning circuit, a BLE antenna, a Wi-Fi antenna, a magnetic stripe reader, a photodetector, an infrared transmitter, a microphone, a speaker, and the like.

电力模块336可对应于专用电源和/或电力转换器,电力转换器促进外部提供的交流电转换为用于向移动设备132的各种组件供电的直流电。在一些实施方式中,电力模块336也可包括浪涌保护电路的一些实施以保护移动设备132的组件免于电涌。The power module 336 may correspond to a dedicated power supply and/or a power converter that facilitates conversion of externally provided alternating current (AC) power to direct current (DC) power for powering the various components of the mobile device 132. In some embodiments, the power module 336 may also include some implementation of surge protection circuitry to protect components of the mobile device 132 from power surges.

现在参考图4,将根据本公开的至少一些实施方式描述向移动设备116传输钥匙124,212的一种方法。当在物业管理系统144处接收到对电子钥匙或一套电子钥匙的请求时,该方法开始(步骤404)。可响应于客人确认希望留宿酒店、响应于客人确认希望进入房间、响应于办公室客人确认在办公室会面等等,接收该请求。然后,对钥匙的请求可从物业管理系统144转发给访问控制服务器140。一旦从物业管理系统144接收到对电子钥匙的请求,(多个)访问控制服务器140确定该请求是否有效且可行的请求(例如,该请求是否来自于信赖源,为信赖格式且应导致生成电子钥匙)。(多个)访问控制服务器140和物业管理系统144之间的认证可使用任何类型的认证协议来完成。With reference now to FIG. 4 , a method for transmitting keys 124 , 212 to a mobile device 116 will be described in accordance with at least some embodiments of the present disclosure. The method begins when a request for an electronic key or set of electronic keys is received at a property management system 144 (step 404 ). The request may be received in response to a guest confirming a desire to stay at a hotel, in response to a guest confirming a desire to enter a room, in response to an office guest confirming a meeting at the office, and so forth. The request for the key may then be forwarded from the property management system 144 to the access control server 140 . Upon receiving the request for the electronic key from the property management system 144 , the access control server(s) 140 determine whether the request is a valid and viable request (e.g., whether the request is from a trusted source, is in a trusted format, and should result in the generation of an electronic key). Authentication between the access control server(s) 140 and the property management system 144 may be accomplished using any type of authentication protocol.

如果认证成功,那么(多个)访问控制服务器140确定电子钥匙的属性(步骤408)。这些属性可包括将分配给电子钥匙的性质或站点代码、电子钥匙的加密、电子钥匙的有效时间(可能是不确定的或确定的)、以及将属于钥匙的其他属性。基于这些属性,(多个)访问控制服务器140将生成(多个)电子钥匙(步骤412),然后确定钥匙的一个或多个目标(步骤416)。(多个)钥匙的目标可包括在步骤404中对钥匙的请求中识别的一个或多个移动设备116。作为选择或另外地,(多个)钥匙的目标可包括除了移动设备116之外的证书(credential),例如,传统的智能卡、钥匙链等等。If authentication is successful, the access control server(s) 140 determine the attributes of the electronic key (step 408). These attributes may include a property or site code to be assigned to the electronic key, the encryption of the electronic key, the validity period of the electronic key (which may be indeterminate or deterministic), and other attributes that may belong to the key. Based on these attributes, the access control server(s) 140 generates the electronic key(s) (step 412) and then determines one or more targets for the key (step 416). The targets of the key(s) may include one or more mobile devices 116 identified in the request for the key in step 404. Alternatively or additionally, the targets of the key(s) may include credentials other than mobile devices 116, such as conventional smart cards, key fobs, and the like.

确定钥匙的目标后,(多个)访问控制服务器140确定是否到时间分发钥匙(步骤420)。分发时间可基于客人预期的到达或登记入住之前的时间量。作为选择或另外地,分发时间可以是基于事件的或由一系列事件触发的。当然,分发可既是基于时间的也是基于事件的。作为基于时间的分发的实例,可不向目标设备分发电子钥匙,直到达到客人预期登记入住酒店之前的预定的时间量。作为基于时间的分发的另一实例,可不向目标设备分发电子钥匙,直到达到预定会面之前的预定的时间量。作为基于事件的分发的实例,可不分发电子钥匙,直到客人在酒店、房间或办公楼预定的距离或附近范围内。基于事件的分发的另一实例是直到移动设备116连接到预定通信网络104或信赖网络112之前,一直等。基于时间和基于事件组合的分发的实例是限制钥匙的分发,直到达到客人预期登记入住之前的预定时间量且直到客人的移动设备116已连接到客人登记入住的物业的信赖网络112。After determining the destination of the key, the access control server(s) 140 determine whether it is time to distribute the key (step 420). The distribution time may be based on the amount of time before the guest's expected arrival or check-in. Alternatively or additionally, the distribution time may be event-based or triggered by a series of events. Of course, distribution can be both time-based and event-based. As an example of time-based distribution, electronic keys may not be distributed to the target device until a predetermined amount of time before the guest's expected check-in at the hotel has occurred. As another example of time-based distribution, electronic keys may not be distributed to the target device until a predetermined amount of time before a scheduled meeting has occurred. As an example of event-based distribution, electronic keys may not be distributed until the guest is within a predetermined distance or proximity of the hotel, room, or office building. Another example of event-based distribution is to wait until the mobile device 116 connects to a predetermined communication network 104 or trusted network 112. An example of a combination of time-based and event-based distribution is to limit key distribution until a predetermined amount of time before the guest's expected check-in and until the guest's mobile device 116 has connected to the trusted network 112 of the property where the guest is checking in.

如果步骤420的询问得到否定回复,那么,(多个)访问控制服务器140继续监测事件、时间和其他触发以确定合适的传送时间(步骤424)。如果步骤420的询问得到肯定回复,为(多个)电子钥匙的分发确定合适的分发协议和信道(步骤428)。例如,可确定能使用蜂窝网络和蜂窝通信协议在通信网络104上向移动设备116传输钥匙。作为另一实例,可以确定需要更安全的传输信道,在这种情况下,可要求信赖网络112用于传输钥匙。If the query at step 420 is negatively responded to, then the access control server(s) 140 continue to monitor events, time, and other triggers to determine an appropriate time for delivery (step 424). If the query at step 420 is positively responded to, a suitable distribution protocol and channel are determined for the delivery of the electronic key(s) (step 428). For example, it may be determined that the keys can be delivered to the mobile device 116 over the communication network 104 using a cellular network and cellular communication protocol. As another example, it may be determined that a more secure delivery channel is required, in which case the trusted network 112 may be required for the delivery of the keys.

已确定合适的信道和协议后,经由确定出的信道和协议向其目标传输(多个)电子钥匙。(多个)钥匙的传送可使用传统协议,比如,HTTP/HTTPS、SNMP、FTP、SMS消息、MMS消息、RTP、UDP等或非传统/专有协议。在一些实施方式中,用于向目标传输钥匙的路径可称为钥匙递送路径且当跨通信网络104或信赖网络112传播时可遵循特定的节点组。After determining the appropriate channel and protocol, the electronic key(s) are transmitted to their destination via the determined channel and protocol. The key(s) can be transmitted using conventional protocols such as HTTP/HTTPS, SNMP, FTP, SMS messaging, MMS messaging, RTP, UDP, etc., or non-conventional/proprietary protocols. In some embodiments, the path used to transmit the key to the destination may be referred to as a key delivery path and may follow a specific set of nodes when propagating across the communication network 104 or the trust network 112.

现在参考图5,将根据本公开的实施方式描述报告首次交互数据的方法。当移动设备116呈现给读取器128,132时该方法开始(步骤504)。这可包括将移动设备116带到读取器128,132的通信范围内,将移动设备116与读取器128,132配对等等。一旦这些设备在彼此的通信范围内,可进行初始认证(步骤508)。依据在读取器128,132和/或移动设备116处的用户选择和管理设定,可以双向或单向地认证。如果认证失败(步骤512),则该方法将结束或者将允许认证的重试(步骤516)。With reference now to Figure 5, a method for reporting first interaction data will be described according to an embodiment of the present disclosure. The method begins when the mobile device 116 is presented to the reader 128, 132 (step 504). This may include bringing the mobile device 116 within the communication range of the reader 128, 132, pairing the mobile device 116 with the reader 128, 132, and the like. Once these devices are within the communication range of each other, an initial authentication may be performed (step 508). Depending on user selections and management settings at the reader 128, 132 and/or the mobile device 116, authentication may be bidirectional or unidirectional. If authentication fails (step 512), the method will end or a retry of authentication will be allowed (step 516).

如果认证成功(步骤512),则两设备可通过交换访问控制信息而继续(步骤520)。在该步骤中,移动设备116可经由两设备之间建立的通信信道136向读取器128,132传送一个或多个电子钥匙。在该步骤中,读取器128,132也可向移动设备116提供识别信息和/或钥匙。与作出访问控制决定有关而使用的任何其他类型的信息可经由通信信道136(在任一方向上)在两设备之间交换。If authentication is successful (step 512), the two devices may proceed by exchanging access control information (step 520). During this step, the mobile device 116 may transmit one or more electronic keys to the readers 128, 132 via the communication channel 136 established between the two devices. During this step, the readers 128, 132 may also provide identification information and/or keys to the mobile device 116. Any other type of information used in making access control decisions may be exchanged between the two devices via the communication channel 136 (in either direction).

基于在步骤520交换的信息,读取器128,132和/或移动设备116可作出关于是否允许移动设备116的持有者访问读取器128,132保护的资产的决定(步骤524)。如果该询问得到否定回复,那么读取器128,132可更新其使用记录312(步骤528)。读取器128,132然后可结束交换或允许重试(步骤516)。Based on the information exchanged in step 520, the reader 128, 132 and/or the mobile device 116 may make a decision as to whether to allow the owner of the mobile device 116 to access the asset protected by the reader 128, 132 (step 524). If the query is negatively responded to, the reader 128, 132 may update its usage record 312 (step 528). The reader 128, 132 may then end the exchange or allow a retry (step 516).

如果步骤524的询问得到肯定回复,那么读取器128,132将确定这是否是移动设备116与访问控制系统的首次交互(例如,确定这次是否对应于首次进入事件)(步骤532)。该确定可对应于确定特定移动设备116与读取器128,132之间的交互是否是一般而言的首次交互。该确定也可包含确定移动设备所使用的钥匙是否对应于该钥匙的首次使用事例,无论全局(例如,在访问控制系统的所有读取器之间)或局部(例如,特定于当前读取器128,132)。正如上文所讨论的,读取器128,132可分析钥匙的性质以确定钥匙是否先前使用过,例如,通过对首次使用的一些指示(或借助钥匙中的使用旗标的标识的随后使用的指示)分析钥匙。与移动设备116相反的是钥匙的分析可能是有用的,尤其对于物业常客来说。例如,客人一年间可留宿在特定酒店内数次,但客人的移动设备116在这些留宿的各次中将使用不同的钥匙。如果首次交互时分析移动设备116本身,那么,该年中所有随后的留宿将不被登记为登记入住事件。另一方面,如果特定留宿使用的钥匙被分析,那么可对每次留宿事例确定合适的登记入住。If the query at step 524 is answered affirmatively, the reader 128, 132 determines whether this is the first interaction of the mobile device 116 with the access control system (e.g., whether this corresponds to a first entry event) (step 532). This determination may correspond to determining whether the interaction between a particular mobile device 116 and the reader 128, 132 is generally a first interaction. This determination may also include determining whether the key used by the mobile device corresponds to a first use instance of the key, either globally (e.g., across all readers of the access control system) or locally (e.g., specific to the current reader 128, 132). As discussed above, the reader 128, 132 may analyze the properties of the key to determine whether it has been previously used, for example, by analyzing the key for some indication of first use (or subsequent use, as indicated by a usage flag in the key). Analyzing the key in contrast to the mobile device 116 may be useful, particularly for frequent property guests. For example, a guest may stay at a particular hotel several times in a year, but the guest's mobile device 116 may use a different key during each of these stays. If the mobile device 116 itself is analyzed for the first interaction, then all subsequent stays during the year will not be registered as check-in events. On the other hand, if the key used for a particular stay is analyzed, then an appropriate check-in can be determined for each stay instance.

应理解,当移动设备116被拒绝访问时,可在步骤528执行步骤532的分析。为了易于理解和简化,步骤532示出为仅在肯定的访问控制决定开始,但是不应被理解为限制本公开的实施方式。It should be understood that when the mobile device 116 is denied access, the analysis of step 532 may be performed at step 528. For ease of understanding and simplicity, step 532 is shown as only beginning with a positive access control decision, but should not be construed as limiting embodiments of the present disclosure.

如果该交互对应于首次交互(或移动设备116的钥匙首次使用),那么,读取器128,132可生成一堆首次交互数据且试图向(多个)访问控制服务器140和/或物业管理系统144回报首次交互数据。如果读取器为联网读取器128,那么首次交互数据可经由访问控制网络108简单地发送到访问控制服务器140和/或物业管理系统144。另一方面,如果读取器对应非联网读取器132,那么读取器132将向移动设备116提供首次交互数据(步骤536)。在一些实施方式中,在用于交换访问控制信息的通信信道136上向移动设备116提供首次交互数据。如果在步骤532足够快地做出决定,非联网读取器132甚至能在用于传送访问控制信息的同一呈现实例期间,将首次交互数据提供回移动设备136。换句话说,用户无需为了促进步骤520和步骤536的通信而将移动设备116向读取器132呈现两次。相反地,当移动设备116被保持在读取器132的前面且等待访问控制决定时,可高效地将首次交互数据传回移动设备116。If the interaction corresponds to a first interaction (or the first use of a key by mobile device 116), readers 128, 132 may generate a set of first interaction data and attempt to report the first interaction data back to access control server(s) 140 and/or property management system 144. If the reader 128 is a networked reader, the first interaction data may simply be sent to the access control server 140 and/or property management system 144 via access control network 108. On the other hand, if the reader corresponds to a non-networked reader 132, reader 132 will provide the first interaction data to mobile device 116 (step 536). In some embodiments, the first interaction data is provided to mobile device 116 over communication channel 136 used to exchange access control information. If the decision is made quickly enough in step 532, non-networked reader 132 may even provide the first interaction data back to mobile device 136 during the same presentation instance used to transmit the access control information. In other words, the user does not need to present mobile device 116 to reader 132 twice to facilitate the communication of steps 520 and 536. Conversely, when the mobile device 116 is held in front of the reader 132 and awaiting an access control decision, the first interaction data can be efficiently transmitted back to the mobile device 116 .

在首次交互数据中可提供的信息的类型的非限制性实例包括读取器132的身份或识别号、钥匙或客人的标志符、交易的时间、交易的日期、访问控制决定是肯定还是否定、当前温度、读取器132状态信息(例如,低电量)等等。Non-limiting examples of the type of information that may be provided in the first interaction data include the identity or identification number of the reader 132, a key or guest identifier, the time of the transaction, the date of the transaction, whether the access control decision was positive or negative, the current temperature, reader 132 status information (e.g., low battery), and the like.

此后,读取器128,132授权移动设备116和其持有者访问读取器128,132保护的资产(步骤540)。Thereafter, the reader 128 , 132 authorizes the mobile device 116 and its owner to access the assets protected by the reader 128 , 132 (step 540 ).

现在参考图6,将根据本公开的实施方式描述分发首次交互数据的方法。当移动设备116从读取器132接收到首次交互数据时开始该方法(步骤604)。可经由认证期间和/或访问控制信息交换期间使用的通信信道136接收首次交互数据。6 , a method for distributing first interaction data will be described according to an embodiment of the present disclosure. The method begins when the mobile device 116 receives first interaction data from the reader 132 (step 604). The first interaction data may be received via the communication channel 136 used during authentication and/or during access control information exchange.

当移动设备116接收到首次交互数据时,移动设备116则确定首次交互数据的收件人地址(步骤608)。该信息可包含在首次交互数据内,可作为单独指令从读取器132提供给移动设备116,或移动设备116可包括做出这种决定的只能(如其可被包括为访问控制逻辑308的一部分)。移动设备116也可作出关于哪个通信信道或路径应用来向收件人地址传输首次交互数据的决定(步骤612)。在一些实施方式中,移动设备116可确定首次交互数据沿钥匙递送路径的相反路径传播。换句话说,移动设备116可简单向从中接收其电子钥匙的同一实体发送首次交互数据,并且移动设备116可利用相同的通信信道/网络发送首次交互数据。在其他实施方式中,访问控制系统的管理员可指示首次交互数据直接被递送给物业管理系统144且该信息可经由信赖网络112递送路径进行递送而非沿钥匙递送路径的相反路径传播。When the mobile device 116 receives the first interaction data, it determines the recipient address of the first interaction data (step 608). This information may be included within the first interaction data, provided to the mobile device 116 as a separate instruction from the reader 132, or the mobile device 116 may include functionality to make such a determination (e.g., it may be included as part of the access control logic 308). The mobile device 116 may also determine which communication channel or path should be used to transmit the first interaction data to the recipient address (step 612). In some embodiments, the mobile device 116 may determine that the first interaction data should be transmitted along the reverse path of the key delivery path. In other words, the mobile device 116 may simply send the first interaction data to the same entity from which it received its electronic key, and the mobile device 116 may use the same communication channel/network to send the first interaction data. In other embodiments, the administrator of the access control system may direct that the first interaction data be delivered directly to the property management system 144 and that the information be delivered via the trusted network 112 delivery path rather than along the reverse path of the key delivery path.

一旦确定收件人地址和合适的通信信道,移动设备116生成包含首次交互数据在内的合适的消息或一组消息(步骤616)。移动设备116然后向所确定的收件人地址发送(多个)消息(步骤620)。Once the recipient address and the appropriate communication channel are determined, the mobile device 116 generates an appropriate message or set of messages containing the first interaction data (step 616). The mobile device 116 then sends the message(s) to the determined recipient address (step 620).

现在参考图7,将根据本公开的至少一些实施方式描述用于递送电子钥匙和首次交互数据的通信路径的额外细节。当物业管理系统144向(多个)访问控制服务器140发送电子钥匙请求时,图7中描述的处理开始(步骤S701)。响应于接收到请求,(多个)访问控制服务器140向目标移动设备116发送一个或多个电子钥匙(步骤S702)。在一些实施方式中,步骤S702中电子钥匙的递送使用通信网络,并且可包含使用多种网络类型(例如,互联网和蜂窝通信网)。因此,由携带电子钥匙的(多个)消息传播的路径可遍历多个网络边界和多个网络边界元件。Referring now to FIG. 7 , additional details of the communication path for delivering electronic keys and first interaction data will be described in accordance with at least some embodiments of the present disclosure. The process described in FIG. 7 begins when the property management system 144 sends an electronic key request to the access control server(s) 140 (step S701). In response to receiving the request, the access control server(s) 140 sends one or more electronic keys to the target mobile device 116 (step S702). In some embodiments, the delivery of the electronic keys in step S702 utilizes a communication network and may include the use of multiple network types (e.g., the Internet and a cellular communication network). Therefore, the path propagated by the message(s) carrying the electronic keys may traverse multiple network boundaries and multiple network boundary elements.

移动设备116然后接收电子钥匙且将钥匙存储在其访问控制应用120或存储器204内。移动设备116保存钥匙直到将其呈现给非联网读取器132(或联网读取器128),在该点,可在两设备间开始通信并且会发生认证(步骤S703)。如果能够建立信赖关系,那么可使用信信道136向非联网读取器132递送电子钥匙(步骤S704)。然后,非联网读取器132可基于(至少部分基于)电子钥匙的内容作出访问控制决定。非联网读取器132还可确定其从移动设备116对电子钥匙的接收对应于电子钥匙的首次使用,在这种情况下,非联网读取器132可生成且再次经由通信信道136递送回首次交互数据给移动设备116(步骤S705)。在一些实施方式中,可在单次将移动设备116呈现给读取器132时执行步骤S703、步骤S704和步骤S705。当然,这些步骤不用恰好同时进行,但对于持有移动设备116的用户来说,可在用户感知为同时的时间量内执行这些步骤。在其他实施方式中,在移动设备116首次向读取器132呈现并且读取器132可提示移动设备116的持有人再次将移动设备116呈现给读取器132后,步骤S705可发生,使得可完成登记入住处理且读取器132可向移动设备116递送回首次交互数据。Mobile device 116 then receives the electronic key and stores it in its access control application 120 or memory 204. Mobile device 116 retains the key until it is presented to non-networked reader 132 (or networked reader 128), at which point communication between the two devices can begin and authentication occurs (step S703). If a trust relationship can be established, the electronic key can be delivered to non-networked reader 132 using communication channel 136 (step S704). Non-networked reader 132 can then make an access control decision based, at least in part, on the contents of the electronic key. Non-networked reader 132 may also determine that its receipt of the electronic key from mobile device 116 corresponds to the first use of the electronic key. In this case, non-networked reader 132 may generate and deliver initial interaction data back to mobile device 116, again via communication channel 136 (step S705). In some embodiments, steps S703, S704, and S705 may be performed upon a single presentation of mobile device 116 to reader 132. Of course, these steps do not need to be performed at exactly the same time, but they can be performed within an amount of time that the user perceives as simultaneous to the user holding the mobile device 116. In other embodiments, step S705 can occur after the mobile device 116 is first presented to the reader 132 and the reader 132 can prompt the holder of the mobile device 116 to present the mobile device 116 to the reader 132 again, so that the check-in process can be completed and the reader 132 can deliver the first interaction data back to the mobile device 116.

移动设备116然后向(多个)访问控制服务器140提供在读取器132上实施的访问控制决定的结果的指示(步骤S706)。此外,移动设备116在步骤S706期间可向(多个)访问控制服务器140递送回首次交互数据。然后,(多个)访问控制服务器140可向物业管理系统144提供首次交互数据(步骤S707)。作为选择或另外地,移动设备116可直接向物业管理系统144递送首次交互数据(步骤S708)。作为可理解的,钥匙递送路径和首次交互数据递送路径可大体彼此匹配,但顺序相反。在其他实施方式中,通信信道136的使用可对应于钥匙递送路径和首次交互数据递送路径的唯一共性。The mobile device 116 then provides an indication of the result of the access control decision implemented on the reader 132 to the access control server(s) 140 (step S706). In addition, the mobile device 116 may deliver the first interaction data back to the access control server(s) 140 during step S706. The access control server(s) 140 may then provide the first interaction data to the property management system 144 (step S707). Alternatively or in addition, the mobile device 116 may deliver the first interaction data directly to the property management system 144 (step S708). As will be appreciated, the key delivery path and the first interaction data delivery path may generally match each other, but in reverse order. In other embodiments, the use of the communication channel 136 may correspond to the only commonality between the key delivery path and the first interaction data delivery path.

现参考图8,将根据本公开的实施方式来描述响应于在物业管理系统接收到首次进入的指示而执行登记入住过程的方法。当在物业管理系统144接收到客人首次进入的指示时,该方法开始(步骤804)。该指示可响应于物业管理系统从(多个)访问控制服务器140或移动设备116接收到首次交互数据而被接收。首次交互数据可表明特定客人(或者与客人相关的钥匙)已经到达特定读取器128,132且读取器128,132已完成针对该特定留宿而与客人移动设备116进行的首次交互事例。8 , a method for executing a check-in process in response to receiving an indication of a first entry at a property management system will be described in accordance with an embodiment of the present disclosure. The method begins when an indication of a guest's first entry is received at the property management system 144 (step 804). This indication may be received in response to the property management system receiving first interaction data from the access control server(s) 140 or the mobile device 116. The first interaction data may indicate that a particular guest (or a key associated with the guest) has reached a particular reader 128 , 132 and that the reader 128 , 132 has completed the first interaction instance with the guest's mobile device 116 for that particular stay.

一旦接收到首次进入的指示,物业管理系统发起客人登记入住进程,其中为该用户创建新的用户账户,其中该账户特定于该特定客人的留宿和被分配给客人的房间(步骤808)。如果客人具有常客账户,那么,新生成的账户可与常客账户在顾客关系管理数据库中相关联。在一些实施方式中,首次交互数据中的至少一些信息用于填入新生成的账户(步骤812)。例如,如果首次交互数据包括与移动设备116首次交互的读取器128,132的标识符且读取器128,132对应所分配或可分配给客人的房间(例如,空房间),那么包含在首次交互数据内的读取器标识符可被包括在新生成的账户内以识别已分配给客人的房间。作为另一实例,如果客人首次向与业务点(PoS)机器关联的读取器呈现移动设备116,那么,读取器的标识符以及客人的交易数据可合并到新生成的账户中。Upon receiving the indication of a first-time entry, the property management system initiates a guest check-in process, wherein a new user account is created for the user, wherein the account is specific to the particular guest's stay and the room assigned to the guest (step 808). If the guest has a frequent guest account, the newly created account may be associated with the frequent guest account in the customer relationship management database. In some embodiments, at least some information in the first-time interaction data is used to populate the newly created account (step 812). For example, if the first-time interaction data includes an identifier of a reader 128, 132 that first interacts with a mobile device 116, and the reader 128, 132 corresponds to a room assigned or assignable to the guest (e.g., a vacant room), the reader identifier included in the first-time interaction data may be included in the newly created account to identify the room assigned to the guest. As another example, if the guest presents the mobile device 116 to a reader associated with a point-of-sale (PoS) machine for the first time, the reader identifier and the guest's transaction data may be merged into the newly created account.

物业管理系统144确定客人留宿是否需要护照后,继续执行该方法(步骤816)。如果该询问得到否定回复,那么,通过最后确定用户账户的其他登记入住项目(例如,确认客人信用卡存档,为客人的旅程排队等等)继续该方法。The property management system 144 determines whether a passport is required for the guest's stay and then continues the method at step 816. If the query is answered negatively, the method continues by finalizing other check-in items for the user's account (e.g., confirming the guest's credit card on file, queuing the guest's itinerary, etc.).

然而,如果步骤816的询问得到肯定回复,那么客人可能被请求提供额外信息以确认其身份以及他们持有有效护照(步骤820)。在一些实施方式中,客人能经由读取器和/或移动设备116输入其护照信息。在一些实施方式中,客人可提供其护照照片并传输照片到物业管理系统144。在一些实施方式中,酒店的客户服务代表被指派在已知地点(例如,朝向首次交互发生的读取器的位置)同客人会面以核实护照信息。However, if the query at step 816 is answered affirmatively, the guest may be asked to provide additional information to confirm their identity and that they possess a valid passport (step 820). In some embodiments, the guest can enter their passport information via the reader and/or mobile device 116. In some embodiments, the guest can provide a passport photo and transmit the photo to the property management system 144. In some embodiments, a customer service representative of the hotel is assigned to meet with the guest at a known location (e.g., toward the location of the reader where the initial interaction occurred) to verify the passport information.

护照分析完成(步骤824)后,方法可继续到步骤828,在该步骤中,完成客人的其他登记入住项目。After the passport analysis is complete (step 824), the method may continue to step 828 where other check-in items for the guest are completed.

现在参考图9,将根据本公开的实施方式描述生成直接去房间登记入住报告的方法。该方法通过确定已请求远程酒店登记入住而开始(步骤904)。可在客人对其房间购买期间,具体提供该请求。另外地,购买完成后可向用户提供选择,用户可接受和拒绝该选择。Referring now to FIG. 9 , a method for generating a direct-to-room check-in report will be described according to an embodiment of the present disclosure. The method begins by determining that a remote hotel check-in has been requested (step 904). This request can be specifically provided during the guest's purchase of their room. Alternatively, after the purchase is complete, the user can be presented with a choice, which the user can accept or reject.

当物业管理系统144确定客人希望远程登记入住,从而允许用户绕过前台,物业管理系统144在登记入住或预期达到之前为客人分配房间(步骤908)。分配的房间可对应于客人选择的对客人可获得的特定房间或一套房间。分配给客人的房间的识别可经由向客人的移动设备116传送的消息来传达。When the property management system 144 determines that the guest wishes to check in remotely, thereby allowing the user to bypass the front desk, the property management system 144 assigns a room to the guest prior to check-in or expected arrival (step 908). The assigned room may correspond to a specific room or suite of rooms that the guest has selected as available to the guest. The identification of the room assigned to the guest may be communicated via a message transmitted to the guest's mobile device 116.

物业管理系统144然后在客人抵达前创建客人账户(步骤912)。然后,该方法等待直到检测到户首次进入或抵达。一旦检测到用户抵达,与首次抵达相关联的首次交互数据从读取器128发送给物业管理系统144(步骤924)。然后,物业管理系统144在酒店前台生成直接去房间登记入住报告,犹如正常登记入住一样。The property management system 144 then creates a guest account before the guest arrives (step 912). The method then waits until a user's first entry or arrival is detected. Once the user's arrival is detected, first-time interaction data associated with the first arrival is sent from the reader 128 to the property management system 144 (step 924). The property management system 144 then generates a direct-to-room check-in report at the hotel front desk, just like a normal check-in.

要注意,这些实施方式被描述为描绘为流程表、流程图、数据流程图、结构图或方框图的处理。尽管流程表可将操作描述为顺序处理,但许多操作可并行或同时执行。此外,操作的顺序在不偏离本公开的范围的情况下可重新安排。这些操作完成后,过程结束,但还能有未包括在图中的额外的步骤。It should be noted that these embodiments are described as processes depicted as flow charts, flow diagrams, data flow diagrams, structure diagrams, or block diagrams. Although a flow chart may describe operations as sequential processes, many operations may be performed in parallel or simultaneously. In addition, the order of operations may be rearranged without departing from the scope of the present disclosure. After these operations are completed, the process ends, but there may also be additional steps not included in the figure.

虽然在文中详细描述了本公开的说明性实施方式,但应理解的是,发明构思可另外不同地体现出来和以另外各种不同方式被使用,除了现有技术所限定的之外,所附权利要求旨在解释为包括这些变型。While illustrative embodiments of the present disclosure have been described in detail herein, it should be understood that the inventive concepts may be otherwise differently embodied and employed in other various ways and that the appended claims are intended to be interpreted to encompass such variations in addition to those limited by the prior art.

Claims (6)

1.一种管理用于具有多个锁的多房间房产的访问控制系统的方法,多个锁中的至少一个锁是离线锁并且没有到访问控制系统后端的直接有线连接,所述方法包括:1. A method for managing an access control system for a multi-room property with multiple locks, at least one of the locks being an offline lock and having no direct wired connection to the backend of the access control system, the method comprising: 确定客人已请求对所述多房间房产的远程登记入住;Confirm that the guest has requested remote check-in for the multi-room property; 从所述多房间房产中向所述客人分配房间;Assign rooms to the guests from the multi-room properties; 确定用来锁牢所述房间的锁;Determine the lock used to secure the room; 生成包含支持对所确定的锁访问的第一信息的电子钥匙;Generate an electronic key containing initial information supporting access to the identified lock; 将所述电子钥匙发送至所述客人的移动设备,其中,所述电子钥匙经由无线通信网络被发送至所述移动设备;The electronic key is sent to the guest's mobile device, wherein the electronic key is sent to the mobile device via a wireless communication network; 确定所述移动设备首次被呈现给所述锁;Determine that the mobile device is presented to the lock for the first time; 在电子的所述锁处分析被发送给所述移动设备的所述电子钥匙以及所述电子钥匙内包含的所述第一信息;The electronic key sent to the mobile device and the first information contained within the electronic key are analyzed at the electronic lock. 基于对所述电子钥匙以及所述电子钥匙内包含的所述第一信息的分析,确定授权所述客人访问所述房间;Based on the analysis of the electronic key and the first information contained within the electronic key, it is determined that the guest is authorized to access the room; 响应于确定授权所述客人访问所述房间,将第二信息从所述锁发送至所述移动设备,其中,仅所述移动设备首次被呈现给所述锁并且所述客人被授权访问所述房间时将所述第二信息发送至所述移动设备,并且其中,从所述锁向所述移动设备发送的所述第二信息包括房间标识符、成功信息和/或首次使用指示;以及In response to determining that the guest is authorized to access the room, second information is sent from the lock to the mobile device, wherein the second information is sent to the mobile device only when the mobile device is first presented to the lock and the guest is authorized to access the room, and wherein the second information sent from the lock to the mobile device includes a room identifier, success information, and/or a first-time use indication; and 在接收到所述客人的首次进入的指示后,在所述多房间房产的物业管理系统内创建客人账户。Upon receiving the guest's first entry instruction, a guest account is created within the property management system of the multi-room property. 2.根据权利要求1所述的方法,其中,所述电子钥匙经由NFC耦合被提供给所述锁,并且其中,在同一NFC耦合期间也提供从所述锁向所述移动设备发送的所述第二信息,从而免除所述移动设备与所述锁之间多次连接的需要。2. The method of claim 1, wherein the electronic key is provided to the lock via NFC coupling, and wherein the second information transmitted from the lock to the mobile device is also provided during the same NFC coupling, thereby eliminating the need for multiple connections between the mobile device and the lock. 3.根据权利要求1所述的方法,其中,所述电子钥匙经由蓝牙连接被提供给所述锁,并且其中,在同一蓝牙连接期间,也提供从所述锁向所述移动设备发送的所述第二信息,从而免除所述移动设备与所述锁之间多次连接的需要。3. The method of claim 1, wherein the electronic key is provided to the lock via a Bluetooth connection, and wherein, during the same Bluetooth connection, the second information sent from the lock to the mobile device is also provided, thereby eliminating the need for multiple connections between the mobile device and the lock. 4.根据权利要求1所述的方法,其中,从所述锁向所述移动设备发送的所述第二信息随后被发送至所述物业管理系统并且被存储在所述客人账户中。4. The method of claim 1, wherein the second information sent from the lock to the mobile device is subsequently sent to the property management system and stored in the guest account. 5.根据权利要求1所述的方法,其中,关于所述移动设备与所述锁一起首次使用的所述第二信息在从所述锁发送到所述移动设备之后从所述锁的存储器中删除。5. The method of claim 1, wherein the second information regarding the first use of the mobile device together with the lock is deleted from the lock's memory after being sent from the lock to the mobile device. 6.根据权利要求4所述的方法,其中,所述物业管理系统在前台生成确认所述客人的登记入住的报告。6. The method according to claim 4, wherein the property management system generates a report at the front desk confirming the guest's registration and check-in.
HK18101127.4A 2014-09-10 2015-09-09 First entry notification HK1242032B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US62/048,702 2014-09-10

Publications (2)

Publication Number Publication Date
HK1242032A1 HK1242032A1 (en) 2018-06-15
HK1242032B true HK1242032B (en) 2022-01-21

Family

ID=

Similar Documents

Publication Publication Date Title
CN107077763B (en) first entry notification
US20160005248A1 (en) First entry notification
US11017623B2 (en) Access control system with virtual card data
CN107067251B (en) Transactions using electronic devices with geographically restricted non-local credentials
US11317266B2 (en) Systems and methods for updating a mobile device
US10929832B2 (en) Method and system for electronic wallet access
CN109417574B (en) Manage credentials for multiple users on electronic devices
US11610447B2 (en) Encoder multiplexer for digital key integration
JP6186451B2 (en) System and method for securely loading, storing and transmitting magnetic stripe data in a device operating with a mobile wallet system
US12159497B2 (en) Remote programming for access control system with virtual card data
CN110033534B (en) Secure seamless access control
CN108886687B (en) Manage Program Credentials on Electronic Devices
CN115485709A (en) smart card unlock
CN107005798A (en) User view is captured when being interacted with multiple entrance controls
CN104050510A (en) Intelligent room reservation system based on mobile terminal
US20150365827A1 (en) Methods and systems for authentication of a communication device
JP2018010449A (en) Smart lock authentication system and method in smart lock
EP3123665B1 (en) Network node security using short range communication
CN116349202A (en) Mutual Authentication Using Pseudorandom Numbers
HK1242032B (en) First entry notification
HK1242032A1 (en) First entry notification
US20250356705A1 (en) Digital identification-based systems and methods
KR20150083179A (en) Method for Managing Certificate