[go: up one dir, main page]

HK1201969B - Electronic key, electronic closure system and a method for allowing an access authorisation - Google Patents

Electronic key, electronic closure system and a method for allowing an access authorisation Download PDF

Info

Publication number
HK1201969B
HK1201969B HK15101416.7A HK15101416A HK1201969B HK 1201969 B HK1201969 B HK 1201969B HK 15101416 A HK15101416 A HK 15101416A HK 1201969 B HK1201969 B HK 1201969B
Authority
HK
Hong Kong
Prior art keywords
electronic
electronic lock
lock
user
key
Prior art date
Application number
HK15101416.7A
Other languages
Chinese (zh)
Other versions
HK1201969A1 (en
Inventor
马努埃拉.恩格尔-达汉
拉尔夫.科诺布林
蒂洛.迈泽尔
Original Assignee
锁定你的世界有限及两合公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE102012008395A external-priority patent/DE102012008395A1/en
Application filed by 锁定你的世界有限及两合公司 filed Critical 锁定你的世界有限及两合公司
Publication of HK1201969A1 publication Critical patent/HK1201969A1/en
Publication of HK1201969B publication Critical patent/HK1201969B/en

Links

Description

Electronic key, electronic locking system and method for releasing access authorization
Technical Field
The present invention relates to an electronic key according to the preamble of claim 1, an electronic locking system according to the preamble of claim 8 and a method for securely obtaining access authorization or for securely delivering a key according to the preamble of claim 13.
Background
The following problems are present in particular for external security services, but also for the company's own personnel: carrying a key with one, in particular a master key (master key) that enables access to the entire space of a building, represents a significant security risk: the key falls into the hands of an ill-intentioned person due to misuse or due to criminal activity (theft, robbery, kidnapping, illegal manufacture of spare keys).
A device for providing access to a home is known from DE 102005033898 a 1. There, in a manner triggered by the user making a telephone inquiry via radio, in which the user transmits a code, a signal is sent by the service station to the remote control module of an intercom which provides access to the gate and subsequently also to the residential door for the authorized user.
An electronic contact having three contacts, a mating plug or key and a magnetic centering device of the plug on the contact is known from DE 202011003043U 1.
Disclosure of Invention
The invention is based on the following objectives: an electronic key is provided which can be activated temporarily and alternately for opening different locks. The object also consists of providing an electronic locking system in which the electronic key according to the invention advantageously cooperates with at least one electronic lock. Finally, it is also an object to provide a method for securely obtaining access authorization or securely delivering a key with the electronic key according to the invention and/or the locking system according to the invention.
This object is achieved with regard to the electronic key by the features specified in claim 1, with regard to the electronic locking system by the features specified in claim 8 and with regard to the method by the features of claim 13. Advantageous embodiments of the invention are contained in the dependent claims which are each associated therewith.
The electronic key according to the invention is characterized by an input device provided on the housing of the electronic key for inputting the authorization code. The input device can be designed here in the form of a numeric or alphabetic keyboard, wherein the authorization code is in this case manually entered by the user for the desired unlocking. According to another aspect of the invention, the electronic key may be programmed to open different electronic locks by means of an authorization code that may be entered via the input unit.
The input device can alternatively or additionally also be formed by an electronic detection device. The electronic detection device can be formed, for example, by a reading or receiving device which detects an authorization code transmitted by the user or a communication device operated by the user (e.g. a smartphone) via radio, bluetooth, RFID or NFC communication or via optical transmission, for example a barcode, a QR code or similar information.
The authorization code is preferably temporarily stored in a memory of the electronic key and is transmitted to the electronic lock via at least one contact after contact with the electronic lock.
An electronic lock in the sense of the present invention is understood to mean any electronic contact point which is suitable for subsequent operation or for releasing access authorization.
The authorization code which can be entered into the electronic key by means of the input device alone without space close to the electronic lock to be opened significantly increases the security in verifying the authorization of access, since the corresponding access data is hardly possible to intercept by an unauthorized third party and the electronic key approaches the electronic lock only after entering the authorization code has been completed.
An electronic key that may be stolen or lost is worthless for a thief or a finder who does not know for which electronic lock the relevant key is used by the authorization code.
The input device and the contact are preferably arranged on different sides of the housing. Particularly preferably, the input device is arranged on the front side of the housing and the contact is arranged on the rear side of the housing. The input device can thus also be operated very simply in a position in which the contact portions engage with corresponding mating contact portions on the electronic lock.
In particular, it is preferred that the electronic key is provided with at least one voltage source, preferably a rechargeable battery, which not only serves for the self-supply of the electronic components of the electronic key, but also for the supply of power to the electronic lock at least during an opening process or an initialization or activation process, during which the electronic lock can be connected to the self-voltage source. If necessary, the electronic key is preferably provided with a voltage converter for this purpose, by means of which a lower output voltage of the battery in the electronic key is converted into a higher operating voltage required by the electronic lock. For example, the voltage converter is designed as a DC/DC converter which converts an input voltage of, for example, 3.7V of a rechargeable lithium-ion battery serving as a battery into an output voltage of 12V, which is sufficient for controlling the most common motor locks or electrical actuators.
The advantage is that the device provided with the electronic lock does not have to be continuously supplied with operating voltage, since the current required for opening is only provided by the electronic key when required. Thus, a tubular safe built away from the power grid, which houses the physical key, can operate entirely without a fixed power source, for example, but without a battery to be replaced. Thereby reducing maintenance costs and wear of the system.
The stowage bin, the valuable item container or the safe can also be operated without a continuous voltage source, since the current for the initial access is provided by the electronic key. Optionally, the electronic lock first operates a control device after the verification of the access authorization is determined, by means of which an external operating voltage source is subsequently activated for operating the motor lock or other actuator.
The electronic key is preferably provided with at least one magnet, in particular a ring magnet, for centering, which interacts with a corresponding mating magnet on the electronic lock. By attracting the magnetic force, the electronic key automatically enters the contact position when approaching the electronic lock.
In order to support the secure formation of the contacts, the contact portions on the electronic key are preferably mounted elastically in its housing.
The electronic locking system comprises, in addition to the electronic key, at least one electronic lock provided with at least two concentrically arranged mating contacts and a magnetic centering device.
According to one advantageous application of the electronic locking system, the electronic lock is arranged on a locking cover of the tubular safe, wherein the electronic key simultaneously preferably serves as a handle for actuating the locking cover in its contact position with the electronic lock.
According to an alternative application of the electronic locking system, the electronic lock is switched on and activated to be energized before the motor lock or the actuator of the device to be protected. As already mentioned, the stowage bin, the valuable item container or the safe can thus be operated without a continuous voltage source, since the current for the initial access is provided by the electronic key. Optionally, the electronic lock first operates a control device after the verification of the access authorization is determined, by means of which an external operating voltage source is subsequently activated for operating the motor lock or other actuator.
The mating contact surfaces on the electronic lock are preferably configured as concentric circles which, in any relative angular position of the electronic key, make contact with the contact portions of the electronic key. Since no rotational alignment of the electronic key with respect to the electronic lock is required at all, the docking of the electronic key on the electronic lock can be carried out extremely simply by the user even in the case of poor visibility.
The method according to the invention for securely obtaining access permission or securely delivering a key to at least one user by means of an electronic lock and at least one electronic key according to the invention carried with the user and/or by means of an electronic locking system according to the invention is characterized by the following method steps:
-transmitting information (20; 22; 34) characteristic of at least one of the characteristics of the electronic lock (16) and/or of the user (22) to a central information processing station (30) located remotely from the electronic lock (16) by means of a communication device (24),
checking the transmitted information (20; 22; 34) by means of a central information processing station (30),
in the event of a positive result of the check of the information (20; 22; 34), an authorization code (36) is transmitted to the user (22) by means of the communication device (24),
-an authorization code (36) is entered by the user (22) into the portable electronic key (32) by means of an input device (33),
-unlocking the electronic lock (16) by co-action with the electronic key (32).
A high level of security is achieved by checking characteristic information of the electronic lock, for example a code which is arranged in the area of the lock and which can be read out by the user mechanically or manually by means of a communication device, and characteristic information of the user, for example a password or a combination of letters and numbers which is entered into the communication device, which is transmitted by means of the communication device to a central information processing station which is arranged remote from the lock and is checked there. The access authorization is not checked and provided immediately in the range of the electronic lock to be opened, but remotely therefrom in the information processing station.
After the authorization code has been provided and transmitted, it is transmitted to an electronic key carried by the user, with the aid of which the electronic lock can then be unlocked. Transmitting the authorization code to the electronic key is another advantageous security safeguard. Alternatively to the manual input of the transmitted authorization code into the electronic key by means of the input device, the transmission of the authorization code can also take place automatically, for example by transmission from the communication device to the electronic key by means of bluetooth, an infrared transmitter or other short-range transmission methods.
The electronic lock can already in this case already enable access authorization to a protected area or to a protected device. In an alternative embodiment, the protected area is however formed by a relatively small anti-theft container, such as a tubular safe, which is arranged outside or in the vicinity of the building. In this tube safe, the electronic lock is released to the passage of the physical key after being unlocked by the electronic key, and then the building can be entered by means of the physical key. In this case, the physical key is particularly advantageously connected to the inside of the locking cover of the tubular safe, which cover contains the electronic lock, so that after leaving the building and re-locking the tubular safe by means of the locking cover, a return of the physical key to the tubular safe is forced.
According to a further advantageous application, the electronic lock receives a voltage, which is transmitted by a voltage source of the electronic key after completion of the validation check and is optionally changed by a voltage converter, and forwards said voltage to the electric-motor lock or the electric actuator for activating the electric-motor lock or the electric actuator, optionally with the interposition of a control device.
In a particularly simple form, the communication device is formed by a mobile telephone, by means of which the user, for example a security service keeper, calls an information processing station, for example a service center of a security service, and transmits the name, specific information of the lock and a password, whereupon the information processing station checks the information, optionally additionally with a usage planning correction stored there and transmits an authorization code to the user or the communication device in the event of a positive evaluation of the entire information. The authorization code can be communicated to the user by telephone or also by a Short Message (SMS) generated by the computer in the information processing station.
The user forwards the authorization code to the electronic key carried by him via the input device and can then operate the electronic lock by means of the electronic key, for example via radio, by contact or by contactless signal transmission.
Based on this particularly simple form, one or more of the steps can be performed automatically. Thus, for example, the code of the electronic lock can be read out automatically by means of software ("App") stored in the communication device and a corresponding sensor, for example, a camera of a smartphone serving as a communication device. This can be done, for example, by means of a bar code reading program or Aztec code reading program stored in the smartphone, for which purpose a corresponding graphic code is provided in the region of the electronic lock. However, other sensors, such as invisible magnetically coded signals, which are respectively aligned with the electronic signal generator and the communication device arranged in the region of the electronic lock are likewise possible.
The authorization code can also be transmitted to the user's smartphone as a barcode, QR code, or in a similar fashion. The transmitted code is then transmitted by the communication device (smartphone) to the electronic input device on the electronic key, if it is transmitted in machine-readable form.
The information characteristic of the user can also be queried automatically by software stored in the communication device, for example after reading in information specific to the electronic lock, and entered by the user, for example as a letter/number combination and transmitted to the information processing station.
As a further advantageous method step, it is provided that, before the authorization code is sent to the user, in addition to the information characteristic of the electronic lock and/or of the user, the information processing station also checks information relating to the use position and/or the use time relating to the two pieces of information by means of the use plan. Thereby, additional security is achieved, since: the access code is also transmitted completely outside the route normally set by the security personnel.
In a further advantageous embodiment of the invention, the electronic lock and/or the device protected by the electronic lock transmit information to the central information processing station when the electronic lock is released and locked.
In an advantageous further development of the system, the check in the central information processing station also includes an evaluation of at least one time parameter, which verifies characteristic information of the lock and/or of the user on the basis of a stored time plan for planning the opening of the lock, in particular a route plan of a watchman.
In a special embodiment, it can be provided that the communication device and the electronic key form a unit. The unit integrates all the functions of the transmitter and receiver for detecting and transmitting the characteristic information of the lock and/or of the user to the central information processing station and for receiving the authorization code with the function of the electronic key. By means of the input authorization code, an electronic key, for example a magnetic transponder, is programmed so that it can be used to open the electronic lock.
The invention can be applied, for example, in connection with a tubular safe, as disclosed, for example, in WO2012/045474a 1. In this case, the transponder, as an electronic key, is used directly as a handle for removing the locking cap after it has been placed on the electronic lock.
Drawings
Embodiments of the present invention are explained below with reference to the drawings. The figures show:
figure 1 shows a tube safe with an electronic lock integrated in the closure and a characteristic coding of the electronic lock,
fig. 2 shows a flow chart illustrating the transmission of codes between a user and a central information processing station,
figure 3 shows the user's hand when entering an authorization code into the electronic key,
figure 4 shows the application of the electronic key as a handle when opening the electronic lock,
figure 5 shows the placement of a physical key on the inside of the locking lid of a tube safe,
fig. 6 shows a flowchart illustrating the communication between the user, the client computer, the server, the administrator and the electronic lock,
fig. 7 shows a diagram illustrating the functionality at the user, client computer, server and administrator side,
figure 8 shows a schematic circuit diagram for an application of the electronic lock in co-action with the control device and the motor lock,
FIG. 9 shows a schematic front view of an electronic key and
fig. 10 shows a schematic view of the rear side of the electronic key.
Detailed Description
The locking device 10 shown in fig. 1 is formed by a tubular safe 12 which is arranged in a theft-proof and tamper-proof manner in a wall of a building or on a stable carrier in the vicinity of the building. The tube safe 12 is closed on its front side by means of a closure lid 14. An electronic lock 16, for example, which is shown and described in detail in WO2012/045474a1, the disclosure of which is used here for the subject matter of the present application, is integrated in the locking cover 14.
On the inside of the locking cover 14, as shown in fig. 5, a physical key 18 is provided, by means of which at least one access opening to a building, not shown, and optionally further doors in the building can be opened.
A code 20 characteristic of the electronic lock 16 is provided on the locking device 10 which is locked by means of the electronic lock 16. The code is formed in the illustrated embodiment in the form of a bar code 20, but can also be formed by an Aztek code or an invisible magnetic code. The code 20 can in the simplest case be read manually by the user 20. According to one advantageous embodiment, the communication device 24 carried with the user 22 has a sensor or a reader for automatically detecting the code 20. The communication device 24 can be formed, for example, by a smartphone whose camera is used in conjunction with a stored application program ("App") for reading in a bar code or alternatively an Aztec code, which in this embodiment serves as the characteristic code 20 of the electronic lock 16. As already mentioned, the invisible magnetic or radio signal-transmitted code 20 can also be emitted by the electronic lock 16 or a device arranged in the vicinity thereof and received or read by the communication device 24.
As long as the authorization code 36 matching the electronic lock 16 is entered into the electronic key 32, the electronic lock 16 can be unlocked by means of the electronic key 32. In fig. 3, it is shown how the authorization code 36 is entered by the user 22 via a keypad provided on the electronic key 32. The electronic key 32 can then be placed on the electronic lock 16 as shown in fig. 4 and used directly as a handle for opening the locking cover 14.
However, the process according to the invention precedes this process by the process steps shown in fig. 2, 6 and 7, in which the user 22 transmits the information characteristic of the electronic lock 16 (code 20) and of his individual in the form of a code 26, for example in the form of an individual password or a letter/number combination, to a central data processing station 30, for example a security service centre, by means of a communication device 24. The characteristic information 20 of the electronic lock 16 and the individual characteristic information 26 of the user 22 together form a query data record 34, which in the simplest case is transmitted manually by telephone to the central data processing station 30. According to one advantageous embodiment of the invention, the data record 34 is transmitted automatically, for example as a character string in a Short Message (SMS) sent by the communication device 24.
In the information processing station 30, the query data set 34 together with the codes 20 and 26 contained therein are preferably checked, with additional correction by means of a time parameter 28 (for example, a service plan or a route plan of the user 22). As soon as the check has a positive result, the information processing station 30 sends an authorization code 36 to the communication device 24. This can in the simplest case be done by telephone. According to one advantageous development, the transmission of the authorization code 36 to the communication device 24 takes place automatically, for example in the form of a character string embedded in a Short Message (SMS).
The authorization code 36 is transmitted by the user, as already mentioned in connection with fig. 3, either manually via an input device, in particular a keyboard, to the electronic key 32 or automatically from the communication device 24 to the electronic key 32. The transfer can be performed by: the communication device 24 has a transmitter and the electronic key has a receiver communicating with the transmitter. The transfer can be done, for example, via infrared signals, via bluetooth, or other suitable close range transfer protocol.
According to one development of the invention, the communication device 24 and the electronic key 32 can also form a structural unit having a sensor for detecting the code 20, an input device for the code 26, a transmitting device for transmitting the query data set 34 to the central information processing station 30, a receiver for receiving the authorization code 36 and a memory for storing the authorization code 36 in the electronic key 32. The building block also contains software for detecting the codes 20 and 26, for automatically delivering the query data set 34, for automatically receiving and for storing the authorization code 36.
The central information processing station 30 advantageously has at least one client computer 310 and at least one server 320. The client computer 310 is operable to receive the query data set 34 and to communicate the query data set to the server 320. The exchange of data between the client computer 310 and the server 320 is represented by 315.
In the server 320, a time parameter 28 is additionally stored, which, for example, maps the route plan of the user 22 with a characteristic time for opening the associated electronic lock 16, preferably with a corresponding time buffer (earliest opening time, latest closing time). All data in server 320 is managed by manager 330. Data communication between the server 320 and the administrator 330 is represented by 325.
It is preferable to also transmit a signal to the server 320, which is automatically transmitted by a transmitter mounted on the electronic lock 16 when the electronic lock 16 is opened and closed.
The method according to the invention and the system according to the invention can also be operated in a developed embodiment fully automatically without human interaction, contrary to the illustrations in fig. 2, 6 and 7. The receiving of the query data set 34 by the client computer 310, the transmission of the query data set 34 to the server 320, the checking of the characteristic information contained in the query data set 34 (codes 20 and 26), the correction with the at least one time parameter 28, the generation of the authorization code 36 and, if appropriate, the transmission of the authorization code 36 to the communication device 24, again with the interposition of the client computer 310, can preferably be carried out in a controlled, fully automated manner by means of software.
The following has been described in connection with possible embodiments of the communication device 24 and of the electronic key 32: the method and system according to the invention for securely releasing the access authorization and/or for securely delivering the key can also be carried out fully automatically on the user 22 side.
The electronic key 32 is provided according to the invention with an input device 33, by means of which the user 22 can enter an authorization code 36, which is transmitted by the central information processing station 30 to the communication device 24, into the electronic key. Such an electronic key 32 provided with an input device 33, in which the code input by an authorized user can be seen relatively easily by an unauthorized observer and thus represents a great security risk, can also be used in the place of stationary input devices which are already widely developed today. Conversely, the input of the code into the mobile electronic key 32, which is then used only to open the electronic lock, can take place completely unobserved already at a distance from the electronic lock 16.
As electronic key 32, as in the exemplary embodiment shown, a key 32 attached to electronic lock 16, preferably temporarily connected to electronic lock 16 by magnetic force, can be used. The magnetic force is provided by a magnet 329 in the central region of the electronic key 32 and by a mating magnet 161 in the central region of the electronic lock 16, which are preferably configured as permanent ring magnets and serve for self-centering of the electronic key 32 with the electronic lock 16 and alignment of the contact portions 324, 325 and 326 with the mating contact surfaces 164, 165, 166 concentrically arranged on the electronic lock 16, irrespective of the relative angle to one another.
However, it is also possible to use an electronic key 32, for example in the form of a transponder, which interacts contactlessly with the electronic lock 16 via a distance.
The electronic key 32 has a housing 321, on the front side of which an input device 33 is provided according to fig. 3 and 9. In the embodiment shown, this is a numeric keypad with 10 numeric keys 331, a delete key 332 ("C") and an enter key 333 ("OK"). On the rear side of the housing 321, three contacts 324, 325 and 326 are exposed, which are mounted elastically in the housing, wherein the contact 325 arranged in the center conducts, for example, a positive voltage, the contact 324 located furthest away is a ground connection and the contact 326 is used for serial data transmission.
In the rear view of the electronic key 32 according to fig. 10, a cover of the battery compartment 327 is also shown, behind which the battery 322 is arranged. The battery is configured as a lithium ion battery having an output voltage of 3.7V, for example.
In order to increase the output voltage to, for example, 12V, a voltage converter in the form of a DC/DC converter 323 is provided in the electronic key 32.
The electronic key 32 is furthermore provided with at least one interface 328, which in the present case is formed, for example, by a micro USB interface and is used for programming the electronic key 32 and optionally also for charging the accumulator 322.
The electronic key 32 interacts either with the electronic lock 16 shown in fig. 1 to 5, for example on the tubular safe 12 or on the protected space, or with other devices requiring access authorization. The term "device" is considered herein to be very broad. Machines, vehicles, etc. can be protected by the electronic lock 16, but bank safes, or doors to secure areas can also be protected.
The example according to fig. 8 shows: the device protected by the electronic lock 16 can also be unlocked not only directly, but also indirectly. In this case, the electronic lock 16 serves as a 220V protection module for a protected device, not shown, which is only finally unlocked by operating the motor lock 40.
Between the electronic lock 16 and the motor lock 40, a control device 50 is also provided in this case, which can be supplied with power by means of its own power supply, which is however activated by operating the electronic lock 16. After the valid authorization code 36 has been transmitted from the electronic lock 32, which is not shown in fig. 8, via the mating contact 166 responsible for the data transmission, the external power supply on the control device 50 is activated and the motor lock 50 is operated. Conversely, in the phase of checking the authorization code 36, the required operating voltage on the control device 50 is provided by the electronic key 32 via the electronic lock 16. A detailed description of the control device 50 is made at the end of the description.
The advantage of indirect operation is that when the protected device is not in use, it is not necessary to also apply an operating voltage across the device. The device can be initialized at any time when required by the electronic key 32 via the electronic lock 16.
In the position of the three illustrated contacts 324, 425 and 326 of the electronic key 32 and the three mating contacts 164, 165 and 166 of the electronic lock, two of these contacts are also sufficient in one variant when data transmission takes place, for example, simultaneously together via the ground contact.
The lithium-ion battery 322 is capable of temporarily supplying 7 watts of power at an output voltage of 12V with high efficiency by means of a DC/DC converter when the input voltage is 3.7V. Thus, the capacity of the battery 322 is sufficient for approximately 700 opening processes without recharging. The low-voltage protection preferably signals, on the electronic key 32, by means of a diode and/or a buzzer, that the battery voltage has dropped, for example, to 2.7V, so that the battery 322 must be recharged before continued use.
Advantageously, a capacitor, not shown, is also provided in the control device 50 for damping the energy transmitted by the electronic key 32. The capacitor is charged during or directly after checking the access authorization and then the subsequent opening or release process is carried out separately by means of its stored charging capacity. The capacitor ensures that the electronic lock 16 does not become caught in an intermediate position during the opening process in the event of a lack of residual capacity of the battery 322.
By using components in the field of mobile phones, the electronic key, the electronic locking system and the method according to the invention can be realized cost-effectively.
Description control device 50:
functional assembly
The control electronics can be divided into 5 sub-functional components:
microcontroller with memory and reset controller
Identification member with timer and signaling means
Switching stage and fixed voltage output
Electric power supply
DC/DC converter (if the module is used, then the external power source is removed!)
A microcontroller having a memory and a reset controller:
for central control and evaluation of all information exchange between the Pylocx system key (electronic key 32) and the control device 50, together with the control of the motor lock 40, a PIC microcontroller from Microchip is used. Here, energy requirements, high integration density, economy, but also much experience with PC assembly language play an important role. To stably store data, the microcontroller communicates with the EEPROM at 256Kb via the I2C bus.
In order to switch the microcontroller on and off in a defined manner when the power supply is switched on or when a brief voltage interruption occurs, a reset controller is used. The reset controller switches the microcontroller to reset when the operating voltage <2.4V and releases the reset again when the operating voltage > 2.7V.
Identification member with timer and signaling means:
each control module (control device 50) must have a unique, unique and unchanging identification. Components (functional blocks) selected from the DS series of Dallas corporation have such ROM codes and are therefore outstandingly suitable. Additionally, a real-time table is integrated in the component, which is necessary for recording events. The real-time watch of course requires a continuous power supply, so lithium button cells are used here. The lithium battery ensures power supply to the real-time meter for at least 10 years. The identification member communicates with the microcontroller via the MicroLAN protocol.
In order to provide the operator with information about the state of the control device 50, an acoustic signal generator (piezo beeper) is integrated, which can also be heard well through the housing. If separate signaling devices are desired, acoustic and/or optical signal sources can be connected via the respective outputs. The external signaling device operates in synchronization with the internal signaling device.
Switching stage and fixed voltage output:
the control module (control device 50) is intended to be very universally usable in relation to the motor lock 40 and the electric lock to be connected. For this reason, a relay is selected as a potential-free changeover switch for controlling the motor lock 40 or the electric lock. If a dc voltage is required for controlling the switching element, the fixed voltage can be switched on via the potential-free changeover switch via the respective output. The fixed voltage output can be configured via a jumper (in the interior of the control device). There are 3 voltage options: 6V, 9V or 12V at maximum 500mA respectively. The fixed voltage is stable and interference cancelling (residual ripple (period and random offset) <20mV)
Power supply:
the control module (control device 50) is supplied via the mains voltage. Encapsulated switching network components are used as network components. For overload protection, a miniature fuse (200mA withstand capability) is located in the primary loop of the grid component. The micro fuse is located in the interior of the control device 50. By switching the appropriate line technology of the grid components, input voltages of from 110 up to 250VAC 50/60Hz can be switched. The switching network element provides an output voltage of 12VDC, 6VDC and 9VDC are generated from the 12VDC via a fixed voltage regulator (on the cold plate).
In the case of a current interruption, the control device 50 may be voltage-supplied from the outside (standby energization). In contrast, the Pylocx standby power-on device is connected to the Pylocx contact portion (electronic lock 16). Here, the voltage (9V) of the internal battery of the Pylocx backup power device is directly supplied to the control module (control device 50) via the intermediate contact portion 165 (of the electronic lock 16) of the Pylocx contact portion. The corresponding Pylocx transponder is then connected to the standby powered device. The other operations are as in normal operation. It is noted that with 9V standby operation, the 12V lock can only be powered to a limited extent, and as such, the current is limited to 300mA by battery operation.
DC/DC converter:
the DC/DC converter is controlled via a backup power supply input (the innermost contact of the contacts) of the control device. The voltage (3.7VDC) fed from the electronic key 32 by the battery 322 is boosted to 12VDC by the DC/DC converter. The 12VDC is delivered to the power supply section of the control device. Instead of the 12VDC generated by the switching grid element from 230VAC, said 12VDC is now provided directly for controlling the internal electronics of the device and for controlling the external motor lock. Thus, no external power source is required for operation.
Other hardware components on the control electronics:
in order to load the firmware of the microcontroller during production, 5-pole contact strips are present. Software upgrades of the firmware can also be performed via the contact strip. The contact strip is located directly on the circuit board of the control device 50 and is not accessible to the user. Furthermore, an EMV protection component is provided on the interface. The MicroLAN, control input and general input are protected via a suppressor diode, and the external signal output is protected via a VDR overvoltage device. In order to increase the protection function, further components for protecting the microsan lines and the operating voltage lines are located on the circuit board. The MicroLAN lines are protected by other piezoresistors. The standby current supply line is likewise protected by means of a varistor. Additionally, a zener diode with a PPTC is installed for protection of the DC voltage. By means of these measures, the direct voltage (without limiting the current) is reliably locked to 30V and the static high voltage to 6 kV. In order to block the 220V ac voltage that can be fed via the contact points, two gas vents (gas arresters) can be connected in a separate housing between the control device 50 and the contact points (electronic locks 16). Forced blocking capacitors have been considered.
List of reference numerals
10 locking device
12-tube safe
14 locking cap
16 electronic lock
161 cooperating magnet
164 mating contact surface
165 mating contact surface
166 mating contact surface
18 keys
20 code (for 16)
22 users
24 (22) communication device
26 (of 22) coding
28 time parameter
30 information processing station
310 client computer
315 (between 310 and 320) data communication
320 server
325 (between 320 and 330) data communication
330 manager
32 electronic key
321 casing
3211 fixing eyelet
322 accumulator
323 Voltage converter (DC/DC)
324 contact part
325 contact part
326 contact part
327 Battery box
328 interface (for example, minitype USB)
329 magnet
33 input device (keyboard)
331 push-button (Alphabet digital type)
332 delete key (clear)
333 enter key (confirm)
34 query data set
36 authorization code
38 (16) on/off signal
40 motor lock
50 control device

Claims (25)

1. Method for securely obtaining access authorization or securely delivering a key to at least one user (22) by means of an electronic lock (16) and at least one electronic key (32) carried with the user (22) and/or by means of a locking system, comprising the following method steps:
-sending information (20; 22; 34) characteristic of at least one of the electronic lock (16) and/or the user (22) to a central information processing station (30) located remotely from the electronic lock (16) by means of a communication device (24),
checking the transmitted information (20; 22; 34) by the central information processing station (30),
in the event of a positive result of the check of the information (20; 22; 34), an authorization code (36) is transmitted to the user (22) by means of a communication device (24),
-the authorization code (36) is entered by a user (22) into the electronic key (32) carried on the person by means of an input device (33), and/or the communication device (24) contains an application by means of which at least one characteristic information (20; 22; 34) of the electronic lock (16) and/or of the user (22) can be detected and/or by means of which the authorization code (36) can be received and/or by means of which the authorization code (36) can be transmitted to the electronic key (32),
-unlocking the electronic lock (16) by co-action with the electronic key (32).
2. Method according to claim 1, characterized in that the characteristic information (20) of the electronic lock (16) is formed by a combination of numbers or by a bar code.
3. Method according to claim 1 or 2, characterized in that the information (26) characteristic of the user (22) is formed by a password.
4. The method of claim 3, wherein the password is a combination of letters/numbers.
5. Method according to claim 1 or 2, characterized in that before sending the authorization code (36) to the user (22), the central information processing station (30) checks the time parameter (28) associated with both information about the place of use and/or the time of use, in addition to the information (20; 26) characteristic of the electronic lock (16) and/or of the user (22).
6. Method according to claim 3, characterized in that, before sending the authorization code (36) to the user (22), the information processing station (30) checks a time parameter (28) associated with both information about the place of use and/or the time of use, in addition to the information (20; 26) characteristic of the lock (16) and/or of the user (22).
7. Method according to claim 4, characterized in that, before sending the authorization code (36) to the user (22), the information processing station (30) checks a time parameter (28) associated with both information about the place of use and/or the time of use, in addition to the information (20; 26) characteristic of the lock (16) and/or of the user (22).
8. Method according to claim 1 or 2, characterized in that the electronic lock (16) is arranged on a locking cover (14) of a tube safe (12), from which a physical key (18) for accessing at least one other area can be taken out after unlocking of the electronic lock (16).
9. A method according to claim 3, characterized in that the electronic lock (16) is arranged on a locking cover (14) of a tube safe (12), from which a physical key (18) for accessing at least one other area can be taken out after unlocking of the electronic lock (16).
10. Method according to claim 4, characterized in that the electronic lock (16) is arranged on a locking cover (14) of a tube safe (12), from which a physical key (18) for accessing at least one other area can be taken out after unlocking of the electronic lock (16).
11. The method according to claim 1 or 2, characterized in that the electronic lock (16) continues to transmit to the motor lock the current received from the voltage source (322) of the electronic key (32) for activating the motor lock (40).
12. The method according to claim 3, characterized in that the electronic lock (16) continues to transmit to the motor lock the current received from the voltage source (322) of the electronic key (32) for activating the motor lock (40).
13. The method according to claim 4, characterized in that the electronic lock (16) continues to transmit to the motor lock the current received from the voltage source (322) of the electronic key (32) for activating the motor lock (40).
14. The method according to claim 1 or 2, characterized in that the electronic lock (16) continues to transmit to the control device the current received from the voltage source (322) of the electronic key (32) for activating the control device (50).
15. A method according to claim 3, characterized in that the electronic lock (16) continues to deliver to the control device the current received from the voltage source (322) of the electronic key (32) for activating the control device (50).
16. The method according to claim 4, characterized in that the electronic lock (16) continues to deliver to the control device the current received from the voltage source (322) of the electronic key (32) for activating the control device (50).
17. Method according to claim 1 or 2, characterized in that the electronic lock (16) and/or the device (14; 40; 50) unlocking the electronic lock, upon activation and/or deactivation, sends information (38) to the central information processing station (30).
18. Method according to claim 3, characterized in that the electronic lock (16) and/or the device (14; 40; 50) unlocking the electronic lock, upon activation and/or deactivation, sends information (38) to the central information processing station (30).
19. Method according to claim 4, characterized in that the electronic lock (16) and/or the device (14; 40; 50) unlocking the electronic lock, upon activation and/or deactivation, sends information (38) to the central information processing station (30).
20. Method according to claim 1 or 2, characterized in that a mobile telephone is used as communication means (24) for transmitting information (20; 22; 34) characteristic of the electronic lock (16) and/or of at least one of the users (22) and/or for receiving the authorization code (36).
21. A method according to claim 3, characterized in that a mobile telephone is used as communication means (24) for transmitting information (20; 22; 34) characteristic of the electronic lock (16) and/or of at least one of the users (22) and/or for receiving the authorization code (36).
22. Method according to claim 4, characterized in that a mobile telephone is used as communication means (24) for transmitting information (20; 22; 34) characteristic of the electronic lock (16) and/or of at least one characteristic of the user (22) and/or for receiving the authorization code (36).
23. The method according to claim 1 or 2, characterized in that the communication device (24) and the electronic key (32) form one unit.
24. A method according to claim 3, wherein the communication device (24) and the electronic key (32) form one unit.
25. The method according to claim 4, characterized in that the communication device (24) and the electronic key (32) form one unit.
HK15101416.7A 2012-04-27 2013-04-27 Electronic key, electronic closure system and a method for allowing an access authorisation HK1201969B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102012008395A DE102012008395A1 (en) 2012-04-27 2012-04-27 Method and system for secure key handover
DE102012008395.5 2012-04-27
PCT/EP2013/058827 WO2013160481A1 (en) 2012-04-27 2013-04-27 Electronic key, electronic closure system and a method for allowing an access authorisation

Publications (2)

Publication Number Publication Date
HK1201969A1 HK1201969A1 (en) 2015-09-11
HK1201969B true HK1201969B (en) 2018-05-04

Family

ID=

Similar Documents

Publication Publication Date Title
CN104272353B (en) Electron key, electronic locking system and the method for discharging access mandate
JP7263307B2 (en) Method of operating locking system, locking system and tubular safe
US10329798B2 (en) Method for monitoring lockout procedures
US20190169874A1 (en) Wireless-enabled interchangeable locking core
US20160050191A1 (en) Intelligent delivery system
CN211287097U (en) Password identification intelligence lock protector
HK1201969B (en) Electronic key, electronic closure system and a method for allowing an access authorisation
US11842587B1 (en) System, comprising a lock unit for a cabinet and at least one portable user terminal
US20230230431A1 (en) Electronic lock configured to receive wireless power transmissions
CN219456896U (en) Electronic lock device and control system
KR101925481B1 (en) smart locking system for safe
CN111466774A (en) Key storage device and use method
HK1219797B (en) Method for operating a locking system, locking system, and tube safe