[go: up one dir, main page]

WO2004092514A1 - Electronic lock and key for access management - Google Patents

Electronic lock and key for access management Download PDF

Info

Publication number
WO2004092514A1
WO2004092514A1 PCT/SG2004/000095 SG2004000095W WO2004092514A1 WO 2004092514 A1 WO2004092514 A1 WO 2004092514A1 SG 2004000095 W SG2004000095 W SG 2004000095W WO 2004092514 A1 WO2004092514 A1 WO 2004092514A1
Authority
WO
WIPO (PCT)
Prior art keywords
locks
key
lock
server
rules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/SG2004/000095
Other languages
French (fr)
Inventor
Shuang Maan Tan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCAM TECHNOLOGY Pte Ltd
Original Assignee
TCAM TECHNOLOGY Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TCAM TECHNOLOGY Pte Ltd filed Critical TCAM TECHNOLOGY Pte Ltd
Publication of WO2004092514A1 publication Critical patent/WO2004092514A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/06Controlling mechanically-operated bolts by electro-magnetically-operated detents
    • E05B47/0611Cylinder locks with electromagnetic control
    • E05B47/0619Cylinder locks with electromagnetic control by blocking the rotor
    • E05B47/0626Cylinder locks with electromagnetic control by blocking the rotor radially
    • E05B47/063Cylinder locks with electromagnetic control by blocking the rotor radially with a rectilinearly moveable blocking element
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • E05B17/002Weather or dirt protection
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/02Cases
    • E05B2067/025Bumpers
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • E05B47/0002Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets
    • E05B47/0003Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets having a movable core
    • E05B47/0004Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets having a movable core said core being linearly movable
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00761Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication

Definitions

  • Fig. 7 illustrates the construction of the key of the system of Fig. 1.
  • the system further comprises a database system 150, comprising a database 1 for containing data including rules, and a server 2 which can be accessed over the internet from any of the PCs (personal computers) 21 , 23, 24, 25, and from mobile phone 20.
  • the terminal 21 is in a location available to the key-holder before starting on the route and after completing the route (e.g. at the user's office), whereas the terminals 23, 24, 25 are locations which are in general remote from the terminal 21.
  • the mobile phone 20 may actually be owned by the key-holder.
  • the communication path (socket connection) between one of the PC 21 and the mobile phone 20, and the server 2 is shown in Fig. 1 as path 15.
  • the mobile phone 20 supports the downloading of application program, such as a small Java client program, or a C++ client program.
  • the unit 160 receives a plug-in or applet program 162 into a web browser 161.
  • data in the key 13 can be sent to the device server 151 (step 54) and similarly the data in the device server
  • Fig. 13 and Fig. 14 are cut away views of the assembled lock cylinder insert.
  • the direction which is uppermost in Fig. 13 is the direction towards the bottom of Fig. 12.
  • One end 324 of the lock plate 362 is arranged in a depression 327 in the element 323.
  • the depression 327 provides tamper protection.
  • the outer barrel 310 is sectioned to display the assembled details of the parts that illustrated in Fig. 12.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention proposes a system to allow real-time access monitoring of locked premises (11) using electronic keys (13) adapted to open locks (12). The locks can be put into commnuication with a server (2) with access to a database (1). The server is accessible over the internet so that users can configure the keys (13) remotely to permit entry into the premises (1). Furthermore, the keys (13) can download into the database (2) data concerning the access to the premises (11), to provide real-time updating to the entry record. The lock (12) uses a magnet solenoid which is powered by current pulses to open the lock (12), and has reduced power consumption compared to typical electronic locks.

Description

Electronic Lock And Key For Access Management
Field of the invention
The present invention relates to access management systems, that is to systems which permit regulated entry to premises such as fencing gates, switch rooms, engine rooms, and utility rooms. Furthermore, the present invention relates to an electronic lock device and an electronic key.
Background of the invention
Recently increasing numbers of access management systems employ electronic keys, that is keys which carry a rule and which are capable of communicating that rule to an electronic lock device which recognises the rule and accordingly can be opened. These systems include hotel key systems, card access systems and electronic lock systems. All these systems co-ordinate the rules between the keys and the locks using various types of access management software.
These access management systems are designed for door access with high user traffic and indoor operating conditions. In order for the management software to communicate with the locks, direct cable or wireless connection is usually needed, which requires massive cabling and installation efforts, and, if the communication is carried on over a telecommunication network, may lead to expensive online charges. A typical system has built-in battery backup to overcome the problems of power failure.
An electronic lock usually comprises a solenoid which can be activated to release the locking mechanism. However, such a system is not energy efficient as power needs to be supplied continuously while activating the solenoid and turning the key, and therefore the energy stored in battery is quickly used up requiring frequent battery replacement or recharging. Presently, electronic locks used in an outdoor rugged environment are protected from rain and wetness by separate devices such as plastic encasements. This method is inconvenient as the encasing is large and is usually a cumbersome accessory to the lock.
Summary of the invention
The invention aims to provide new and useful systems for access management.
It further aims to provide new and useful electronic locks for use in an access management system.
In a first aspect, the invention proposes in general terms that a database for storing rules is accessible over the internet, so that a user can download access rules into the database over the internet from a first location, and terminals in communication with the database over the internet receive the codes and transmit the rules to the keys.
Thus, the first aspect of the invention makes it possible for a first user who administrates a secure area to load the rules into the database and to arrange for the locks to recognise the rules. A second user can use the terminals to transmit the rules to the keys, so as to empower them to permit access to the secure area.
In a second aspect, the invention proposes that a lock retains a record of interactions with keys, and at least one of the keys is arranged to download at least part of the records and transmit it to the database.
Thus, the second aspect of the invention makes it possible for records from the lock to be input to the database even though the lock has means of directly making contact with the database. In a third aspect the invention provides a padlock comprising a shackle, a lock mechanism controlling whether the shackle can be opened, a control circuit controlling the lock mechanism, and an interface for receiving from a key an electronic signal encoding rules. The lock mechanism is a "magnetic solenoid" by which is meant a self-latching device in which a locking element is held by a magnetic force provided by a permanent magnet in a blocking position in which it blocks the lock being opened. The magnetic force is opposed by a mechanical force from a resilient body such as a spring, but the mechanical force is lower than the magnetic force, so that the locking element is normally retained in the locking position. However, the lock mechanism further contains a solenoid which can be powered by the control circuit to oppose the magnetic force generated by the permanent magnet, and so allow the locking element to be moved away from the blocking position, so that the lock can be opened.
Such magnetic solenoids ("self-latching devices") are conventionally used in CD drive systems. Suitable devices are available from the Shinmei company, and illustrated on http://info.tactnet.co.Jp/shinmei/e/product pdf/E_DL1630G.pdf).
Note that these magnetic solenoids are different from better known solenoid systems in which the movable element is moved by the solenoid both towards and away from the permanent magnet according to the current direction through the solenoid. Such systems are illustrated in http://info.tactnet.co.Jp/shinmei/e/product/pdf/E_DL1630G.pdf.
Brief description of the figures
Preferred features of the invention will now be described, for the sake of illustration only, with reference to the following figures in which:
Fig.1 shows a facility access management system which is an embodiment of the invention. Fig. 2 illustrates schematically the operation of certain units of the system of
Fig. 1.
Fig. 3, 4 and 5 are flow diagrams of portions of various units of the system of
Fig. 1. Fig. 6 illustrates the construction of the lock of the system of Fig. 1 .
Fig. 7 illustrates the construction of the key of the system of Fig. 1.
Fig. 8 illustrates the flowchart of operation of the lock of Fig. 1.
Fig. 9 illustrates the flowchart of the operation of the key of Fig. 1.
Fig. 10 is a perspective view of the lock of Fig. 1. Fig. 11 is an exploded view of the lock of Fig. 1.
Fig. 12 is an exploded view of the cylinder insert shown in Fig. 11.
Fig. 13 and Fig. 14 are cut away perspective views the lock cylinder insert.
Fig. 15 is a perspective view of the key of Fig. 1.
Fig. 16 is an exploded view of the key of Fig 1. Fig. 17, which is composed of Figs. 17(a) and 17(b), is cross-sectional views of the key of Fig. 1 in two different planes.
Fig. 18, which is composed of Figs. 18(a) and 18(b), is cross-sectional views of the lock cylinder insert of Fig. 1 in a first plane at different moments in the operation of the lock cylinder insert. Fig. 19, which is composed of Figs. 19(a) and 19(b), is cross-sectional views of the lock cylinder insert of Fig. 1 in a second plane at different moments in the operation of the lock cylinder insert.
Fig. 20, which is composed of Figs. 18(a), 18(b) and 18(c), is cross-sectional views of the lock cylinder insert of Fig. 1 in a third plane at different moments in the operation of the lock cylinder insert.
Description of the preferred embodiment
Fig.1 shows an embodiment of a facility access management system which is an embodiment of the invention. The system is for permitting access to a number of different premises, of which one is shown on the left of Fig. 1. The premises are shown as a wall 11 having a door 10. The door is sealed by a lock 12, which is to be opened by a key 13, held by a user (the "key-holder") who has to complete a route passing a number of such premises, and using the key 13 to open the lock 12 in the manner described below. As described below, the electronic locks 13 are rugged enough to withstand weathering. Whether or not the lock 12 can be opened by the key 13 depends on rules stored in the key 13, and whether those rules match rules stored by the lock 12. (Note that the respective sets of rules need not be identical in order to "match".).
The system further comprises a database system 150, comprising a database 1 for containing data including rules, and a server 2 which can be accessed over the internet from any of the PCs (personal computers) 21 , 23, 24, 25, and from mobile phone 20. The terminal 21 is in a location available to the key-holder before starting on the route and after completing the route (e.g. at the user's office), whereas the terminals 23, 24, 25 are locations which are in general remote from the terminal 21. The mobile phone 20 may actually be owned by the key-holder. The communication path (socket connection) between one of the PC 21 and the mobile phone 20, and the server 2 is shown in Fig. 1 as path 15. For this purpose, the mobile phone 20 supports the downloading of application program, such as a small Java client program, or a C++ client program.
The key 13 has a built-in infrared port and can communicate with the PC 21 or mobile phone 20 via the IrDA protocol on a communication path 14 wirelessly. Once the communication paths 14, 15 are established, data can flow freely between the key 13 and the server 2. For example, if the user carries the mobile phone 20 with him, he can transfer the information to the server 22 while he is on the move.
Whether the communication between the lock 12 and key 13 is such as to permit or refuse access, the access transaction is logged in respective embedded memories in the key 13 and the lock 12. After the user completes the route of services and returns back to his office, he can upload the access transaction stored in the key 13 to the server 2 using the office PC 21 or a mobile phone 20. The server 2 stores it in the database 1. The office PC 21 has established network connection, i.e. the Internet, with the server 2 either by dialup or office network before the key can communicate with the server 2.
The server 2 may contain server programs, such as Java application or VB, for socket connections 15 and web applications, such as JSP or ASP.NET applications, for displaying the data uploaded into the database 1 which is used to manage the status of locks, keys, users, facilities and system users. The web server 2 supports three groups of Internet users, who are indicated schematically on Fig. 1 as the three respective terminals 23, 24, 25. The user 23 is a system administrator, such as a managing agent, who wants to arrange for maintenance services (such as cleaning services) to be performed on the site. An maintenance manager (indicated schematically as terminal 24) is someone who provides such maintenance services using the key-holders (maintenance workers). The maintenance manager 24 can log into the system to verify the service routes performed by his maintenance workers. The administrator 23 uses the system to change the access rules, generate reports or monitor the incoming transactions and connections The user 25 is a facility officer associated with the site (e.g. he may be a caretaker of the site). A system administrator 23 can login to the system to perform system administration services. The administrator 23 or system administrator 25 can log in to the system to register a new lock, a new key or a new maintenance manager 24. The communication paths between the terminals 23, 24, 25 and the server 2 are labeled 18.
Fig. 2 is the overview of the program design in this embodiment. The unit 140 in this diagram represents either of the terminal 21 or the mobile phone 20. The unit 160 represents software present in the terminals 23, 24, 25 for communicating with the database system 150. The key 13 contains firmware 131 including an application program, and a database 132 containing key data, including rules downloaded from the unit 140, and data recording the interaction of the key 13 and lock 12. The embedded program 131 is for managing communication between the database 132 and the unit 140.
The unit 140 contains software 141 which is a small device client program located in the user's office PC 21 or mobile phone 20.
As described in more detail below, the unit 160 receives a plug-in or applet program 162 into a web browser 161.
The database system 150 includes server programs running on the server 2 and the database 1. The device server program 151 establishes the socket connection with the device client program 141 over a network, for example TCP/IP over the Internet. A livefeed server program 152 is used to update the information displayed in the web browser 161 automatically whenever there is a change in the SQL database 155. The SQL server program 154 will manage the data transfer in to or out of the database 1. In this present embodiment, an http web server program 153 allows http connections to the terminal 160 through the standard web browser 161.
The communication protocol between the key and the device client is via IrDA 14. The device server and the device client are connected via socket connection 15 over a network, typically TCP/IP. The web browser 161 and the web server 153 are connected via the http protocol over the TCP/IP network. In order to achieve real time display in the web browser, the plug-in or applet program 162 in the displayed webpage is able to get updated data from the livefeed server 152 over the socket connection 174. Fig. 3 and 4 are flow diagrams of the operation of the socket connection 15 between the device client program 140 (installed in the user's PC or mobile equipment) and the device server program 151 installed in the server 2.
Referring to Fig. 3, in step 51 the data in the key 13 is beamed to the IrDA port of the PC 21 or the mobile phone 20. In step 52, the device client will establish the IrDA connection with the key. In step 53, the device client 141 will open the TCP/IP socket connection 14 with the device server. Once the IrDA connection
14 and the socket connection 15 is established, data in the key 13 can be sent to the device server 151 (step 54) and similarly the data in the device server
151 can be sent to key 13 (step 55). When data transfer is completed, the device client 151 terminates the IrDA connection 14 and the socket connection
15 (step 57).
Referring to Fig.4, the device server 151 listens to the TCP/IP network (step 60) and upon a request being transmitted to it (step 61), it opens a socket connection 15 (step 62). In a multi-threaded design, the server 2 can communicate with many devices 140 at one time. In each thread, the server communicates with the device client (step 63) via the socket connection 15. The communication includes receiving data from the device client 141 , performing error checking and data decryption, locating the device in the database, writing the received data into the device database 1 , and reading data, encrypting it and sending the data to the device client 140. Once the communication is completed, the socket is closed and the thread is killed (step 64).
Fig. 5 is a flow-diagram of the operation of the livefeed server 152. The livefeed server 152 is used to update information to web pages on the terminals 23, 24, 25 without refreshing the pages. When an Internet browser connects to the server 1 , the livefeed server 152 sends a small client program (e.g. applet) 162 to the browser 161 (step 210). The client program will poll the livefeed server
152 at regular intervals (step 211) over, for example, a TCP/IP socket connection 18. When the livefeed server receives the polling signal (step 212), it will probe the database 1 to get the latest data and send it to the client program 162. When the client program 162 receives the data (step 213), it stores it in a memory buffer and then displays the content on, for example, a computer screen.
Although it is mentioned here that the display is a computer screen, other kinds of methods for retrieving and displaying the data are possible within the scope of the invention, such as via a mobile phone installed with a suitable technology or software for the purpose, such as a Java program.
Turning to Fig. 6 shows the circuit design of the lock 12, while Fig. 7 shows the design of the key 13. The key 13 sends strong data pulses to the lock 12 via the contact point 122. The lock 12 includes a contact point 122, and a circuit 101 which contains a filter circuit to separate a signal received by the aerial 122 into power and data. The power is stored, and is sufficient to power the lock 12 and also operate a magnet solenoid contained within the lock (as described below). The data transfer 14 between the lock 12 and key 13 is preferably in half-duplex mode.
The lock 12 further includes a NVRAM (non-volatile memory) 102 which contains information such as the lock header, for identifying the lock, and premise access history. It further includes a CPU 103 for establishing whether there is a match between data received from the key 13 and rules stored within the lock 12. After the exchange of data between the key 13 and the lock 12, if the CPU 103 gives permission to the lock 12 to open, the CPU 103 will issue a pulse signal of a predetermined duration to a magnet solenoid 104. The pulse has a duration which is preferably no more than 100 milliseconds, and more preferably no more than 50 milliseconds, such as 20milliseconds.
Compared to supplying power continuously (which is the technique used in conventional electronic locks), the technique used in the embodiment of supplying energy to the solenoid in pulses saves energy. For example, a conventional lock may require an amount of power to open a lock 1000 times, but in comparison the same amount of energy in the present invention may be sufficient to open the lock 20,000 times. As described below, the reason why the embodiment can use pulsed energy, is that unlike conventional electronic locks, the embodiment uses a magnet solenoid instead of a normal solenoid.
Turning to Fig. 7, the key 13 includes a contact point 125. When lock 12 responds to the connection with the key 13 , the key's contact point 125 become a high impedance input port and which is able to read data from the lock using the electronic contact. The key 13 further includes a battery 114, which is a rechargeable battery which can be charged via the contact 125 and a charging circuit 110. Whether the battery 144 is to be charged depends on whether the voltage level at the input to the battery is higher than the voltage generally delivered by the battery. The battery 114 supplies power to the key 13 and also to the lock 12 upon contact with it. A protection circuit 111 is able to monitor the battery voltage and provide short circuit protection. An IrDA transceiver circuit 116 employs the IrDA protocol and a transceiver chipset for wireless connection with a PC 21 or mobile equipment 20. The key 13 further comprises a NVRAM 113, which is a non-volatile memory and holds the configuration and access information. A Real Time Clock RTC 115 provides the date and time information. The key 13 transmits information to the database 1 for storage along with date and time information, and this allows verification of the access history. A unit 117 contains a pushbutton for enabling the initiation of an IrDA connection, and an LED for providing visual indication of access and communication status.
Fig. 8 is a flowchart of the operation of the lock 12. The lock 12 is powered and initialised on contact with the key 13 (step 30). The lock 12 then reads information stored in the key 13 (step 31). If the key's pushbutton is pressed, the key 13 will become a gateway (step 32) for the lock 12 to communicate with the server 2 through the user's office PC 21 or mobile equipment 20 to upload access history (step 34). Otherwise, the lock 12 will enter into the access mode with key (step 33). In the access mode, the access rules will be checked, transaction will be logged and solenoid is activated if it is in granted status.
Fig. 9 is a flowchart of the operation of the key. After power up and initialisation (step 35), the key 13 will monitor the battery voltage (step 36) and blink the LED if the battery is weak, and shutdown the entire circuit if it is in an under voltage condition. If the lock 12 is detected (step 37), the key 13 will enter into the access mode (step 38). In the access mode, the access rules will be checked and transaction will be logged (i.e. access rules in the key will be checked and transaction stored in the key or the lock). If the key's pushbutton is pressed
(step 39), the module will establish IrDA connection with the user's office PC 21 or mobile equipment 20 and data will be transferred to the server (step 40). If there are no other tasks, the key will go into sleep mode until it is re-activated by contact with the lock or by the pushbutton (step 41).
Fig. 10 is a perspective view of the lock 13, and Fig. 11 shows the exploded view of the lock 13. The lock 13 comprises a rugged rubber top 302 and a rubber bottom 307, which together provide an outer layer of water proofing and shock proofing. A screw 303 is used to tighten a cylinder insert 306. A compression spring 305 is used to spring load a shackle 301. A lock body 304 is used to house the cylinder insert 306. The rubber bottom 307 includes an aperture 361 , which leads to an aperture 360 in one half 362 of the cylinder insert 306.
Fig. 12 is an exploded view of the cylinder insert 306, and the components within its other half. The direction which is towards the right in Fig. 12 is the direction towards the left in Fig. 11. It comprises an outer barrel 310 and an insert cap 323, which are to be fixed together. These elements do not move within the lock 12. The cylinder insert 306 further comprises a cylinder 321 which is for rotation about its longitudinal axis. Two insulators 312 are provided for insulated housing of two respective contact pins 311. The contact pins 311 are typically soldered directly onto a lock printed circuit board (PCB) 317 carrying a CPU 316, and are used to electrically connect to a portion of the key 13 when it is inserted into the lock 12. Two O-rings 313a and 313b are used to waterproof the front and back ends of the cylinder 321 when it is fitted into the outer barrel 310. A magnet solenoid 315 is fitted inside the cylinder 321 and is secured by two guide pins 314. A lock plate 324 with a certain thickness is used to hold apart the two lock pins 319a and 319b located on respective sides of the lock plate 324. A torsion spring 318 is used to bias the lock plate 324. A C spring 320 is used to bias the two lock pins 319. The insert cap 323 is the rear cover of the cylinder insert 306, and is secured to the outer barrel 310. A circlip 322 is used to lock the cylinder 321 when the cylinder 321 is inserted into the outer barrel 310. The lock PCB 317 contains lock circuitry as illustrated in Fig. 6. The position switch 325 is used to locate the angular position of the cylinder when it is turned by the key.
Fig. 13 and Fig. 14 are cut away views of the assembled lock cylinder insert. The direction which is uppermost in Fig. 13 is the direction towards the bottom of Fig. 12. One end 324 of the lock plate 362 is arranged in a depression 327 in the element 323. As described below, the depression 327 provides tamper protection. In Fig. 14, the outer barrel 310 is sectioned to display the assembled details of the parts that illustrated in Fig. 12.
Fig. 15 is a perspective view of the electronic key 13. Fig. 16 is an exploded view of the key 13. The key 13 includes terminal pins 330 extending through respective holes in an insulator body 331. The terminal pins 330 can be soldered directly to a PCB 335 of the key 13. The key includes a neck body 332 which is moulded to a plastic bottom case 333. A top cover 337 fits onto the bottom case 333, sandwiching the PCT 335. The neck body 332 provides strength for the key 13 to open the lock 12. The neck body 332 has U cuts 332a at both sides which work as a key retaining mechanism when the key is turning in the lock. The key 13 further includes a waterproofed pushbutton 334 inserted at the corner of the bottom case 333. The key further includes an IR lens 336 which provides a window for wireless communication along the path 14 shown in Fig. 1. The key further includes a pin 339 and a ring 338, which together provide a key chain holder assembly. The pin 339 must be inserted into the bottom case 333 with the ring 338 around it before the top cover 337 is closed. The top cover 337 is sealed to the bottom case for the water proofing when the gadget is assembled. The light guide 340 is aligned with a SMD LED on the PCB 335 and provides status indication. The PCB 335 contains the circuitry as illustrated in the Fig. 7. Figs. 17(a) and (b) are sectional view of the key 13, respectively in a side view and in a view in the plane marked as C-C in Fig. 17(a).
Fig. 18 to 20 are cross-sectional views illustrating the operations of the lock cylinder insert 306. Figs. 18(a) and Fig. 18(b) are views through the cylinder insert in a plane including its longitudinal axis. When a portion of a key 13 is inserted into the aperture 362, power from the key is transferred to the lock 12 through the contact pins 311. The CPU 316 on the lock's PCB circuits 317 is then powered up and a communication link is established between the lock 12 and the key 13. After the data in the key 13 is verified by the lock CPU 316 and permission is granted, the lock circuit will wait until the key rotates the cylinder 321 mechanically to an angle, preferably 30°, before triggering the magnet solenoid 315. This rotation, as illustrated in Fig. 13, is such that the end 362 of the lock plate 324 is released from tamper protection 327. If the magnet solenoid 315 is not powered, a plunger (shown as 315a in Fig.18a) is always kept in place in the solenoid by a constant magnetic force generated by a permanent magnet (not shown) and consumes no power. However, a small current pulse supplied by the circuit 317 will cause the solenoid 315 to oppose the magnetic force generated by the permanent magnet, and the hence release the plunger. A spring may then move the plunger away from the position in which it prevents the lock being opened.
Figs. 19(a) and (b) are views through the central portion of the lock in the plane shown as A-A in Fig. 18(b). These views show how the turning angle of the cylinder is detected. When the cylinder is at angle 0°, the switch 325 is normally closed and is blocked by a small metal ball 326. When the cylinder rotates to 30° as shown in Fig.19(b), the metal ball 326 moves into a cavity and releases the switch to an 'open' position.
When the lock circuit detects that the switch is opened, the CPU can process the decision of sending a current pulse to the magnet solenoid. At angle 0°, the lock plate 324 is blocking the lock pins 319 from moving inward. At angle 30°, if the magnet solenoid is pulsed because the data in the key allows the lock to be opened, the lock plate 324 moves away from the lock pins 319 and turning action can continue to an angle beyond 30°. The re-turning of the cylinder back to 0° pushes the lock plate 324 and the solenoid's 315 plunger back to the original positions. The pushing effect is achieved by the tamper protection profile 327 in Fig. 13.
Fig. 20 illustrates the mechanism of locking and unlocking by the lock plate 324. The magnet solenoid 315 is pulsed to generate a magnetic field to oppose the magnetic force from the permanent magnet, and its plunger 315a is subsequently released. Due to the spring loading by the torsion spring 318 (shown in Fig. 12), the lock plate 324 will move away from the lock pins 319. When the lock plate 324 is not blocking the lock pins 319, the lock pins 319 can then move inwards when the cylinder 321 rotates beyond 30°. If the lock pins were held in place by the plunger because the solenoid is not powered, the cylinder 321 is prevented from turning by the lock pins 319. The turning of cylinder unlocks the shackle (301 in Fig. 11).
According to the embodiment described, the key connects to a desktop PC or mobile equipment via the built-in IrDA port. The PC or mobile equipment may have network connectivity via LAN, dialup or GPRS network, and the key can communicate with the server through these protocols. The database server is therefore able to keep track of the detail information of all locks and keys deployed at field, and allows the administrator to directly configures the keys for accessibility of the users into different locked premises.

Claims

Claims
1. A system for managing access to a site protected by one or more locks, the system including: one or more electronic keys arranged to communicate with the locks and for storing rules to be recognised by the locks; a database system comprising a server and a database for storing rules, the server being accessible over the internet, whereby a first user can load rules over the internet into the server, and a second user can download the rules from the server over the internet for entry into the key.
2. A system according to claim 1 in which the locks are arranged to store records of previous interactions with keys, and the keys being arranged to upload the records from the locks, whereby the records in locks can be transmitted to the keys, and then from the keys to the database.
3. A method for managing remote access to a site protected by one or more locks, the method including: a first user transmitting to a server over the internet rules to be recognised by the locks, the server being arranged to store the rules in a database; a second user receiving the rules over the internet from the server, and storing them in a key; whereby the key can be used to open the lock.
4. A method according to claim 3 in which the lock records history information describing its interaction with the locks, the method further including a step of the second user using the key to transmit the history information to the database over the internet.
5. A method of monitoring access to a site protected by one or more locks, the method including: at least one step of using a key to open the locks, the key being arranged to record history information describing its interaction with the locks, a step of transferring the data over the internet from the key to a server for storing the history information in a database, a step of transmitting the history information over the internet from the server to another user.
6. A method for gaining access to a site protected by one or more locks, the locks being arranged to recognise rules, the method comprising: downloading rules into a key over the internet from a server in communication with a database for storing the rules.
7. A system for managing access to a site, the system including: one or more locks for securing the site and storing records of previous interactions with keys; one or more electronic keys arranged to communicate with the locks and for storing rules to be recognised by the locks, the keys being arranged to upload the records from the locks; a database system comprising a server and a database for storing lock records, the server being arranged for communication with the keys over the internet, whereby the records in locks can be transmitted to the keys, and then from the keys to the database.
8. A method of monitoring access to a site protected by one or more locks, the method including: at least one step of using a key to open the locks, the key being arranged to upload from the lock records describing its interaction with previous keys, and a step of transferring the records over the internet from the key to a server for storing the records in a database.
9. A padlock comprising a shackle, a lock mechanism controlling whether the shackle can be opened, a control circuit controlling the lock mechanism, and an interface for receiving from a key an electronic signal encoding rules, the control circuit being arranged to compare the rules with stored data and decide whether the lock is to be opened, the lock mechanism including a solenoid, a permanent magnet, a resilient body, and a movable element which is movable into and out of a blocking position in which it prevents the shackle being opened; the movable element being attracted to the permanent magnet by an magnetic force which biases it into the blocking position, and the resilient body being arranged to urge the movable element out of the blocking position with a force which less than the magnetic force; and the control circuit being arranged, upon determining that the shackle is to be opened, to power the solenoid to generate a magnetic field which reduces the magnetic force; whereby, when the solenoid is not powered, the movable element is retained by the magnetic force in the blocking position, and when the control circuit powers the solenoid, the solenoid reduces the magnetic force and the resilient body moves the movable element from the blocking position.
10. A system according to claim 1 in which at least one of the locks is according to claim 9.
PCT/SG2004/000095 2003-04-16 2004-04-15 Electronic lock and key for access management Ceased WO2004092514A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG200302605 2003-04-16
SG200302605-1 2003-04-16

Publications (1)

Publication Number Publication Date
WO2004092514A1 true WO2004092514A1 (en) 2004-10-28

Family

ID=33297631

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2004/000095 Ceased WO2004092514A1 (en) 2003-04-16 2004-04-15 Electronic lock and key for access management

Country Status (1)

Country Link
WO (1) WO2004092514A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010106474A1 (en) * 2009-03-19 2010-09-23 Honeywell International Inc. Systems and methods for managing access control devices
CN101692292B (en) * 2009-02-17 2012-05-30 天津市宜众科技发展有限公司 Access control system for bicycle
CN103198543A (en) * 2013-03-07 2013-07-10 李凯 Informing battery state of lock in real time
CN103573044A (en) * 2012-08-11 2014-02-12 无锡阿法迪科技有限公司 Lock opened by taking program as key
US8878931B2 (en) 2009-03-04 2014-11-04 Honeywell International Inc. Systems and methods for managing video data
US8941464B2 (en) 2005-10-21 2015-01-27 Honeywell International Inc. Authorization system and a method of authorization
US9280365B2 (en) 2009-12-17 2016-03-08 Honeywell International Inc. Systems and methods for managing configuration data at disconnected remote devices
EP2821970B1 (en) 2013-07-05 2016-04-27 Assa Abloy Ab Access control communication device, method, computer program and computer program product
US9344684B2 (en) 2011-08-05 2016-05-17 Honeywell International Inc. Systems and methods configured to enable content sharing between client terminals of a digital video management system
US9704313B2 (en) 2008-09-30 2017-07-11 Honeywell International Inc. Systems and methods for interacting with access control devices
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
US9894261B2 (en) 2011-06-24 2018-02-13 Honeywell International Inc. Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
EP2238576B1 (en) 2008-01-30 2018-06-06 Evva Sicherheitstechnologie GmbH Method and device for regulating access control
US10038872B2 (en) 2011-08-05 2018-07-31 Honeywell International Inc. Systems and methods for managing video data
CN108564700A (en) * 2018-06-15 2018-09-21 重庆慧居智能电子有限公司 The interim access management system of access control system
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US10192380B2 (en) 2013-07-05 2019-01-29 Assa Abloy Ab Key device and associated method, computer program and computer program product
US10362273B2 (en) 2011-08-05 2019-07-23 Honeywell International Inc. Systems and methods for managing video data
US10523903B2 (en) 2013-10-30 2019-12-31 Honeywell International Inc. Computer implemented systems frameworks and methods configured for enabling review of incident data
EP2348490B1 (en) * 2009-12-22 2020-03-04 9Solutions Oy Access control system
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
WO2022167849A1 (en) * 2021-02-04 2022-08-11 Satyajeet Mohanty System and method for operation of an electronic locking device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0964187A2 (en) * 1998-06-08 1999-12-15 Lemförder Metallwaren AG Shift device for a vehicle transmission with locking mechanism
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
WO2002079947A2 (en) * 2001-04-02 2002-10-10 United States Postal Service Universal delivery and collection box unit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
EP0964187A2 (en) * 1998-06-08 1999-12-15 Lemförder Metallwaren AG Shift device for a vehicle transmission with locking mechanism
WO2002079947A2 (en) * 2001-04-02 2002-10-10 United States Postal Service Universal delivery and collection box unit

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8941464B2 (en) 2005-10-21 2015-01-27 Honeywell International Inc. Authorization system and a method of authorization
EP2238576B1 (en) 2008-01-30 2018-06-06 Evva Sicherheitstechnologie GmbH Method and device for regulating access control
US9704313B2 (en) 2008-09-30 2017-07-11 Honeywell International Inc. Systems and methods for interacting with access control devices
CN101692292B (en) * 2009-02-17 2012-05-30 天津市宜众科技发展有限公司 Access control system for bicycle
US8878931B2 (en) 2009-03-04 2014-11-04 Honeywell International Inc. Systems and methods for managing video data
WO2010106474A1 (en) * 2009-03-19 2010-09-23 Honeywell International Inc. Systems and methods for managing access control devices
US9019070B2 (en) 2009-03-19 2015-04-28 Honeywell International Inc. Systems and methods for managing access control devices
US9280365B2 (en) 2009-12-17 2016-03-08 Honeywell International Inc. Systems and methods for managing configuration data at disconnected remote devices
EP2348490B1 (en) * 2009-12-22 2020-03-04 9Solutions Oy Access control system
US9894261B2 (en) 2011-06-24 2018-02-13 Honeywell International Inc. Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
US9344684B2 (en) 2011-08-05 2016-05-17 Honeywell International Inc. Systems and methods configured to enable content sharing between client terminals of a digital video management system
US10038872B2 (en) 2011-08-05 2018-07-31 Honeywell International Inc. Systems and methods for managing video data
US10863143B2 (en) 2011-08-05 2020-12-08 Honeywell International Inc. Systems and methods for managing video data
US10362273B2 (en) 2011-08-05 2019-07-23 Honeywell International Inc. Systems and methods for managing video data
CN103573044A (en) * 2012-08-11 2014-02-12 无锡阿法迪科技有限公司 Lock opened by taking program as key
CN103198543B (en) * 2013-03-07 2015-06-24 李凯 Informing battery state of lock in real time
CN103198543A (en) * 2013-03-07 2013-07-10 李凯 Informing battery state of lock in real time
EP2821970B1 (en) 2013-07-05 2016-04-27 Assa Abloy Ab Access control communication device, method, computer program and computer program product
US10192380B2 (en) 2013-07-05 2019-01-29 Assa Abloy Ab Key device and associated method, computer program and computer program product
US10282930B2 (en) 2013-07-05 2019-05-07 Assa Abloy Ab Access control communication device, method, computer program and computer program product
US10523903B2 (en) 2013-10-30 2019-12-31 Honeywell International Inc. Computer implemented systems frameworks and methods configured for enabling review of incident data
US11523088B2 (en) 2013-10-30 2022-12-06 Honeywell Interntional Inc. Computer implemented systems frameworks and methods configured for enabling review of incident data
US10643414B2 (en) 2014-04-07 2020-05-05 Videx, Inc. Electronic key device utilizing user input to facilitate access by authorized persons
US10423136B2 (en) 2014-04-07 2019-09-24 Videx, Inc. Distribution of access control information based on movement of an electronic key
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US11423723B2 (en) 2014-04-07 2022-08-23 Videx, Inc. Enhanced access control based on key proximity
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
US12347255B2 (en) 2014-04-07 2025-07-01 Videx, Inc. Remote auditing of electronic keys
CN108564700A (en) * 2018-06-15 2018-09-21 重庆慧居智能电子有限公司 The interim access management system of access control system
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
US11580801B2 (en) 2019-09-06 2023-02-14 Videx, Inc. Access control system with dynamic access permission processing
WO2022167849A1 (en) * 2021-02-04 2022-08-11 Satyajeet Mohanty System and method for operation of an electronic locking device

Similar Documents

Publication Publication Date Title
WO2004092514A1 (en) Electronic lock and key for access management
US5749253A (en) Electrical/mechanical access control systems and methods
US8749382B2 (en) Portable security container
US4727368A (en) Electronic real estate lockbox system
CA2395703C (en) Electronic locking system
US20070171060A1 (en) Portable security container
CA2392405A1 (en) An electronic key device, a system and a method of managing electronic key information
JPH07505988A (en) electronic security system
CN104821030B (en) A kind of gesture control lockset
KR101269695B1 (en) Electric patrol system based on nfc
CN104933794A (en) Intelligent lock system
CN104835232A (en) Voice-control lock
CN107975296B (en) A kind of smart lock and its management system
CN104835231A (en) Face recognition lockset
CN204740645U (en) Acoustic control tool to lock
CN105133954A (en) Intelligent lock
CN204614073U (en) A kind of Smart Home management lockset
CN204614079U (en) A kind of gesture controls lockset
CN104808506A (en) Data server for smart home
CN204650627U (en) A kind of route lockset
KR100423096B1 (en) Door lock remote control system using mobile communication network
CN208654872U (en) Yunmen access control system
CN104933786A (en) Smart home management lock
KR20170015955A (en) A digital doorlock which performs additional authentication by user's callback
JP2003213994A (en) Structure of cylinder lock by electronic control and its control system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
122 Ep: pct application non-entry in european phase