(19)
(11) EP 2 919 202 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
16.09.2015 Bulletin 2015/38

(21) Application number: 14158580.2

(22) Date of filing: 10.03.2014
(51) International Patent Classification (IPC): 
G07C 9/00(2006.01)
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME

(71) Applicant: ASSA ABLOY AB
107 23 Stockholm (SE)

(72) Inventors:
  • Holmström, Ingemar
    192 56 Sollentuna (SE)
  • Einberg, Fredrik
    141 41 Huddinge (SE)

(74) Representative: Kransell & Wennborg KB 
P.O. Box 27834
115 93 Stockholm
115 93 Stockholm (SE)

   


(54) RFID powered lock device


(57) It is presented a method performed in a lock device. The method comprises the steps of: receiving, in a passive Radio-frequency Identification, RFID, transceiver, energy from a key device using wireless energy transfer; entering an active state from an idle state; exchanging RFID data with the RFID reader; obtaining an access decision based on the RFID data; and mechanically unlocking the lock device when access is granted and wireless energy more than a threshold amount has been received.




Description

TECHNICAL FIELD



[0001] The invention relates to a lock device which is powered using RFID (Radio Frequency Identification) and associated method, computer program and computer program product.

BACKGROUND



[0002] Lock devices and key devices are evolving from the traditional pure mechanical locks. These days, various types of electronic key devices can be used to unlock lock devices. For example, wireless communication such as RFID, NFC (Near Field Communication), etc. or galvanic electronic connections can be used to communicate credentials from the key device to the lock device which can thereby grant or deny access.

[0003] However, the lock device needs to be powered by a power supply in some way to perform electronic access control, and unlock the lock device. This can e.g. be achieved using batteries, fixed line power, etc. For battery powered lock devices, this creates a maintenance requirement to make sure that the batteries do not run out. For fixed line powered locks, installation is made complex since an electrical power line needs to be drawn to the lock.

[0004] US 2010/0085160 discloses an electronic lock and key system utilising RFID.

[0005] It would be greatly beneficial if there were to be a way to omit the battery or fixed line power of locks in the prior art.

SUMMARY



[0006] It is an object to provide a lock device which does not need battery power or main line power.

[0007] According to a first aspect, it is presented a method performed in a lock device. The method comprises the steps of: receiving, in a passive Radio-frequency Identification, RFID, transceiver, energy from a key device using wireless energy transfer; entering an active state from an idle state; exchanging RFID data with the RFID reader; obtaining an access decision based on the RFID data; and mechanically unlocking the lock device when access is granted and wireless energy more than a threshold amount has been received. This allows the lock device to be powered only by the RF field from the RF reader, whereby the lock device does not need a battery or main line power supply.

[0008] The method may further comprise the step of: receiving additional energy from an additional energy source, such as an energy harvesting energy source, e.g. solar cells, mechanical to electrical power converter (connected to a door handle), etc. In this way, additional energy can be obtained when needed, without having to resort to a battery or main line power supply.

[0009] The step of obtaining an access decision may comprise making the access decision.

[0010] The step of obtaining an access decision may comprise receiving the access decision from the key device.

[0011] The step of mechanically unlocking may be performed when sufficient energy has been received to perform the unlocking.

[0012] The step of mechanically unlocking may comprise sending a control signal to a motor or a solenoid.

[0013] The step of exchanging RFID data may comprise receiving a request of an identifier of the lock device, and receiving a command to write credential data.

[0014] The method may further comprise the step of: transmitting a result of the access decision to the key device.

[0015] According to a second aspect, it is presented a lock device comprising: a passive Radio-frequency Identification, RFID, transceiver arranged to receive energy from a key device using wireless energy transfer from a key device such that the lock device enters an active state from an idle state, the passive RFID transceiver being further arranged to exchange RFID data with the RFID reader; a controller; a memory storing instructions that, when executed by the controller, causes the lock device to obtain an access decision based on the RFID data; and an actuator arranged to perform a mechanical unlocking action when access is granted and wireless energy more than a threshold amount has been received.

[0016] The lock device may further comprise an additional energy source.

[0017] The instructions to obtain an access decision may comprise instructions that, when executed by the processor, causes the lock device to make the access decision.

[0018] The instructions to obtain an access decision may comprise instructions that, when executed by the processor, causes the lock device to receive the access decision from the key device.

[0019] The actuator may be arranged to perform the mechanical unlocking when sufficient energy has been received to perform the mechanical unlocking. This can be implemented using instructions stored in the memory that, when executed by the controller, causes the lock device to mechanically unlock when sufficient energy has been received to perform the mechanical unlocking.

[0020] The passive RFID transceiver may be arranged to receive a request of an identifier of the lock device, and to receive a command to write credential data. This can be implemented using instructions stored in the memory that, when executed by the controller, causes the lock device to receive a request of an identifier of the lock device, and to receive a command to write credential data.

[0021] The passive RFID transceiver may be further arranged to transmit a result of the access decision to the key device. This can be implemented using instructions stored in the memory that, when executed by the controller, causes the lock device to transmit a result of the access decision to the key device.

[0022] According to a third aspect, it is presented a computer program comprising computer program code which, when run on a lock device, causes the lock device to: receive, in a passive Radio-frequency Identification, RFID, transceiver, energy from a key device using wireless energy transfer; enter an active state from an idle state; exchange RFID data with the RFID reader; obtain an access decision based on the RFID data; and mechanically unlock the lock device when access is granted and wireless energy more than a threshold amount has been received.

[0023] According to a fourth aspect, it is presented a computer program product comprising a computer program according to the third aspect and a computer readable means on which the computer program is stored.

[0024] Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

BRIEF DESCRIPTION OF THE DRAWINGS



[0025] The invention is now described, by way of example, with reference to the accompanying drawings, in which:

Fig 1 is a schematic diagram showing an environment in which embodiments presented herein can be applied;

Fig 2 is a schematic diagram illustrating some components of the key device and the lock device of Fig 1 and how these interact according to one embodiment;

Figs 3A-B are schematic sequence diagrams further illustrating the interaction between the key device and the lock device 1 of Fig 1 according to various embodiments;

Figs 4A-B are flow charts illustrating methods according various embodiments performed in the lock device of Figs 1-3; and

Fig 5 is a schematic diagram showing one example of a computer program product comprising computer readable means.


DETAILED DESCRIPTION



[0026] The invention will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout the description.

[0027] Fig 1 is a schematic diagram showing an environment in which embodiments presented herein can be applied.

[0028] In this example, there is a door 15 which mechanically interacts with a lock device 1 using a mechanical interface 17, such as a bolt. A key device 10 can interact with the lock device 1, after which the lock device 1 determines whether to grant access, and the lock device 1 is set in an unlocked state when access is granted. When the lock device 1 is in an unlocked state, the door 15 can be opened and when the lock device 1 is in a closed state, the door cannot be opened. In this way, access to a closed space 16 is controlled by the lock device 1. It is to be noted that the lock device 1 can be located in a fixed structure by the door, such as the door frame (not shown) or in the door 15 (as shown).

[0029] Fig 2 is a schematic diagram illustrating some components of the key device 10 and the lock device 1 of Fig 1 and how these interact according to one embodiment.

[0030] The key device 10 and the lock device 1 interact using RFID so that the lock device 1 can be set in an unlocked state when it grants access to the key device.

[0031] In the prior art for RFID based locks and keys, the key device is a passive RFID tag (or behaves like one) and the lock device is an RFID reader. An advantage of that is that the key device does not need to have any other energy source than the energy received over wireless energy transfer from the RFID reader. Common passive RFID standards used in this field are ISO/IEC 14443 and ISO/IEC 15693, both using an RF carrier of 13,56 MHz to create a field suitable for energy and data transfer. It shall be noted that embodiments presented herein are not limited to the use of these standards only. Other frequencies including high frequency, low frequency (such as 125 KHz), ultra high frequency (such as 900 MHz) or any other suitable frequency may equally well be used.

[0032] It is to be noted that herein, the term reader refers to the side generating the RF carrier driving the RF field and transmitting data e.g. via direct modulation (such as amplitude-shift keying) of the carrier. The term tag used herein refers to the side receiving data and energy from the reader and transmitting data back, e.g. via load modulation of the RF field. Referring to mentioned standards other names for the reader and tag are Proximity Coupling Device -PCD and Printed Integrated Circuit Card - PICC (as used in ISO/IEC 14443) and Vicinity Coupling Device - VCD and Vicinity Integrated Circuit Card - VICC (as used in ISO/IEC 15693).

[0033] However, the inventors have realised that instead, since the key device 10 these days is often a powered device, such as a mobile phone, the key device 10 can be the RFID reader and the lock device 1 can behave as an RFID tag. In this way, the lock device 1 can receive energy using wireless energy transfer from the key device, i.e. from the RF field created by the key device. In this way, the lock device 1 does not need any battery, fixed line power, etc. Optionally, complementary energy harvesting, e.g. solar cells, can be used to reduce the amount of energy that has to be harvested from the RF field.

[0034] Hence, a major difference compared to the prior art, is that the lock device 1 is a passive RFID device, i.e. a tag type device, and the key device is an active RFID reader.

[0035] The key device 10 thus comprises an RFID reader 12 connected to an antenna 13. Furthermore, the key device 10 comprises a power source 13, such as one or more of a rechargeable or disposable battery, and a controller 11. The controller 11 can be any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller unit (MCU), digital signal processor (DSP), application specific integrated circuit etc., capable of executing software instructions or otherwise controllable to behave according to predetermined logic. The key device 10 may be implemented as a mobile phone, a smartphone, a key fob, credit card shaped device, etc.

[0036] A memory 18 is provided which can store credential data of the key device 10. The credential data in the key is used to determine whether a key is to be granted access to open a lock. In other words, credential data can be considered to be access rights to a lock. The memory 18 can be any combination of read and write memory (RAM) and read only memory (ROM). The memory 18 also comprises persistent storage, which, for example, can be any single one or combination of solid state memory, magnetic memory, or optical memory storing a computer program with software instructions for performing the steps of the key device described with reference to Figs 3A-B below.

[0037] Other components of the key device, such as user interface components, etc. are omitted here for reasons of clarity.

[0038] The lock device 1, in turn, comprises a passive RFID transceiver 2 with a connected antenna 6. The RFID reader 12 and the passive RFID transceiver 2 interact over a wireless interface 17 which is used both to transfer energy from the RF field generated by the RFID reader 12 to the passive RFID transceiver 2 and for communication in either direction, as shown in more detail in Figs 3A-B and described below.

[0039] An optional energy harvester 8 is configured to use energy harvesting as an additional energy source, e.g. using solar cells, mechanical to electrical conversion of a door handle, etc.

[0040] The electrical energy from the passive RFID transceiver 2 and/or the energy harvester 8 is stored in energy storage 7. The energy storage can e.g. be a capacitor and/or battery. The passive RFID transceiver itself is powered from the RF field. The excess energy is stored in the energy storage which is the power source for all other components in the lock device.

[0041] A controller 3 controls the general operation of the lock device. 1. The controller 3 can be any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller unit (MCU), digital signal processor (DSP), application specific integrated circuit (ASIC) etc., capable of executing software instructions or otherwise configured to behave according to predetermined logic.

[0042] In one embodiment, the controller 3 receives credential data from the passive RFID transceiver 2. In this way, the controller 3 makes an access decision, determining whether to grant access and unlock the lock device for the key device 10 communicating with the passive RFID transceiver. The credential data can be checked locally, e.g. checking against data in a memory 14 such as lock identification data, comprising a unique lock ID and optionally a lock group ID (a lock can belong to a group of locks) and a site ID. The memory 14 can be any combination of read and write memory (RAM) and read only memory (ROM). The memory 14 also comprises persistent storage, which, for example, can be any single one or combination of solid state memory, magnetic memory, or optical memory, storing a computer program with software instructions for performing the method according to the embodiments described below.

[0043] In one embodiment, it is the key device 10 that makes the access decision and sends the result of the access decision to the lock device.

[0044] Based on the access decision in the lock device or the key device, unlocking is conditionally performed. If the lock device 1 is not to be unlocked, no action needs to be performed and the lock device 1 remains in a closed state. Optionally, user feedback is provided using a user interface 9 to inform of the denied access. If the lock device 1 is to be unlocked, the controller 3 provides an unlock signal to a motor driver 4. Optionally, user feedback of the granted access can be provided using the user interface in a way that differs from any user feedback for denied access. For example, denied access can be indicating by lighting a red light emitting diode (LED) (not shown) and granted access can be indicated by lighting a green LED. Alternatively or additionally, denied access is indicated by blinking the LED while granted access is indicated with a solid lit LED. Alternatively or additionally a message of the result can be shown on a display.

[0045] The motor driver 4 then sends a motor control signal to a motor 5 to operate in order to set the lock device 1 in an unlocked state. Optionally, the motor driver 4 is part of the motor 5. Once the motor 5 is provided with the motor control signal, it is activated and can thereby move a mechanical interface, e.g. to allow movement of the bolt 17 of Fig 1, to set the lock device 1 in an unlocked state. The motor 5 can e.g. be a direct current motor which can be made small, energy efficient and at low cost. The motor 5 uses the energy stored in the energy storage 7 to perform the unlock action. Once in the unlocked state, a knob or handle can then be used by the user to manually move the lock bolt so that it is possible to open the door. This user actuated mechanical action can be harvested by an energy harvester 8 comprising a mechanical to electrical power converter (connected to the handle or knob), to thereby store electrical energy in the energy storage 7.

[0046] Unlocked state is here to be interpreted that the lock mechanism has been actuated in a way so that it is possible to move the bolt or other physical arrangement to gain access to the access controlled space. The bolt could be driven by a motor as well, but in such arrangement additional energy harvesting and/or a battery may be required.

[0047] In one embodiment, there is no motor and motor driver and instead the controller, when access is granted, sends a signal to a solenoid (not shown) to set the lock device 1 in an unlocked state.

[0048] Figs 3A-B are schematic sequence diagrams further illustrating the interaction between the key device 10 and the lock device 1 of Fig 1 according to various embodiments. First, the embodiment of Fig 3A will be described, where the access decision is made in the lock device.

[0049] When the key device 10 approaches the lock device 1, the key device 10 transmits an RF (Radio Frequency) carrier 20 to the lock device 1.

[0050] This causes the lock device 1 to wake up, i.e. to enter an active state, and to start receiving energy over the wireless interface with the key device 10.

[0051] The key device 10 will then initiate an RFID initialisation 22 with the lock device 1. This can e.g. comprise anti-collision procedures to resolve any potential situation with several tags in the vicinity of the key device (being the RFID reader). This will result in the key device 10 obtaining the RFID UID (Unique Identifier) of the lock device. The UID may, but does not need to, be used as a lock identifier for a later access decision. The lock device 1 and the key device 10 then perform a mutual authentication 23 to achieve a secure communication channel between the key device 10 and the lock device 1. The mutual authentication may be based on cryptographic principles. For example, a 3-pass mutual authentication algorithm could be used.

[0052] At this stage, the key device 10 is ready to send its credential data to the lock device 1. Since the key device is an RFID reader, this is done using a write credentials command 21.

[0053] Once the lock device 1 has received the credential data in the write credentials command 21, it performs an access decision 25 based on this, e.g. comparing with lock identification data. The lock identification data previously stored in the lock device comprises a lock ID and optionally a site ID and lock group ID. The credential data received from the key comprises one or more of a list of supported site IDs, lock IDs, and lock group IDs. The lock checks the credential data of the write command for a match with the lock identification data stored in the lock device.

[0054] Optionally, the lock device 1 transmits the result 26 of the access decision to the key device 10, which allows the key device 10 to notify the user 29, e.g. using a display of a host device of the key device, such as a mobile phone.

[0055] If the access decision results in granted access, the lock device 1 unlocks 28 and enters an unlocked state.

[0056] Now, the embodiment of Fig 3B will be described, where the access decision is made in the key device. Only the communication and execution which differs from what is described with reference to Fig 3A will be described here.

[0057] In this embodiment, it is the key device 10 which performs the access decision 25'. The lock identification data 24 is read from the lock device 1 after the mutual authentication. In the access decision 25', the key device 10 then checks the lock identification against the credential data stored in the key to for an access decision.

[0058] When the access decision 25' results in granted access, the key device 10 sends an unlock command 30 to the lock device 1 which subsequently unlocks 28 the lock the device.

[0059] Optionally, if access is denied, the key device 10 also notifies the lock device 1 by sending an access denied message to the lock device 1.

[0060] Optionally, the key device 10 notifies the user 29 of the result of the access decision 25'.

[0061] Optionally, the lock device 1 notifies the user about the access decision it has received from the key device 10 via LEDs as previously described or in other ways.

[0062] Figs 4A-B are flow charts illustrating methods according various embodiments performed in the lock device of Figs 1-3. The method is performed to controllably unlock the lock device.

[0063] In a start to receive wireless energy step 40, energy is received from a key device using wireless energy transfer. The energy is received in the passive RFID transceiver (2 of Fig 2) of the lock device, which is thus transferred from the RFID reader (12 of Fig 2) of the key device. The passive RFID transceiver itself is powered from the RF field. The excess energy is stored in the energy storage which is the power source for all other components in the lock device. This step corresponds to the wake up and start receiving energy 21 of Figs 3A-B.

[0064] In an enter active state step 42, the lock device enters an active state when sufficient energy has been harvested to power a sufficient number of components to make the lock device operational. It is to be noted though, at this stage, that the motor and motor driver do not need to be powered. This step corresponds to the wake up and start receiving energy 21 of Figs 3A-B.

[0065] In an exchange RFID data step 44, RFID data is exchanged with the RFID reader, i.e. the key device. This step can include RFID initialisation (22 of Figs 3A-B) where the key device (RFID reader) initiates an anti-collision sequence with the lock device to resolve any potential situation with several tags in the vicinity of the RFID reader. This will result in the key device obtaining the RFID UID of the lock device. The UID may, but does not need to, be used as a lock identifier. Moreover, this step can include performing mutual authentication (23 of Figs 3A-B) to achieve a secure communication channel between the key device 10 and the lock device 1.

[0066] In a obtain access decision step 46, an access decision is obtained. This access decision can be received from the key device or the lock device can make this access decision based on the RFID data. This step corresponds to the access decision 25 of Fig 3A and the access decision 25' of Fig 3B.

[0067] Optionally, there is a transmit result step 47, where the result of the access decision is transmitted to the key device, e.g. for notification to the user, when the access decision is made by the lock device. This corresponds to the transmission of the results message 26 of Fig 3A.

[0068] In a conditional access granted step 48, the result of the obtain access decision step 46 is evaluated. If access is granted, then the method proceeds to a conditional sufficient energy step 49. Otherwise, the method proceeds to a notify user step 53, or if this step is not performed, to an enter idle state step 52.

[0069] In the conditional sufficient energy step 49, it is determined whether wireless energy more than a threshold amount has been received. This can e.g. be done by measuring a voltage across the energy storage (7 of Fig 2). The threshold amount can then be defined as a threshold voltage. The threshold amount is determined such that there is sufficient energy to unlock the lock device. Optionally, the threshold amount is set such that there is some margin of error. If there is sufficient energy stored in the lock device, the method proceeds to an unlock step 50. Otherwise, the method proceeds to a receive more energy step 51.

[0070] In the receive more energy step 51, more wireless energy is received from the key device and stored in the energy storage.

[0071] In the unlock step, the lock device is mechanically unlocked, e.g. by sending a control signal to a motor (5 of Fig 2) or a solenoid. This step corresponds to the unlock 28 of Figs 3A-B.

[0072] Optionally, there is a receive additional energy step 38, which can be performed in parallel to the start to receive wireless energy step 40. In this step, another energy source is utilised e.g. using energy harvesting such as using solar cells, mechanical to electrical conversion of a door handle, etc. It is to be noted that in such a case, the conditional sufficient power step 49 determines if the lock device in total has sufficient power from both wireless energy transfer and the energy received in the receive additional energy step 38.

[0073] After the unlock step 50, there is an optional notify user step 53. In this step, if the preceding step was the unlock step 50, the user is notified either that the lock device is unlocked. On the other hand, if the preceding step was the conditional access granted step 48, access was denied, and the user is notified that access was denied. The notification of the user can e.g. occur using light emitting diodes (LEDs) of different colours or different blinking patterns of a single LED. When the lock device is in unlocked state, the user can open the door and the door can be set in a locked state again, e.g. by manually actuating a lock mechanism of the lock device. As explained above, the mechanical energy of the user opening the door and/or locking the door can optionally be harvested and stored as electrical energy in the energy storage (7 of Fig 2) of the lock device.

[0074] In the enter idle state step 52, the lock device returns to the idle state to conserve energy.

[0075] The method can then be repeated once wireless power is received again from a key device.

[0076] It is to be noted that the method does not need to be performed sequentially as described above. In particular, the lock device 1 can receive wireless energy at the same time as it performs other steps, such as entering the active state, exchanging RFID data and makes the access decision.

[0077] Fig 4B is a flow chart illustrating an embodiment of the exchange RFID data step 44 of Fig 4A according to one embodiment. There are here two substeps: an initialisation sub-step 44a and a receive write command sub-step 44b.

[0078] In the initialisation substep 44a, the key device initiates the communication with the lock device. This substep corresponds to the RFID initialisation 22 of Figs 3A-B and may comprise anti-collision procedures to resolve any potential situation with several tags in the vicinity of the key device (being the RFID reader). This will result in the key device obtaining the RFID UID of the lock device.

[0079] In receive write command step 44b, a command is received from the key device to write credential data. This is the credential data used in the obtain access decision step 46 of Fig 4A.

[0080] Fig 5 is a schematic diagram showing one example of a computer program product 90 comprising computer readable means. On this computer readable means a computer program 91 can be stored, which computer program can cause a processor to execute a method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. As explained above, the computer program product could also be embodied in a memory of a device, such as the memory 14 of Fig 2. While the computer program 91 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product.

[0081] The invention has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.


Claims

1. A method performed in a lock device (1), the method comprising the steps of:

receiving (40), in a passive Radio-frequency Identification, RFID, transceiver (2), energy from a key device (10) using wireless energy transfer;

entering (42) an active state from an idle state;

exchanging (44) RFID data with the RFID reader;

obtaining (46) an access decision based on the RFID data; and

mechanically unlocking (50) the lock device (1) when access is granted and wireless energy more than a threshold amount has been received.


 
2. The method according to claim 1, further comprising the step of:

receiving (38) additional energy from an additional energy source (7).


 
3. The method according to any one of the preceding claims, wherein the step of obtaining (46) an access decision comprises making the access decision.
 
4. The method according to claim 1 or 2, wherein the step of obtaining (46) an access decision comprises receiving the access decision from the key device (10).
 
5. The method according to any one of the preceding claims, wherein the step of mechanically unlocking (50) is performed when sufficient energy has been received to perform the unlocking.
 
6. The method according to any one of the preceding claims, wherein the step of mechanically unlocking (50) comprises sending a control signal to a motor or a solenoid.
 
7. The method according to any one of the preceding claims, wherein the step of exchanging (44) RFID data comprises receiving (44a) a request of an identifier of the lock device, and receiving (44b) a command to write credential data.
 
8. The method according to any one of the preceding claims, further comprising the step of:

transmitting (47) a result of the access decision to the key device (10).


 
9. A lock device (1) comprising:

a passive Radio-frequency Identification, RFID, transceiver (2) arranged to receive energy from a key device (10) using wireless energy transfer from a key device (10) such that the lock device enters an active state from an idle state, the passive RFID transceiver being further arranged to exchange RFID data with the RFID reader;

a controller (3);

a memory (14) storing instructions that, when executed by the controller, causes the lock device (1) to obtain an access decision based on the RFID data; and

an actuator (4) arranged to perform a mechanical unlocking action when access is granted and wireless energy more than a threshold amount has been received.


 
10. The lock device (1) according to claim 9, further comprising an additional energy source (7).
 
11. The lock device (1) according to claim 9 or 10, wherein the instructions to obtain an access decision comprise instructions that, when executed by the processor, causes the lock device (1) to make the access decision.
 
12. The lock device (1) according to claim 9 or 10, wherein the instructions to obtain an access decision comprise instructions that, when executed by the processor, causes the lock device (1) to receive the access decision from the key device (10).
 
13. The lock device (1) according to any one of claims 9 to 12, wherein the passive RFID transceiver (2) is arranged to receive a request of an identifier of the lock device (1), and to receive a command to write credential data.
 
14. A computer program (91) comprising computer program code which, when run on a lock device (1), causes the lock device (1) to:

receive, in a passive Radio-frequency Identification, RFID, transceiver (2), energy from a key device (10) using wireless energy transfer;

enter an active state from an idle state;

exchange RFID data with the RFID reader;

obtain an access decision based on the RFID data; and

mechanically unlock the lock device when access is granted and wireless energy more than a threshold amount has been received.


 
15. A computer program product (90) comprising a computer program according to claim 14 and a computer readable means on which the computer program is stored.
 




Drawing
















Search report









Search report




Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description