(19)
(11) EP 3 147 869 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
29.03.2017 Bulletin 2017/13

(21) Application number: 15186849.4

(22) Date of filing: 25.09.2015
(51) International Patent Classification (IPC): 
G07C 9/00(2006.01)
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
MA

(71) Applicant: Assa Abloy AB
107 23 Stockholm (SE)

(72) Inventor:
  • JONSSON, Tomas
    144 62 Rönninge (SE)

(74) Representative: Kransell & Wennborg KB 
P.O. Box 27834
115 93 Stockholm
115 93 Stockholm (SE)

   


(54) DETERMINING ACCESS IN A SCENARIO OF A PLURALITY OF LOCKS


(57) It is provided a method for determining whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space. The method is performed in an access control device connected to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks. The method comprises the steps of: determining a position of the portable key device; determining that the portable key device is within one of the active spaces associated with a lock; determining whether the portable key device is granted access to the lock associated with the active space encompassing the position of the portable key device; and transmitting an unlock signal to the lock associated with the active space encompassing the position of the portable key device when access is granted.




Description

TECHNICAL FIELD



[0001] The invention relates to a method, access control device, computer program and computer program product for determining whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space for one of a plurality of locks.

BACKGROUND



[0002] Locks and keys are evolving from the traditional pure mechanical locks. These days, there are wireless interfaces for electronic locks, e.g. by interacting with a portable key device. For instance, Radio Frequency Identification (RFID) has been used as the wireless interface.

[0003] When RFID is used, the user needs to present the portable key device in close proximity to a reader connected to the lock. Moreover, RFID requires a relatively large antenna in the reader by the lock and uses a large amount of energy. Also, RFID is not an interface which can be used for remote system management of the lock; only system management using an RFID device in close proximity of the lock can be used for such tasks. Hence, to allow remote system management, e.g. configuration and monitoring, a second radio interface needs to be added.

[0004] Another solution is to use Ultra High Frequency (UHF). However, with UHF, the range is longer and it is difficult to determine intent. Moreover, if there are several locks in a small area, a single present authorised portable key device risks unlocking more than the lock which the user intends to unlock.

SUMMARY



[0005] It is an object to determine when there is intent of a user to open a lock and to detect which one of a plurality of locks that the user intends to unlock.

[0006] According to a first aspect, it is provided a method for determining whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space. The method is performed in an access control device connected to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks. The method comprises the steps of: determining a position of the portable key device; determining that the portable key device is within one of the active spaces associated with a lock; determining whether the portable key device is granted access to the lock associated with the active space encompassing the position of the portable key device; and transmitting an unlock signal to the lock associated with the active space encompassing the position of the portable key device when access is granted.

[0007] The step of determining a position of the portable key device may comprise determining the position of the portable key device based on angle of arrival measurements.

[0008] The step of determining whether the portable key device is granted access may comprise communicating with the portable key device to authenticate the portable key device.

[0009] The step of determining whether the portable key device is granted access may comprise communicating with the portable key device over Ultra High Frequency, UHF, Ultra Wide Band, UWB.

[0010] The step of transmitting the unlock signal may comprise transmitting the unlock signal using a simpler communication interface than the communication interface used for communication with the portable key device.

[0011] Each one of the active spaces may be defined in three dimensions and wherein the step of determining the position of the portable key device comprises determining the position in three dimensions.

[0012] According to a second aspect, it is provided an access control device arranged to determine whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space, the access control device being connectable to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks. The access control device comprises: a processor; and a memory storing instructions that, when executed by the processor, cause the access control device to: determine a position of the portable key device; determine that the portable key device is within one of the active spaces associated with a lock; determine whether the portable key device is granted access to the lock associated with the active space encompassing the position of the portable key device; and transmit an unlock signal to the lock associated with the active space encompassing the position of the portable key device when access is granted.

[0013] The instructions to determine a position of the portable key device may comprise instructions that, when executed by the processor, cause the access control device to determine the position of the portable key device based on angle of arrival measurements.

[0014] The instructions to determine whether the portable key device is granted access may comprise instructions that, when executed by the processor, cause the access control device to communicate with the portable key device to authenticate the portable key device.

[0015] The instructions to determine whether the portable key device is granted access may comprise instructions that, when executed by the processor, cause the access control device to communicate with the portable key device over Ultra High Frequency, UHF, Ultra Wide Band, UWB.

[0016] The instructions to transmit the unlock signal may comprise instructions that, when executed by the processor, cause the access control device to transmit the unlock signal using a simpler communication interface than the communication interface used for communication with the portable key device.

[0017] Each one of the active spaces may be defined in three dimensions. In such a case, the instructions to determine the position of the portable key device comprise instructions that, when executed by the processor, cause the access control device to determine the position in three dimensions.

[0018] According to a third aspect, it is provided a computer program for determining whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space, the access control device being connectable to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks. The computer program comprises computer program code which, when run on an access control device, causes the access control device to: determine a position of the portable key device; determine that the portable key device is within one of the active spaces associated with a lock; determine whether the portable key device is granted access to the lock associated with the active space encompassing the position of the portable key device; and transmit an unlock signal to the lock associated with the active space encompassing the position of the portable key device when access is granted.

[0019] According to a fourth aspect, it is provided a computer program product comprising a computer program according to the third aspect and a computer readable means on which the computer program is stored.

[0020] Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

BRIEF DESCRIPTION OF THE DRAWINGS



[0021] The invention is now described, by way of example, with reference to the accompanying drawings, in which:

Fig 1 is a schematic top view diagram showing an environment in which embodiments presented herein can be applied in two dimensions;

Fig 2 is a schematic perspective view diagram showing an environment in which embodiments presented herein can be applied in three dimensions;

Fig 3 is a flow chart illustrating an embodiment of a method performed in the access control device of Fig 1 for determining whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space;

Fig 4 is a schematic diagram illustrating an embodiment of the access control device of Figs 1-2; and

Fig 5 shows one example of a computer program product comprising computer readable means.


DETAILED DESCRIPTION



[0022] The invention will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout the description.

[0023] Fig 1 is a schematic diagram showing an environment in which embodiments presented herein can be applied. Access to a plurality of restricted physical spaces 16a-d is restricted by respective physical barriers 15a-d which are selectively unlockable as controlled by an access control device 13. The physical barriers 15a-d stand between the respective restricted physical spaces 16a-d and an accessible physical space 14. It is to be noted that the accessible physical space 14 can be a restricted physical space in itself, but in relation to these physical barriers 15a-d, the accessible physical space 14 is accessible. The barriers 15a-d can be doors, gates, hatches, cabinet doors, drawers, windows, etc. In order to unlock any one of the barriers 15a-d, the access control device 13 is provided. The access control device 13 is connected to respective physical locks 12a-d, which are controllable by the access control device 13 to be set in an unlocked state or locked state.

[0024] The access control device 13 here communicates with a portable key device 2 using a credential interface over a wireless interface using a plurality of antennas 5a-b. The portable key device 2 is any suitable device portable by a user and which can be used for authentication over the wireless interface. The portable key device 2 is typically carried or worn by the user and may be implemented as a mobile phone, a smartphone, a key fob, wearable device, smart phone case, access card, etc. In Fig 1, two antennas 5a-b can be seen. However, there may be fewer or more antennas provided in connection with the access control device 13. The antennas 5a-b can also be used for communicating with the lock devices 12a-d. Using wireless communication, the authenticity and authority of the portable key device can be checked in an access control procedure, e.g. using a challenge and response scheme, after which the access control device 13 grants or denies access. Alternatively or additionally, the portable key device 2 can be used in the same way to, when granted, trigger the barrier to be opened e.g. using a door opener. The antennas may also used in determining a position of the portable key device 2, e.g. using angle of arrival.

[0025] Each combination of barrier 15a-d and lock 12a-d has a respectively associated active space 7a-d. Each active space 7a-d is defined such that when a user (or more accurately the portable key device 2 of a user) is located in an active space, this is interpreted as intent to open the lock associated with that active space. Hence, the position of the portable key device 2 is detected and used by the access control device 13 with reference to the active spaces 7a-d to know which lock to perform the access control for.

[0026] When the access control procedure results in granted access, the access control device 13 sends an unlock signal to the lock 12a-d in question, whereby that lock 12a-d is set in an unlocked state. The signal from the access control device 13 to the lock devices 12a-d can be communicated using wireless communication via the antennas 5a-b over any suitable wireless interface, e.g. using Bluetooth, Bluetooth Low Energy (BLE), any of the IEEE 802.15 standards, Radio Frequency Identification (RFID), any of the IEEE 802.11 standards, wireless USB (Universal Serial Bus), etc. Alternatively or additionally, the communication can occur using wire based communication, e.g. using USB, Ethernet, serial connection (e.g. RS-485), etc. When a lock 12a-d is in an unlocked state, its respective barrier 15a-d can be opened and when the lock 12a-d is in a locked state, its respective barrier 15a-d cannot be opened. In this way, access to restricted spaces 16a-d is controlled by a single access control device 13.

[0027] In the example shown in Fig 1, the access control device 13 determines that there is an intent to open the fourth lock 12d and performs an access control procedure to grant or deny access to the fourth restricted physical space 16d.

[0028] Using this system, the locks 12a-d can be simple devices which do not need any credential interfaces, e.g. for positioning of the portable key device, since intent to open a particular lock can be determined by the access control device 13, even when used for a plurality of locks. By using a single access control device 13 for a plurality of locks, a very cost effective solution is provided compared to if each lock needs its own credential interface. Moreover, the space and power requirement is reduced for each lock compared to if it needs to communicate with the portable key device. Moreover, the locks only need one radio interface, to the access control device. This radio interface is then used both during access control (unlock signal from the access control device to the lock), and for system management such as for configuration and monitoring of the lock. This solution can be useful in environments where there are many locks in a small area which can then be made at low cost since individual capability of access control is not necessary. For instance, this solution can be applied in server rooms, changing rooms, pharmacies, hotel rooms, residential buildings, etc.

[0029] While the system is here shown with four locks, the system can be provided with any suitable number of locks. The system in Fig 1 is used for determination of position and active spaces in two dimensions, x-y.

[0030] Fig 2 is a schematic perspective view diagram showing an environment in which embodiments presented herein can be applied in three dimensions. The system works in the same way as illustrated in Fig 1. Here however, the position of the portable key device 2 is determined in three dimensions x-y-z and each one of the active spaces 7a-d are defined in three dimensions x-y-z. Using three dimensions, this system can e.g. be used for controlling access to cabinet doors, drawers, etc. Again, the system can be provided with any suitable number of locks and respective barriers, for which access is controlled using a single access control device 13.

[0031] Fig 3 is a flow chart illustrating an embodiment of a method performed in the access control device of Fig 1 for determining whether access is granted for a portable key device for unlocking a lock controlling access to a restricted physical space.

[0032] In a determine position step 40, a position of the portable key device is determined. The position can be determined using any suitable procedure. For instance, the position of the portable key device can be determined based on angle of arrival measurements. Angle of arrival measurements can be done when there are at least two antennas. When a wireless signal is received from the portable key device 2, a time difference in receiving the wireless signal can be detected. This can e.g. be detected using a phase difference between the received signals. Using the time difference, an angle of arrival (AoA) is calculated. The AoA is an angle in relation to a line between the antennas. The measurement can be performed for two pairs of antennas (optionally one antenna is mutual in the two pairs), to obtain two lines of direction to the portable key device 2. The position of the portable key device can then be determined as the position where the two lines cross. More pairs of antennas can be used to gain better precision and/or position determination in three dimensions.

[0033] Alternative or additional procedures for determining position of the portable key device can be applied.

[0034] In one embodiment, each one of the active spaces is defined in three dimensions and the position of the portable key device is also determined in three dimensions, corresponding to the embodiment shown in Fig 2 and described above.

[0035] In a conditional within space for lock step 42, the access control device determines whether the portable key device is within one of the active spaces associated with a lock. Each active area can be defined in any suitable way in either two or three dimensions. If the portable key device is within one of the active spaces associated with a lock, the method proceeds to a conditional grant access step 44. Otherwise, the method returns to the determine position step 40.

[0036] In the conditional grant access step 44, the access control device determines whether the portable key device is granted access to the lock associated with the active space encompassing the position of the portable key device. This can comprise communicating with the portable key device to authenticate the portable key device. This communication with the portable key device can e.g. be over Ultra High Frequency, UHF, Ultra Wide Band, UWB. Such communication can also be used for position determination of the portable key device, e.g. using angle of arrival as explained above. Optionally, access is checked in communication with a central server of an access control system to provide online access control. If access is granted, the method proceeds to a transmit unlock signal step 46. Otherwise the method ends, or optionally returns to the determine position step (not shown).

[0037] In the transmit unlock signal step 46, an unlock signal is transmitted to the lock associated with the active space encompassing the position of the portable key device. In one embodiment, the communication for the unlock signal uses a simpler communication interface than the communication interface used for communication with the portable key device. This reduces implementation requirements on the locks to thereby keep costs and energy requirements down. For instance, the communication with the lock can occur using UHF without UWB.

[0038] Fig 4 is a schematic diagram illustrating an embodiment of the access control device 13 of Fig 1.

[0039] A processor 60 controls the general operation of access control device 13. The processor 60 can be any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller unit (MCU), digital signal processor (DSP), application specific integrated circuit (ASIC) etc., capable of executing software instructions or otherwise configured to behave according to predetermined logic. Hence, the processor 60 can be capable of executing software instructions 66 stored in a memory 64, which can thus be a computer program product. The processor 60 can be configured to execute the method described with reference to Fig 3 above.

[0040] The memory 64 can be any combination of random access memory (RAM) and read only memory (ROM). The memory 64 also comprises persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid state memory or even remotely mounted memory.

[0041] A data memory 65 is also provided for reading and/or storing data during execution of software instructions in the processor 60, for instance positions of one or more portable key devices and active spaces for locks. The data memory 65 can be any combination of random access memory (RAM) and read only memory (ROM).

[0042] The access control device 13 further comprises an I/O interface 63 for communicating with other external entities such as one or more locks 12 and a portable key device 2, e.g. to exchange digital authentication data. The I/O interface 63 communicates with the portable key device 2 over a wireless interface using a plurality of antennas 5. The antennas 5, as explained above, can be used to determine the position of the portable key device. It is to be noted that the antennas can also be external to the access control device 13. The I/O interface 63 comprises necessary circuitry (e.g. transceivers, etc.) for supporting wireless communication over any suitable wireless interface, e.g. using Bluetooth, Bluetooth Low Energy (BLE), any of the IEEE 802.15 standards, Radio Frequency Identification (RFID), Near Field Communication (NFC), any of the IEEE 802.11 standards, wireless USB, etc. For each wireless interface, the I/O interface 63 is connected to one or more of the antennas 5, as suitable. For communication with the lock 12, the I/O interface 63 may also support any of the wireless interfaces or wire based communication, e.g. using Universal Serial Bus (USB), Ethernet, serial connection (e.g. RS-485). The I/O interface 63 may also support communication with a central server for online access control using any of the wireless or wired communication interfaces.

[0043] Optionally, the access control device 13 also includes a user interface 69, e.g. comprising any one or more of a light emitting diodes (LED) or other lights, a display, keys or keypad, etc.

[0044] Fig 5 shows one example of a computer program product comprising computer readable means. On this computer readable means a computer program 91 can be stored, which computer program can cause a processor to execute a method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. As explained above, the computer program product could also be embodied in a memory of a device, such as the computer program product 64 of Fig 4. While the computer program 91 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product, such as a removable solid state memory, e.g. a Universal Serial Bus (USB) drive.

[0045] The invention has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.


Claims

1. A method for determining whether access is granted for a portable key device (2) for unlocking a lock (12a-d) controlling access to a restricted physical space (16a-d), the method being performed in an access control device (13) connected to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks, the method comprising the steps of:

determining (40) a position of the portable key device (2);

determining (42) that the portable key device (2) is within one of the active spaces associated with a lock;

determining (44) whether the portable key device (2) is granted access to the lock associated with the active space encompassing the position of the portable key device (2); and

transmitting (46) an unlock signal to the lock associated with the active space encompassing the position of the portable key device (2) when access is granted.


 
2. The method according to claim 1, wherein the step of determining (40) a position of the portable key device (2) comprises determining the position of the portable key device (2) based on angle of arrival measurements.
 
3. The method according to claim 1 or 2, wherein the step of determining (44) whether the portable key device (2) is granted access comprises communicating with the portable key device (2) to authenticate the portable key device (2).
 
4. The method according to claim 3, wherein the step of determining (44) whether the portable key device (2) is granted access comprises communicating with the portable key device (2) over Ultra High Frequency, UHF, Ultra Wide Band, UWB.
 
5. The method according to claim 3 or 4, wherein the step of transmitting (46) the unlock signal comprises transmitting the unlock signal using a simpler communication interface than the communication interface used for communication with the portable key device (2).
 
6. The method according to any one of the preceding claims, wherein each one of the active spaces is defined in three dimensions and wherein the step of determining (40) the position of the portable key device (2) comprises determining the position in three dimensions.
 
7. An access control device (13) arranged to determine whether access is granted for a portable key device (2) for unlocking a lock (12a-d) controlling access to a restricted physical space (16a-d), the access control device (13) being connectable to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks, the access control device comprising:

a processor (60); and

a memory (64) storing instructions (66) that, when executed by the processor, cause the access control device (3) to:

determine a position of the portable key device (2);

determine that the portable key device (2) is within one of the active spaces associated with a lock;

determine whether the portable key device (2) is granted access to the lock associated with the active space encompassing the position of the portable key device (2); and

transmit an unlock signal to the lock associated with the active space encompassing the position of the portable key device (2) when access is granted.


 
8. The access control device (13) according to claim 7, wherein the instructions to determine a position of the portable key device (2) comprise instructions (66) that, when executed by the processor, cause the access control device (3) to determine the position of the portable key device (2) based on angle of arrival measurements.
 
9. The access control device (13) according to claim 7 or 8, wherein the instructions to determine whether the portable key device (2) is granted access comprise instructions (66) that, when executed by the processor, cause the access control device (3) to communicate with the portable key device (2) to authenticate the portable key device (2).
 
10. The access control device (13) according to claim 9, wherein the instructions to determine whether the portable key device (2) is granted access comprise instructions (66) that, when executed by the processor, cause the access control device (3) to communicate with the portable key device (2) over Ultra High Frequency, UHF, Ultra Wide Band, UWB.
 
11. The access control device (13) according to claim 9 or 10, wherein the instructions to transmit the unlock signal comprise instructions (66) that, when executed by the processor, cause the access control device (3) to transmit the unlock signal using a simpler communication interface than the communication interface used for communication with the portable key device (2).
 
12. The access control device (13) according to any one of claims 7 to 11, wherein each one of the active spaces is defined in three dimensions and wherein the instructions to determine the position of the portable key device (2) comprise instructions (66) that, when executed by the processor, cause the access control device (3) to determine the position in three dimensions.
 
13. A computer program (91) for determining whether access is granted for a portable key device (2) for unlocking a lock (12a-d) controlling access to a restricted physical space (16a-d), the access control device (13) being connectable to a plurality of locks, wherein there is a respective active space associated with each one of the plurality of locks, the computer program comprising computer program code which, when run on an access control device (13), causes the access control device (13) to:

determine a position of the portable key device (2);

determine that the portable key device (2) is within one of the active spaces associated with a lock; and

determine whether the portable key device (2) is granted access to the lock associated with the active space encompassing the position of the portable key device (2); and

transmit an unlock signal to the lock associated with the active space encompassing the position of the portable key device (2) when access is granted.


 
14. A computer program product (90) comprising a computer program according to claim 13 and a computer readable means on which the computer program is stored.
 




Drawing













Search report









Search report