TECHNICAL FIELD
[0001] The invention relates to a method, access control device, computer program and computer
program product for determining whether access is granted for a portable key device
for unlocking a lock controlling access to a restricted physical space for one of
a plurality of locks.
BACKGROUND
[0002] Locks and keys are evolving from the traditional pure mechanical locks. These days,
there are wireless interfaces for electronic locks, e.g. by interacting with a portable
key device. For instance, Radio Frequency Identification (RFID) has been used as the
wireless interface.
[0003] When RFID is used, the user needs to present the portable key device in close proximity
to a reader connected to the lock. Moreover, RFID requires a relatively large antenna
in the reader by the lock and uses a large amount of energy. Also, RFID is not an
interface which can be used for remote system management of the lock; only system
management using an RFID device in close proximity of the lock can be used for such
tasks. Hence, to allow remote system management, e.g. configuration and monitoring,
a second radio interface needs to be added.
[0004] Another solution is to use Ultra High Frequency (UHF). However, with UHF, the range
is longer and it is difficult to determine intent. Moreover, if there are several
locks in a small area, a single present authorised portable key device risks unlocking
more than the lock which the user intends to unlock.
SUMMARY
[0005] It is an object to determine when there is intent of a user to open a lock and to
detect which one of a plurality of locks that the user intends to unlock.
[0006] According to a first aspect, it is provided a method for determining whether access
is granted for a portable key device for unlocking a lock controlling access to a
restricted physical space. The method is performed in an access control device connected
to a plurality of locks, wherein there is a respective active space associated with
each one of the plurality of locks. The method comprises the steps of: determining
a position of the portable key device; determining that the portable key device is
within one of the active spaces associated with a lock; determining whether the portable
key device is granted access to the lock associated with the active space encompassing
the position of the portable key device; and transmitting an unlock signal to the
lock associated with the active space encompassing the position of the portable key
device when access is granted.
[0007] The step of determining a position of the portable key device may comprise determining
the position of the portable key device based on angle of arrival measurements.
[0008] The step of determining whether the portable key device is granted access may comprise
communicating with the portable key device to authenticate the portable key device.
[0009] The step of determining whether the portable key device is granted access may comprise
communicating with the portable key device over Ultra High Frequency, UHF, Ultra Wide
Band, UWB.
[0010] The step of transmitting the unlock signal may comprise transmitting the unlock signal
using a simpler communication interface than the communication interface used for
communication with the portable key device.
[0011] Each one of the active spaces may be defined in three dimensions and wherein the
step of determining the position of the portable key device comprises determining
the position in three dimensions.
[0012] According to a second aspect, it is provided an access control device arranged to
determine whether access is granted for a portable key device for unlocking a lock
controlling access to a restricted physical space, the access control device being
connectable to a plurality of locks, wherein there is a respective active space associated
with each one of the plurality of locks. The access control device comprises: a processor;
and a memory storing instructions that, when executed by the processor, cause the
access control device to: determine a position of the portable key device; determine
that the portable key device is within one of the active spaces associated with a
lock; determine whether the portable key device is granted access to the lock associated
with the active space encompassing the position of the portable key device; and transmit
an unlock signal to the lock associated with the active space encompassing the position
of the portable key device when access is granted.
[0013] The instructions to determine a position of the portable key device may comprise
instructions that, when executed by the processor, cause the access control device
to determine the position of the portable key device based on angle of arrival measurements.
[0014] The instructions to determine whether the portable key device is granted access may
comprise instructions that, when executed by the processor, cause the access control
device to communicate with the portable key device to authenticate the portable key
device.
[0015] The instructions to determine whether the portable key device is granted access may
comprise instructions that, when executed by the processor, cause the access control
device to communicate with the portable key device over Ultra High Frequency, UHF,
Ultra Wide Band, UWB.
[0016] The instructions to transmit the unlock signal may comprise instructions that, when
executed by the processor, cause the access control device to transmit the unlock
signal using a simpler communication interface than the communication interface used
for communication with the portable key device.
[0017] Each one of the active spaces may be defined in three dimensions. In such a case,
the instructions to determine the position of the portable key device comprise instructions
that, when executed by the processor, cause the access control device to determine
the position in three dimensions.
[0018] According to a third aspect, it is provided a computer program for determining whether
access is granted for a portable key device for unlocking a lock controlling access
to a restricted physical space, the access control device being connectable to a plurality
of locks, wherein there is a respective active space associated with each one of the
plurality of locks. The computer program comprises computer program code which, when
run on an access control device, causes the access control device to: determine a
position of the portable key device; determine that the portable key device is within
one of the active spaces associated with a lock; determine whether the portable key
device is granted access to the lock associated with the active space encompassing
the position of the portable key device; and transmit an unlock signal to the lock
associated with the active space encompassing the position of the portable key device
when access is granted.
[0019] According to a fourth aspect, it is provided a computer program product comprising
a computer program according to the third aspect and a computer readable means on
which the computer program is stored.
[0020] Generally, all terms used in the claims are to be interpreted according to their
ordinary meaning in the technical field, unless explicitly defined otherwise herein.
All references to "a/an/the element, apparatus, component, means, step, etc." are
to be interpreted openly as referring to at least one instance of the element, apparatus,
component, means, step, etc., unless explicitly stated otherwise. The steps of any
method disclosed herein do not have to be performed in the exact order disclosed,
unless explicitly stated.
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] The invention is now described, by way of example, with reference to the accompanying
drawings, in which:
Fig 1 is a schematic top view diagram showing an environment in which embodiments
presented herein can be applied in two dimensions;
Fig 2 is a schematic perspective view diagram showing an environment in which embodiments
presented herein can be applied in three dimensions;
Fig 3 is a flow chart illustrating an embodiment of a method performed in the access
control device of Fig 1 for determining whether access is granted for a portable key
device for unlocking a lock controlling access to a restricted physical space;
Fig 4 is a schematic diagram illustrating an embodiment of the access control device
of Figs 1-2; and
Fig 5 shows one example of a computer program product comprising computer readable
means.
DETAILED DESCRIPTION
[0022] The invention will now be described more fully hereinafter with reference to the
accompanying drawings, in which certain embodiments of the invention are shown. This
invention may, however, be embodied in many different forms and should not be construed
as limited to the embodiments set forth herein; rather, these embodiments are provided
by way of example so that this disclosure will be thorough and complete, and will
fully convey the scope of the invention to those skilled in the art. Like numbers
refer to like elements throughout the description.
[0023] Fig 1 is a schematic diagram showing an environment in which embodiments presented
herein can be applied. Access to a plurality of restricted physical spaces 16a-d is
restricted by respective physical barriers 15a-d which are selectively unlockable
as controlled by an access control device 13. The physical barriers 15a-d stand between
the respective restricted physical spaces 16a-d and an accessible physical space 14.
It is to be noted that the accessible physical space 14 can be a restricted physical
space in itself, but in relation to these physical barriers 15a-d, the accessible
physical space 14 is accessible. The barriers 15a-d can be doors, gates, hatches,
cabinet doors, drawers, windows, etc. In order to unlock any one of the barriers 15a-d,
the access control device 13 is provided. The access control device 13 is connected
to respective physical locks 12a-d, which are controllable by the access control device
13 to be set in an unlocked state or locked state.
[0024] The access control device 13 here communicates with a portable key device 2 using
a credential interface over a wireless interface using a plurality of antennas 5a-b.
The portable key device 2 is any suitable device portable by a user and which can
be used for authentication over the wireless interface. The portable key device 2
is typically carried or worn by the user and may be implemented as a mobile phone,
a smartphone, a key fob, wearable device, smart phone case, access card, etc. In Fig
1, two antennas 5a-b can be seen. However, there may be fewer or more antennas provided
in connection with the access control device 13. The antennas 5a-b can also be used
for communicating with the lock devices 12a-d. Using wireless communication, the authenticity
and authority of the portable key device can be checked in an access control procedure,
e.g. using a challenge and response scheme, after which the access control device
13 grants or denies access. Alternatively or additionally, the portable key device
2 can be used in the same way to, when granted, trigger the barrier to be opened e.g.
using a door opener. The antennas may also used in determining a position of the portable
key device 2, e.g. using angle of arrival.
[0025] Each combination of barrier 15a-d and lock 12a-d has a respectively associated active
space 7a-d. Each active space 7a-d is defined such that when a user (or more accurately
the portable key device 2 of a user) is located in an active space, this is interpreted
as intent to open the lock associated with that active space. Hence, the position
of the portable key device 2 is detected and used by the access control device 13
with reference to the active spaces 7a-d to know which lock to perform the access
control for.
[0026] When the access control procedure results in granted access, the access control device
13 sends an unlock signal to the lock 12a-d in question, whereby that lock 12a-d is
set in an unlocked state. The signal from the access control device 13 to the lock
devices 12a-d can be communicated using wireless communication via the antennas 5a-b
over any suitable wireless interface, e.g. using Bluetooth, Bluetooth Low Energy (BLE),
any of the IEEE 802.15 standards, Radio Frequency Identification (RFID), any of the
IEEE 802.11 standards, wireless USB (Universal Serial Bus), etc. Alternatively or
additionally, the communication can occur using wire based communication, e.g. using
USB, Ethernet, serial connection (e.g. RS-485), etc. When a lock 12a-d is in an unlocked
state, its respective barrier 15a-d can be opened and when the lock 12a-d is in a
locked state, its respective barrier 15a-d cannot be opened. In this way, access to
restricted spaces 16a-d is controlled by a single access control device 13.
[0027] In the example shown in Fig 1, the access control device 13 determines that there
is an intent to open the fourth lock 12d and performs an access control procedure
to grant or deny access to the fourth restricted physical space 16d.
[0028] Using this system, the locks 12a-d can be simple devices which do not need any credential
interfaces, e.g. for positioning of the portable key device, since intent to open
a particular lock can be determined by the access control device 13, even when used
for a plurality of locks. By using a single access control device 13 for a plurality
of locks, a very cost effective solution is provided compared to if each lock needs
its own credential interface. Moreover, the space and power requirement is reduced
for each lock compared to if it needs to communicate with the portable key device.
Moreover, the locks only need one radio interface, to the access control device. This
radio interface is then used both during access control (unlock signal from the access
control device to the lock), and for system management such as for configuration and
monitoring of the lock. This solution can be useful in environments where there are
many locks in a small area which can then be made at low cost since individual capability
of access control is not necessary. For instance, this solution can be applied in
server rooms, changing rooms, pharmacies, hotel rooms, residential buildings, etc.
[0029] While the system is here shown with four locks, the system can be provided with any
suitable number of locks. The system in Fig 1 is used for determination of position
and active spaces in two dimensions, x-y.
[0030] Fig 2 is a schematic perspective view diagram showing an environment in which embodiments
presented herein can be applied in three dimensions. The system works in the same
way as illustrated in Fig 1. Here however, the position of the portable key device
2 is determined in three dimensions x-y-z and each one of the active spaces 7a-d are
defined in three dimensions x-y-z. Using three dimensions, this system can e.g. be
used for controlling access to cabinet doors, drawers, etc. Again, the system can
be provided with any suitable number of locks and respective barriers, for which access
is controlled using a single access control device 13.
[0031] Fig 3 is a flow chart illustrating an embodiment of a method performed in the access
control device of Fig 1 for determining whether access is granted for a portable key
device for unlocking a lock controlling access to a restricted physical space.
[0032] In a
determine position step 40, a position of the portable key device is determined. The position can be
determined using any suitable procedure. For instance, the position of the portable
key device can be determined based on angle of arrival measurements. Angle of arrival
measurements can be done when there are at least two antennas. When a wireless signal
is received from the portable key device 2, a time difference in receiving the wireless
signal can be detected. This can e.g. be detected using a phase difference between
the received signals. Using the time difference, an angle of arrival (AoA) is calculated.
The AoA is an angle in relation to a line between the antennas. The measurement can
be performed for two pairs of antennas (optionally one antenna is mutual in the two
pairs), to obtain two lines of direction to the portable key device 2. The position
of the portable key device can then be determined as the position where the two lines
cross. More pairs of antennas can be used to gain better precision and/or position
determination in three dimensions.
[0033] Alternative or additional procedures for determining position of the portable key
device can be applied.
[0034] In one embodiment, each one of the active spaces is defined in three dimensions and
the position of the portable key device is also determined in three dimensions, corresponding
to the embodiment shown in Fig 2 and described above.
[0035] In a conditional
within space for lock step 42, the access control device determines whether the portable key device is
within one of the active spaces associated with a lock. Each active area can be defined
in any suitable way in either two or three dimensions. If the portable key device
is within one of the active spaces associated with a lock, the method proceeds to
a conditional
grant access step 44. Otherwise, the method returns to the
determine position step 40.
[0036] In the conditional
grant access step 44, the access control device determines whether the portable key device is
granted access to the lock associated with the active space encompassing the position
of the portable key device. This can comprise communicating with the portable key
device to authenticate the portable key device. This communication with the portable
key device can e.g. be over Ultra High Frequency, UHF, Ultra Wide Band, UWB. Such
communication can also be used for position determination of the portable key device,
e.g. using angle of arrival as explained above. Optionally, access is checked in communication
with a central server of an access control system to provide online access control.
If access is granted, the method proceeds to a transmit unlock signal step 46. Otherwise
the method ends, or optionally returns to the determine position step (not shown).
[0037] In the
transmit unlock signal step 46, an unlock signal is transmitted to the lock associated with the active space
encompassing the position of the portable key device. In one embodiment, the communication
for the unlock signal uses a simpler communication interface than the communication
interface used for communication with the portable key device. This reduces implementation
requirements on the locks to thereby keep costs and energy requirements down. For
instance, the communication with the lock can occur using UHF without UWB.
[0038] Fig 4 is a schematic diagram illustrating an embodiment of the access control device
13 of Fig 1.
[0039] A processor 60 controls the general operation of access control device 13. The processor
60 can be any combination of one or more of a suitable central processing unit (CPU),
multiprocessor, microcontroller unit (MCU), digital signal processor (DSP), application
specific integrated circuit (ASIC) etc., capable of executing software instructions
or otherwise configured to behave according to predetermined logic. Hence, the processor
60 can be capable of executing software instructions 66 stored in a memory 64, which
can thus be a computer program product. The processor 60 can be configured to execute
the method described with reference to Fig 3 above.
[0040] The memory 64 can be any combination of random access memory (RAM) and read only
memory (ROM). The memory 64 also comprises persistent storage, which, for example,
can be any single one or combination of magnetic memory, optical memory, solid state
memory or even remotely mounted memory.
[0041] A data memory 65 is also provided for reading and/or storing data during execution
of software instructions in the processor 60, for instance positions of one or more
portable key devices and active spaces for locks. The data memory 65 can be any combination
of random access memory (RAM) and read only memory (ROM).
[0042] The access control device 13 further comprises an I/O interface 63 for communicating
with other external entities such as one or more locks 12 and a portable key device
2, e.g. to exchange digital authentication data. The I/O interface 63 communicates
with the portable key device 2 over a wireless interface using a plurality of antennas
5. The antennas 5, as explained above, can be used to determine the position of the
portable key device. It is to be noted that the antennas can also be external to the
access control device 13. The I/O interface 63 comprises necessary circuitry (e.g.
transceivers, etc.) for supporting wireless communication over any suitable wireless
interface, e.g. using Bluetooth, Bluetooth Low Energy (BLE), any of the IEEE 802.15
standards, Radio Frequency Identification (RFID), Near Field Communication (NFC),
any of the IEEE 802.11 standards, wireless USB, etc. For each wireless interface,
the I/O interface 63 is connected to one or more of the antennas 5, as suitable. For
communication with the lock 12, the I/O interface 63 may also support any of the wireless
interfaces or wire based communication, e.g. using Universal Serial Bus (USB), Ethernet,
serial connection (e.g. RS-485). The I/O interface 63 may also support communication
with a central server for online access control using any of the wireless or wired
communication interfaces.
[0043] Optionally, the access control device 13 also includes a user interface 69, e.g.
comprising any one or more of a light emitting diodes (LED) or other lights, a display,
keys or keypad, etc.
[0044] Fig 5 shows one example of a computer program product comprising computer readable
means. On this computer readable means a computer program 91 can be stored, which
computer program can cause a processor to execute a method according to embodiments
described herein. In this example, the computer program product is an optical disc,
such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. As
explained above, the computer program product could also be embodied in a memory of
a device, such as the computer program product 64 of Fig 4. While the computer program
91 is here schematically shown as a track on the depicted optical disk, the computer
program can be stored in any way which is suitable for the computer program product,
such as a removable solid state memory, e.g. a Universal Serial Bus (USB) drive.
[0045] The invention has mainly been described above with reference to a few embodiments.
However, as is readily appreciated by a person skilled in the art, other embodiments
than the ones disclosed above are equally possible within the scope of the invention,
as defined by the appended patent claims.
1. A method for determining whether access is granted for a portable key device (2) for
unlocking a lock (12a-d) controlling access to a restricted physical space (16a-d),
the method being performed in an access control device (13) connected to a plurality
of locks, wherein there is a respective active space associated with each one of the
plurality of locks, the method comprising the steps of:
determining (40) a position of the portable key device (2);
determining (42) that the portable key device (2) is within one of the active spaces
associated with a lock;
determining (44) whether the portable key device (2) is granted access to the lock
associated with the active space encompassing the position of the portable key device
(2); and
transmitting (46) an unlock signal to the lock associated with the active space encompassing
the position of the portable key device (2) when access is granted.
2. The method according to claim 1, wherein the step of determining (40) a position of
the portable key device (2) comprises determining the position of the portable key
device (2) based on angle of arrival measurements.
3. The method according to claim 1 or 2, wherein the step of determining (44) whether
the portable key device (2) is granted access comprises communicating with the portable
key device (2) to authenticate the portable key device (2).
4. The method according to claim 3, wherein the step of determining (44) whether the
portable key device (2) is granted access comprises communicating with the portable
key device (2) over Ultra High Frequency, UHF, Ultra Wide Band, UWB.
5. The method according to claim 3 or 4, wherein the step of transmitting (46) the unlock
signal comprises transmitting the unlock signal using a simpler communication interface
than the communication interface used for communication with the portable key device
(2).
6. The method according to any one of the preceding claims, wherein each one of the active
spaces is defined in three dimensions and wherein the step of determining (40) the
position of the portable key device (2) comprises determining the position in three
dimensions.
7. An access control device (13) arranged to determine whether access is granted for
a portable key device (2) for unlocking a lock (12a-d) controlling access to a restricted
physical space (16a-d), the access control device (13) being connectable to a plurality
of locks, wherein there is a respective active space associated with each one of the
plurality of locks, the access control device comprising:
a processor (60); and
a memory (64) storing instructions (66) that, when executed by the processor, cause
the access control device (3) to:
determine a position of the portable key device (2);
determine that the portable key device (2) is within one of the active spaces associated
with a lock;
determine whether the portable key device (2) is granted access to the lock associated
with the active space encompassing the position of the portable key device (2); and
transmit an unlock signal to the lock associated with the active space encompassing
the position of the portable key device (2) when access is granted.
8. The access control device (13) according to claim 7, wherein the instructions to determine
a position of the portable key device (2) comprise instructions (66) that, when executed
by the processor, cause the access control device (3) to determine the position of
the portable key device (2) based on angle of arrival measurements.
9. The access control device (13) according to claim 7 or 8, wherein the instructions
to determine whether the portable key device (2) is granted access comprise instructions
(66) that, when executed by the processor, cause the access control device (3) to
communicate with the portable key device (2) to authenticate the portable key device
(2).
10. The access control device (13) according to claim 9, wherein the instructions to determine
whether the portable key device (2) is granted access comprise instructions (66) that,
when executed by the processor, cause the access control device (3) to communicate
with the portable key device (2) over Ultra High Frequency, UHF, Ultra Wide Band,
UWB.
11. The access control device (13) according to claim 9 or 10, wherein the instructions
to transmit the unlock signal comprise instructions (66) that, when executed by the
processor, cause the access control device (3) to transmit the unlock signal using
a simpler communication interface than the communication interface used for communication
with the portable key device (2).
12. The access control device (13) according to any one of claims 7 to 11, wherein each
one of the active spaces is defined in three dimensions and wherein the instructions
to determine the position of the portable key device (2) comprise instructions (66)
that, when executed by the processor, cause the access control device (3) to determine
the position in three dimensions.
13. A computer program (91) for determining whether access is granted for a portable key
device (2) for unlocking a lock (12a-d) controlling access to a restricted physical
space (16a-d), the access control device (13) being connectable to a plurality of
locks, wherein there is a respective active space associated with each one of the
plurality of locks, the computer program comprising computer program code which, when
run on an access control device (13), causes the access control device (13) to:
determine a position of the portable key device (2);
determine that the portable key device (2) is within one of the active spaces associated
with a lock; and
determine whether the portable key device (2) is granted access to the lock associated
with the active space encompassing the position of the portable key device (2); and
transmit an unlock signal to the lock associated with the active space encompassing
the position of the portable key device (2) when access is granted.
14. A computer program product (90) comprising a computer program according to claim 13
and a computer readable means on which the computer program is stored.