TECHNICAL FIELD
[0001] The present disclosure relates to the field of systems comprising a plurality of
stand alone electromechanical locks and in particular to a method for configuring
such electromechanical locks. An electromechanical lock system for carrying out the
method is also disclosed.
BACKGROUND
[0002] Systems of stand alone electromechanical locks are used e.g. in lockers at public
swimming pools, sport facilities and schools. In order to open the locker, the user
needs first to provide an authorisation code to the electromechanical lock. Typically
this may be done by presenting an individual RFID card or other sort range wireless
communication means to the lock. The authorisation code is stored on the card and
wirelessly read by the lock. When the lock has determined that a correct authorisation
code for that particular lock has been provided, it unlocks and the user may thereafter
open the locker.
[0003] Systems of electromechanical locks may be divided into private systems and public
systems. At private systems, each lock has initially been configured to be operable
only by user key cards having a specific authorisation code. Private systems are typically
used e.g. in schools where each pupil should have a unique user key card which gives
access only to a specific locker. At public systems each lock may be operable by any
of the user key cards. Public systems may e.g. be used at public swimming pools and
the like where the guest, at entrance, is provided with a user key card by which he
or she may chose any of the unlocked lockers. By presenting the user key card to the
unlocked lock in that locker, the lock is temporarily activated for that specific
user key card. After closing the locker and presenting the user key card, the lock
is locked and may thereafter be unlocked only by presenting the same user key card
again. Once it has been unlocked by the same user key card, the lock is de-activated
such that it again may be activated by the next customer carrying any of the user
key cards comprised in the system.
[0004] When installing such systems comprising a plurality of stand alone electromechanical
locks, the locks are initially in a so called factory mode and each lock needs to
be individually configured. At public systems, such configuration comprises for example:
- To register one or several administrator key cards to each lock. Such administrator
key card(s) should be able to open and to allow the holder to re-configure all locks
in the system.
- To register one or several so called janitor key cards to each lock. Such janitor
key cards should be able to open all locks in the system but not allow re-configuration
of the locks.
- To set sound and light options for each lock.
[0005] At private systems, the configuration steps above may be complemented by registering
at least one user key card for each lock.
[0006] Additionally, after installation and configuration of the locks in the system, it
is sometimes necessary to re-configure all locks. For instance, if an administrator
key card and/or a janitor key card has been lost, these lost key cards should be de-registered
from each lock. Such de-registration prevents unauthorized persons who may have gained
access to the lost cards from unauthorized opening and/or re-configuration of the
locks in the system.
[0007] Traditionally such configuration and re-configuration of all locks in a system has
been carried out individually for each lock. Typically, each lock is configured by
wired or wireless transfer of configuration data from a lap-top computer or the like,
individually to each lock. Alternatively, each lock may be configured by sequentially
presenting a number of short range wireless communication configuration cards to the
lock. Each configuration card holds configuration data related to a specific configuration
setting which data is transferred from the configuration card to each lock as the
cards are presented one by one to the lock. At a further alternative, each lock may
comprise a keypad or a number of push buttons for manually entering configuration
data into each lock.
[0008] Such individual configuration of all locks in the system is often cumbersome and
time consuming, since all configuration steps need to be repeated for all locks in
the system. At a typical example, a system may comprise 100 stand alone locks and
the time needed for configuring one lock may be up to 10 minutes. At such systems,
configuration and re-configuration may thus require up to two full working days. Additionally,
at such individually repeated configuration, there exists a severe risk the some of
the locks are erroneously configured by mistake. This in turn may result in a severely
reduced security of the system.
[0009] EP 2 958 083 A1 discloses method for configuring a plurality of electromechanical locks. According
to this method an administrator first enters configuration data into a first lock
of the plurality of locks. Such configuration may be completed by wired or wireless
transferring of configuration data from e.g. a Notebook to a memory in the lock. Thereafter
the remaining locks are configured with the same configuration data in random order
by the users of the system. A user receives a key card for unlocking a specific lock.
When the user operates or passes in the vicinity of the first lock, the configuration
data is wirelessly transferred from the first lock to the user's key card. Thereafter,
if the user happens to pass any other of the locks, the same configuration data is
transferred from the key card to the other lock. A second user provided with a similar
key card may also, via his or her key card transfer configuration data from any already
configured lock that he or she passes to any non-configured lock that he or she also
happens to pass. In this way, all the locks may eventually be configured in a random
order.
SUMMARY
[0010] On object of the present disclosure is to provide an enhanced method for configuring
a plurality of stand alone off-line electromechanical locks.
[0011] Another object is to provide such a method which greatly reduces the time required
for configuring a large number of locks comprised in a system.
[0012] A further object is to provide such a method which reduces the risk of erroneous
configuration of the locks.
[0013] Yet another object is to provide such a method which enhances the certainty that
all of the plurality of locks are correctly configured within a predetermined time.
[0014] According to one aspect, these and other objects are achieved by a method as described
in claim 1. The method is used for configuring a plurality of stand alone, off-line
electromechanical looks, which locks are arranged to communicate via short range wireless
communication. The method comprises the steps of:
- a) receiving configuration data into a first one of said electromechanical locks lock,
- b) detecting presence of a dedicated non-key, copying card, by said first electromechanical
lock, said copying card being a short range wireless communication card,
- c) copying at least a portion of the configuration data from said first electromechanical
lock to the copying card,
- d) detecting presence of said copying card, by a second one of said plurality of electromechanical
locks,
- e) determining if the second electromechanical lock has been configured or is in factory
mode,
- f) when the second lock is in factory mode, copying the configuration data from the
copying card to the second electromechanical lock,
- g) repeating steps d) to f) for the remaining number of the plurality of electromechanical
locks.
[0015] The method thus allows for that only one of the plurality of locks needs to be configured
in a traditional manner. This could be done in different ways. For example, configuration
data may be transferred from a lap-top computer or the like to the first electromechanical
lock via a wired or a wireless connection. Alternatively configuration data may be
read by the first lock from a number of short range wireless communication cards that
are sequentially presented to the first lock, one for each configuration step. According
to a further alternative, the configuration data is input to the first lock via a
key board or a number of push buttons that are either formed on the first lock or
temporarily connected thereto. The configuration of the first lock is normally carried
out by an administrator having the authority to configure the electromechanical locks.
[0016] The method also allows for that, once the first lock has been configured, the configuration
data is copied to a dedicated, short range wireless communication copying card which
is presented to the fist lock. It thus suffices for the administrator to bring the
copying card to the vicinity of the first lock, whereby the configuration data is
copied from the first lock to the copying card. The administrator thereafter presents
the copying card to a second lock whereby the configuration data is copied from the
copying card to the second lock. Thereafter, the administrator presents the same copying
card sequentially to a third and to all remaining locks that are to be configured
with the same configuration data as the first lock.
[0017] The method thus results in that the administrator needs to carry out the various
steps of the configuration process only for one lock. Thereafter, all the remaining
locks are automatically configured simply by presenting the copying card to the first
lock and thereafter to the remaining locks. By this means the time needed for configuring
all locks is essentially reduced. Additionally, it is also assured that all locks
are correctly configured. A further advantage of the method is that the administrator
is in full control of the configuration process for all locks. The administrator may
thus assure that all locks are correctly configured when he or she has completed the
configuration process. This affords for an important advantage in comparison e.g.
with the method according to
EP 2 958 083 A1, where the administrator or the system owner needs to rely on that the users, when
carrying a key card, passes by the first the lock which initially has been configured
and thereafter all the locks that are to be configured.
[0018] A special advantage results from that a dedicated copying card which is not a key
card is used for copying the configuration data from the first lock to the remaining
locks. For example, at some applications it is essential that the locks are not unlocked
during configuration and re-configuration. This may be the case for instance at public
swimming pools where the guests may have personal belongings stored in the lockers
also during the re-configuration process. At such instances it is important that the
person caring out the re-configuration is not capable of opening such occupied lockers
since this would offence the integrity of the guests.
[0019] The configuration data may be transferred between the electromechanical locks and
the copying card via Radio Frequency Identification (RFID). This allows for a reliable
and comparatively cost efficient transferring of configuration data.
[0020] The first one of the electromechanical locks may be configured by means of sequentially
reading configuration data from a number of different configuration data input cards
to the first electromechanical lock, which input cards are arranged to communicate
via short range wireless communication. This allows for an simple, reliable and cost
efficient means for configuring the first lock, which does not require the use of
any computer or other advanced electronical device.
[0021] Each input card may then comprise data related to a specific configuration setting.
By this means the first lock may be configured in many different ways by utilizing
only a limited number of different configuration data input cards.
[0022] The method may further comprise the step of detecting presence of an administrator
card by the first electromechanical lock, and transferring authorisation data stored
on the administrator card to the second electromechanical lock to enable copying at
least a portion of the configuration data from said first electromechanical lock to
the copying card in step c). By this means it is assured that the method is not illicitly
carried out by persons that have gained access to a copying card.
[0023] The method may further comprise the steps of determining if the first or the second
lock respectively has been configured or if it is in factory mode and, when the lock
has been configured, copying the configuration data from said lock to the copying
card.
[0024] The method may further comprise the step of determining, by the first lock or the
second lock respectively, if the copying card comprises a correct authorisation code
for the lock in question.
[0025] Then the method may further comprise the step of, when the copying card does not
comprise a correct authorisation code for the lock in question, copying the configuration
data from the lock in question to the copying card.
[0026] The method may further comprise the step of, when the copying card does comprise
a correct authorisation code for the lock in question, copying the configuration data
from the copying card to the lock in question.
[0027] By the steps specified in paras. [0022 - 0024] the plurality of locks may efficiently
be re-configured also when at least some of the locks have already been configured
and thus contain configuration data. By requiring that the copying card in such case
comprises a correct authorisation code for the locks which are to be re-configured
it is avoided that these locks are not erroneously re-configured with configuration
data not intended for these locks to be re-configured.
[0028] According to a second aspect an electromechanical lock system for carrying out the
method is disclosed. The electromechanical lock system comprisies; a plurality of
stand alone, off-line electromechanical locks, which are arranged to communicate via
short range wireless communication, each electromechanical lock comprising means for
receiving configuration data and means for detecting the presence of a copying card.
The system further comprises at least one dedicated non-key, copying card which is
provided with means for detecting if each of the electromechanical locks have been
configured or are in factory mode and means for storing and copying configuration
data to and from the electromechanical locks via short range wireless communication.
[0029] The electromechanical locks and the copying card may be arranged to communicate via
Radio Frequency Communication (RFID).
[0030] The electromechanical lock system may further comprise a plurality of different configuration
data input cards and at least the first lock may comprise means for sequentially reading
configuration data stored on the configuration data input cards, for configuring at
least the first lock and wherein the configuration data is read via short range wireless
communication.
[0031] The copying card may comprise means for storing an authorisation code which is detectable
by the electromechanical locks.
[0032] The electromechanical locks may comprise means for detecting a correct authorisation
code stored on the copying card and/or on an administrator card.
[0033] The electromechanical lock system exhibits the same objects and advantages as the
method disclosed above.
[0034] Generally, all terms used in the claims are to be interpreted according to their
ordinary meaning in the technical field, unless explicitly defined otherwise herein.
All references to "a/an/the element, apparatus, component, means, step, etc." are
to be interpreted openly as referring to at least one instance of the element, apparatus,
component, means, step, etc., unless explicitly stated otherwise. The steps of any
method disclosed herein do not have to be performed in the exact order disclosed,
unless explicitly stated.
[0035] The term "a plurality of stand alone electromechanical locks" refers to a number
of electromechanical locks which, in normal use, are not in communicating contact
with each other.
[0036] The term "a plurality of off-line electromechanical locks" refers to a number of
electromechanical locks which, in normal use, are not in communicating contact with
a central computer, control centre or other central communication device.
[0037] By the term "presenting a card to a lock" is meant that a short range wireless communication
card is brought sufficiently close to the lock such that configuration data may be
transferred wirelessly between the card and the lock.
BRIEF DESCRIPTION OF THE DRAWINGS
[0038] Aspects and embodiments are now described, by way of example, with reference to the
accompanying drawings, in which:
Fig 1a-c illustrate schematically an electromechanical lock system comprising a number
of electromechanical locks and a number of short range wireless communication cards.
The figures 1a, 1b and 1c illustrate schematically respective steps of a method for
configuring the electromechanical locks.
Fig. 2 is a schematic representation of certain steps in the method illustrated in
figs 1a-c.
DETAILED DESCRIPTION
[0039] The aspects of the present disclosure will now be described more fully hereinafter
with reference to the accompanying drawings, in which certain embodiments of the invention
are shown.
[0040] These aspects may, however, be embodied in many different forms and should not be
construed as limiting; rather, these embodiments are provided by way of example so
that this disclosure will be thorough and complete, and to fully convey the scope
of all aspects of invention to those skilled in the art. Like numbers refer to like
elements throughout the description.
[0041] The electromechanical lock system illustrated in figs 1a-c comprises a plurality
of stand alone, off-line electromechanical locks 1, 2, 3, 4. As readily understood,
the locks are only schematically represented and a keyhole symbol is used for illustrating
the locks. Normally however, the locks are not operated by a mechanical key and do
not comprise any key hole. Each lock comprises a housing 1a, 2a, 3a, 4a and mechanical
locking means 1b, 2b, 3b, 4b for keeping a door, a window, a lid, a hatch or any other
openable and closable arrangement (not shown) closed and locked. In the shown example
the mechanical locking means 1b, 2b, 3b, 4b comprises a lock bolt. However, the mechanical
locking means may also be formed of or comprise many other mechanical arrangements
well known in the art. A lock mechanism (not shown) for manoeuvring the mechanical
locking means 1b, 2b, 3b, 4b is arranged in each housing 11, 2a, 3a, 4a. Each housing
also holds a control unit (not shown) for controlling the lock mechanism and the mechanical
locking means. The control unit comprises or is connected to a memory (not shown)
in which configuration data may be stored. The control unit also comprises or is connected
to a short range wireless communication unit (not shown). In the shown example the
short range wireless communication unit is a Radio Frequency Communication (RFID)
unit. The communication unit may however be arranged to communicate by many other
communication standards such as by NFC, Bluetooth and the like. It is also possible
to use communication means involving physical contact such as so called iButtons and
Dallas tags or chips.
[0042] The system also comprises a number of different key cards (not shown) for operating
the locks. i.e. for unlocking the locks 1, 2, 3, 4. At some applications, such as
at public systems as described above, the key cards may also be used for locking the
locks. At other applications, such as at private systems the locks may be arranged
to be locked manually or electrically without the use of any key card. In the shown
example the key cards are arranged to communicate with the control unit via RFID,
but just as for the control unit other short range wireless communication standards
may also be used. The communication standard used by the control unit should be able
to communicate with the communication standard used by the key cards.
[0043] The key cards may be divided into several groups depending on the authorisation level
of the card. Typically, the system may comprise the following key card authorisation
levels:
- Normal user key cards, which allow the holder of the card to unlock and possibly lock
at least one of the electromechanical locks in the system.
- Janitor key cards, which allow the holder to unlock and possibly lock all locks in
the system.
- Administrator cards, which allow the holder both to unlock and possibly lock as well
as to configure all locks in the system.
[0044] The system further comprises a set of configuration data input cards A1 - An and
at least one copying card B. In the shown example the configuration data input cards
A1 - An and the copying card B are also arranged to communicate via RFID. However,
any short range wireless communication standard may be used as long as these cards
are able to communicate with the control unit of the locks 1, 2, 3, 4.
[0045] The configuration data input cards A1 - An and the copying card B are used for configuring
and re-configuring the electromechanical locks comprised in the system. In the following
some different exemplifying embodiments of the method for configuring the electromechanical
locks will be explained.
[0046] When the electromechanical locks have been installed, they are all normally in so
called factory mode, in which mode they do not contain any configuration data. For
this reason, all locks need to be configured in accordance with the application at
which they should operate. Such initial configuration of the system will now be explained.
[0047] Initially a first lock 1 is configured by sequentially presenting a number of configuration
data input cards A1 - An to the first lock 1. This is done by first powering up the
first lock and thereafter presenting an administrator card to the first lock. The
first lock then reads an authorisation code stored on the administrator card, stores
this code in the memory thereby registering this administrator card to be a correct
administrator card for the first lock. If additional administrator cards are to be
registered, an administrator registration card is the presented to the lock followed
by presenting the already registered administrator card and thereafter a second and
sequentially any further administrator cards that should be registered. This or these
administrator cards are thereby registered as correct administrator cards for the
first lock 1.
[0048] If at least one janitor card is to be registered, a janitor registration card is
presented to the first lock followed by presenting an already registered administrator
card and thereafter sequentially presenting the janitor card or cards that are to
be registered.
[0049] If it is desired to activate a sound confirmation feature of the first lock, a administrator
registration card is presented followed by presenting a janitor registration card.
[0050] At some applications, it may also be desirable to register one or a number of user
key cards to the first lock. This may be the case e.g. when one or a number of user
key cards should be able to operate a large proportion of the total numbers of locks
comprised in the system. At such cases a user key registration card is first presented
to the first lock followed by presenting a registered administrator card and thereafter
sequentially presenting the user key cards that are to be registered.
[0051] Once the first lock has been given the configuration that should apply to all or
at least a large proportion of the locks comprised in the system, the configuration
data stored in the first lock is copied onto the copying card B. As illustrated in
fig 1b, this may readily be done by presenting the key copying card B to the first
lock 1. The first lock 1 then detects the presence of the copying card B and the configuration
data stored in the memory of the first lock 1 is copied onto the copying card B. In
case where a higher degree of security is desired the system may be set up to require
the presentation of a registered administrator card before the configuration data
is copied onto the copying card.
[0052] Once the configuration data has been stored on the copying card B, the same configuration
data may readily be copied from the copying card B to all or any desired portion of
the further locks 2, 3, 4 comprised in the system. This is done simply by first powering
up a second lock 2, which is in factory mode, and thereafter presenting the copying
card B to the second lock. By this means the configuration data is copied from the
copying card B to the second lock 2, such that the second lock 2 is configured with
the same configuration data as the first lock 1. Thereafter, the further locks 3,
4 that are to be configured with the same configuration data are sequentially powered
up and the copying card is presented to the respective further locks 3, 4.
[0053] By this means, once the first lock has been properly configured, all remaining locks
may readily be configured in a very short time and with very little effort. The method
also assures that, as long as the first lock is correctly configured, all further
locks will also be correctly configured.
[0054] Now, re-configuration of locks, which have already been initially configured, will
be described. Such re-configuration is useful e.g. when an administrator card or a
janitor card has been lost. At such occasions the lost card or cards should be de-registered
from the locks such that a person gaining access to the lost cards may not illicitly
open or re-configure the locks.
[0055] Initially, a first lock 1 is first re-configured such that the lost master card and
janitor card are de-registered from the first locks memory. This is done by first
presenting the administrator registration card to the first lock 1 followed by presenting
a registered administrator card and thereafter again the administrator register card.
By this means, all registered administrator cards except the one used for this re-configuration
are de-registered from the lock. Thereafter any additional administrator cards except
the lost administrator card is re-registered as described above.
[0056] For de-registering a lost janitor card from the first lock 1, the janitor registration
card is presented to the first lock followed by presenting a registered administrator
card and thereafter again the janitor registration card. Thereby all janitor cards
registered in the first locks memory will be de-registered. Any further janitor card
except the lost janitor that should be registered may then be re-registered as described
above.
[0057] In case where an administrator card which has not been lost is to be de-registered,
de-registration is carried out as follows. The administrator registration card is
first presented to the first lock, followed by the unwanted administrator card and
thereafter again the administrator registration card. De-registration of a not lost
janitor card is accomplished in a fully corresponding manner by using the janitor
registration card and the unwanted janitor card.
[0058] Once the unwanted administrator and/or janitor cards have been de-registered from
the first lock, the copying card is presented to the first lock 1, whereby the corrected
configuration data is copied onto the copying card. Thereafter the copying card is
presented to a second lock 2 and subsequently to the remaining locks 3, 4, whereby
the corrected configuration data is sequentially copied from the copying card to the
second 2 and the remaining 3, 4 locks.
[0059] For increasing the security of the system it may be desired to require that an correct
authorisation code is first presented to the second and the remaining locks before
the configuration data is copied from the copying card to the second and the remaining
locks. In such case the system may be arranged such that copying of configuration
data from the copying card to the second and the remaining locks requires that a registered
administrator card is first presented to the second and the further locks. In practice
re-configuration of each of the second and the remaining locks may the be accomplished
in the following manner: First the copying card is presented to the lock in question,
thereafter a registered administrator card is presented followed by again presenting
the copying card. During such procedure the configuration data is copied to from the
copying card to the lock at the second presentation of the copying card and thus first
after the administrator card has been presented.
[0060] Alternatively the copying card itself may comprise an authorisation code, which,
during the initial configuration of the locks in factory mode has been registered
as a correct authorisation code for the locks in question. In such cases, when re-configuring
the second and the remaining locks, it will suffice to present the copying card only
one time to each of the second and the remaining locks for re-configuring these locks.
[0061] The re-configuration process just described results in the same advantages and benefits
as the initial configuration process described earlier.
[0062] Figure 2 illustrates schematically the logical steps preformed when a copying card
is presented to a lock of the system. As seen in fig 2, the copying card first determines
if the lock is in factory mode or not. If so, the lock determines if the copying card
carries configuration data and, if it does, the configuration data is copied from
the copying card to the lock. If the copying card does not carry configuration data
the lock generates an audible and/or visual error signal. This sequence thus represents
initial configuration of the lock from factory mode.
[0063] If it is determined that the lock, when presenting the copying card, is not in factory
mode, i.e. that the lock has already been configured, then the lock determines if
the copying card is provided with a correct authorisation code for the lock. If so,
the configuration data is copied from the copying card to the lock. This sequence
thus represents re-configuration of an already configured lock.
[0064] If the lock determines that the copying card is not provided with a correct authorisation
code, then the lock detects the presence of any administrator card presented to the
lock. When the lock has detected such an administrator card it determines if the administrator
card is provided with a correct authorisation code. When this is the case the configuration
data is copied from the lock to the copying card. This sequence thus represents copying
configuration data from an initially configured or re-configured first lock of the
system. In cases when the lock determines that the administrator card does not contain
a valid authorisation code, the lock generates an error signal.
[0065] An important advantage of the methods for configuring and re-configuring the electromechanical
locks of the system described above is that the entire methods may quickly be carried
out by one and the same administrator. The administrator will thus be in control of
the entire process and it is assured that the configuration and re-configuration is
actually correctly carried out for all intended locks of the system.
[0066] The aspects of the present disclosure have mainly been described above with reference
to a few embodiments and examples thereof. However, as is readily appreciated by a
person skilled in the art, other embodiments than the ones disclosed above are equally
possible within the scope of the invention, as defined by the appended patent claims.
1. Method for configuring a plurality of stand alone, off-line electromechanical looks
(1, 2, 3, 4), which locks are arranged to communicate via short range wireless communication,
the method comprising the steps of:
a) receiving configuration data into a first one (1) of said electromechanical locks,
b) detecting presence of a dedicated non-key, copying card (B), by said first electromechanical
lock (1), said copying card (B) being a short range wireless communication card,
c) copying at least a portion of the configuration data from said first electromechanical
lock (1) to the copying card (B),
d) detecting presence of said copying card (B), by a second one (2) of said plurality
of electromechanical locks,
e) determining if the second electromechanical lock (2) has been configured or is
in factory mode,
f) when the second electromechanical lock (2) is in factory mode, copying the configuration
data from the copying card (B) to the second electromechanical lock (2),
g) repeating steps d) to f) for the remaining number of the plurality of electromechanical
locks (3, 4).
2. Method according to claim 1, wherein the configuration data is transferred between
the electromechanical locks (1, 2, 3, 4) and the copying card (B) via Radio Frequency
Identification (RFID).
3. Method according to claim 1 or 2, wherein said first one (1) of the electromechanical
locks is configured by means of sequentially reading configuration data from a number
of different configuration data input cards (Ai-An) to the first electromechanical
lock (1), which input cards (Ai-An)are arranged to communicate via short range wireless
communication.
4. Method according to claim 3, wherein each configuration data input card (Ai-An) comprises
data related to a specific configuration setting.
5. Method according to any of claim 1 - 4, further comprising the step of detecting presence
of an administrator card by the first electromechanical lock (1), and transferring
authorisation data stored on the administrator card to the first electromechanical
lock (1) to enable copying at least a portion of the configuration data from said
first electromechanical lock (1) to the copying card (B) in step c).
6. Method according to any of claim 1 - 5, further comprising the steps of determining
if the first (1) or the second (2) lock respectively has been configured or if it
is in factory mode and, when the lock has been configured, copying the configuration
data from said lock (1, 2) to the copying card (B).
7. Method according to any of claim 1 - 6, further comprising the step of determining,
by the first (1) lock or the second (2) lock respectively, if the copying card (B)
comprises a correct authorisation code for the lock (1, 2) in question.
8. Method according to claim 7, further comprising the step of, when the copying card
(B) does not comprise a correct authorisation code for the lock in question, copying
the configuration data from the lock (1, 2) in question to the copying card (B).
9. Method according to claim 7 or 8, further comprising the step of, when the copying
card (B) does comprise a correct authorisation code for the lock in question, copying
the configuration data from the copying card (B) to the lock (1, 2) in question.
10. Method according to any of claims 1 - 9, wherein an administrator of the system first
presents the copying card (B) to the first lock (1) for carrying out steps b) and
c) and thereafter sequentially presents the copying card (B) to the second lock (2)
and the remaining locks (3, 4) for carrying out steps d) to f) for each of the second
(2) and the remaining (3, 4) locks.
11. An electromechanical lock system comprising;
- a plurality of stand alone, off-line electromechanical locks (1, 2, 3, 4), which
are arranged to communicate via short range wireless communication, each electromechanical
lock comprising means for receiving configuration data and means for detecting the
presence of a copying card (B), and
- at least one dedicated non-key, copying card (B) which is provided with means for
detecting if each of the electromechanical locks (1, 2, 3, 4) have been configured
or are in factory mode and means for storing and copying configuration data to and
from the electromechanical locks (1, 2, 3, 4) via short range wireless communication.
12. An electromechanical lock system according to claim 10, wherein the electromechanical
locks (1, 2, 3, 4) and the copying card (B) are arranged to communicate via Radio
Frequency Communication (RFID).
13. An electromechanical lock system according to claim 10 or 11, further comprising a
plurality of different configuration data input cards (Ai - An) and wherein at least
the first lock (1) comprises means for sequentially reading configuration data stored
on the configuration data input cards (Ai-An), for configuring at least the first
lock (1) and wherein the configuration data is read via short range wireless communication.
14. An electromechanical locks system according to any of claims 10-12, wherein the copying
card (B) comprises means for storing an authorisation code which is detectable by
the electromechanical locks (1, 2, 3, 4).
15. An electromechanical lock system according to any of claims 10 - 12, wherein the electromechanical
locks (1, 2, 3, 4) comprises means for detecting a correct authorisation code stored
on the copying card (B) and/or on an administrator card.