(19)
(11) EP 3 683 776 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
22.07.2020 Bulletin 2020/30

(21) Application number: 19152514.6

(22) Date of filing: 18.01.2019
(51) International Patent Classification (IPC): 
G07C 9/00(2020.01)
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(71) Applicant: Assa Abloy Opening Solutions Sweden AB
631 05 Eskilstuna (SE)

(72) Inventor:
  • HERRMANN, Jonas
    632 20 Eskilstuna (SE)

(74) Representative: Kransell & Wennborg KB 
P.O. Box 27834
115 93 Stockholm
115 93 Stockholm (SE)

   


(54) METHOD FOR CONFIGURING A PLURALITY OF ELECTROMECHANICAL LOCKS AND AN ELECTROMECHANICAL LOCK SYSTEM


(57) A method for configuring a plurality of stand alone, off-line electromechanical looks (1, 2, 3, 4), which locks are arranged to communicate via short range wireless communication is disclosed. The method comprising the steps of:
a) receiving configuration data into a first one (1) of said electromechanical locks,
b) detecting presence of a dedicated non-key, copying card (B), by said first electromechanical lock (1), said copying card (B) being a short range wireless communication card,
c) copying at least a portion of the configuration data from said first electromechanical lock (1) to the copying card (B),
d) detecting presence of said copying card (B), by a second one (2) of said plurality of electromechanical locks,
e) determining if the second electromechanical lock (2) has been configured or is in factory mode,
f) when the second electromechanical lock (2) is in factory mode, copying the configuration data from the copying card (B) to the second electromechanical lock (2),
g) repeating steps d) to f) for the remaining number of the plurality of electromechanical locks (3, 4). An electromechanical lock system for carrying out the method is also disclosed




Description

TECHNICAL FIELD



[0001] The present disclosure relates to the field of systems comprising a plurality of stand alone electromechanical locks and in particular to a method for configuring such electromechanical locks. An electromechanical lock system for carrying out the method is also disclosed.

BACKGROUND



[0002] Systems of stand alone electromechanical locks are used e.g. in lockers at public swimming pools, sport facilities and schools. In order to open the locker, the user needs first to provide an authorisation code to the electromechanical lock. Typically this may be done by presenting an individual RFID card or other sort range wireless communication means to the lock. The authorisation code is stored on the card and wirelessly read by the lock. When the lock has determined that a correct authorisation code for that particular lock has been provided, it unlocks and the user may thereafter open the locker.

[0003] Systems of electromechanical locks may be divided into private systems and public systems. At private systems, each lock has initially been configured to be operable only by user key cards having a specific authorisation code. Private systems are typically used e.g. in schools where each pupil should have a unique user key card which gives access only to a specific locker. At public systems each lock may be operable by any of the user key cards. Public systems may e.g. be used at public swimming pools and the like where the guest, at entrance, is provided with a user key card by which he or she may chose any of the unlocked lockers. By presenting the user key card to the unlocked lock in that locker, the lock is temporarily activated for that specific user key card. After closing the locker and presenting the user key card, the lock is locked and may thereafter be unlocked only by presenting the same user key card again. Once it has been unlocked by the same user key card, the lock is de-activated such that it again may be activated by the next customer carrying any of the user key cards comprised in the system.

[0004] When installing such systems comprising a plurality of stand alone electromechanical locks, the locks are initially in a so called factory mode and each lock needs to be individually configured. At public systems, such configuration comprises for example:
  • To register one or several administrator key cards to each lock. Such administrator key card(s) should be able to open and to allow the holder to re-configure all locks in the system.
  • To register one or several so called janitor key cards to each lock. Such janitor key cards should be able to open all locks in the system but not allow re-configuration of the locks.
  • To set sound and light options for each lock.


[0005] At private systems, the configuration steps above may be complemented by registering at least one user key card for each lock.

[0006] Additionally, after installation and configuration of the locks in the system, it is sometimes necessary to re-configure all locks. For instance, if an administrator key card and/or a janitor key card has been lost, these lost key cards should be de-registered from each lock. Such de-registration prevents unauthorized persons who may have gained access to the lost cards from unauthorized opening and/or re-configuration of the locks in the system.

[0007] Traditionally such configuration and re-configuration of all locks in a system has been carried out individually for each lock. Typically, each lock is configured by wired or wireless transfer of configuration data from a lap-top computer or the like, individually to each lock. Alternatively, each lock may be configured by sequentially presenting a number of short range wireless communication configuration cards to the lock. Each configuration card holds configuration data related to a specific configuration setting which data is transferred from the configuration card to each lock as the cards are presented one by one to the lock. At a further alternative, each lock may comprise a keypad or a number of push buttons for manually entering configuration data into each lock.

[0008] Such individual configuration of all locks in the system is often cumbersome and time consuming, since all configuration steps need to be repeated for all locks in the system. At a typical example, a system may comprise 100 stand alone locks and the time needed for configuring one lock may be up to 10 minutes. At such systems, configuration and re-configuration may thus require up to two full working days. Additionally, at such individually repeated configuration, there exists a severe risk the some of the locks are erroneously configured by mistake. This in turn may result in a severely reduced security of the system.

[0009] EP 2 958 083 A1 discloses method for configuring a plurality of electromechanical locks. According to this method an administrator first enters configuration data into a first lock of the plurality of locks. Such configuration may be completed by wired or wireless transferring of configuration data from e.g. a Notebook to a memory in the lock. Thereafter the remaining locks are configured with the same configuration data in random order by the users of the system. A user receives a key card for unlocking a specific lock. When the user operates or passes in the vicinity of the first lock, the configuration data is wirelessly transferred from the first lock to the user's key card. Thereafter, if the user happens to pass any other of the locks, the same configuration data is transferred from the key card to the other lock. A second user provided with a similar key card may also, via his or her key card transfer configuration data from any already configured lock that he or she passes to any non-configured lock that he or she also happens to pass. In this way, all the locks may eventually be configured in a random order.

SUMMARY



[0010] On object of the present disclosure is to provide an enhanced method for configuring a plurality of stand alone off-line electromechanical locks.

[0011] Another object is to provide such a method which greatly reduces the time required for configuring a large number of locks comprised in a system.

[0012] A further object is to provide such a method which reduces the risk of erroneous configuration of the locks.

[0013] Yet another object is to provide such a method which enhances the certainty that all of the plurality of locks are correctly configured within a predetermined time.

[0014] According to one aspect, these and other objects are achieved by a method as described in claim 1. The method is used for configuring a plurality of stand alone, off-line electromechanical looks, which locks are arranged to communicate via short range wireless communication. The method comprises the steps of:
  1. a) receiving configuration data into a first one of said electromechanical locks lock,
  2. b) detecting presence of a dedicated non-key, copying card, by said first electromechanical lock, said copying card being a short range wireless communication card,
  3. c) copying at least a portion of the configuration data from said first electromechanical lock to the copying card,
  4. d) detecting presence of said copying card, by a second one of said plurality of electromechanical locks,
  5. e) determining if the second electromechanical lock has been configured or is in factory mode,
  6. f) when the second lock is in factory mode, copying the configuration data from the copying card to the second electromechanical lock,
  7. g) repeating steps d) to f) for the remaining number of the plurality of electromechanical locks.


[0015] The method thus allows for that only one of the plurality of locks needs to be configured in a traditional manner. This could be done in different ways. For example, configuration data may be transferred from a lap-top computer or the like to the first electromechanical lock via a wired or a wireless connection. Alternatively configuration data may be read by the first lock from a number of short range wireless communication cards that are sequentially presented to the first lock, one for each configuration step. According to a further alternative, the configuration data is input to the first lock via a key board or a number of push buttons that are either formed on the first lock or temporarily connected thereto. The configuration of the first lock is normally carried out by an administrator having the authority to configure the electromechanical locks.

[0016] The method also allows for that, once the first lock has been configured, the configuration data is copied to a dedicated, short range wireless communication copying card which is presented to the fist lock. It thus suffices for the administrator to bring the copying card to the vicinity of the first lock, whereby the configuration data is copied from the first lock to the copying card. The administrator thereafter presents the copying card to a second lock whereby the configuration data is copied from the copying card to the second lock. Thereafter, the administrator presents the same copying card sequentially to a third and to all remaining locks that are to be configured with the same configuration data as the first lock.

[0017] The method thus results in that the administrator needs to carry out the various steps of the configuration process only for one lock. Thereafter, all the remaining locks are automatically configured simply by presenting the copying card to the first lock and thereafter to the remaining locks. By this means the time needed for configuring all locks is essentially reduced. Additionally, it is also assured that all locks are correctly configured. A further advantage of the method is that the administrator is in full control of the configuration process for all locks. The administrator may thus assure that all locks are correctly configured when he or she has completed the configuration process. This affords for an important advantage in comparison e.g. with the method according to EP 2 958 083 A1, where the administrator or the system owner needs to rely on that the users, when carrying a key card, passes by the first the lock which initially has been configured and thereafter all the locks that are to be configured.

[0018] A special advantage results from that a dedicated copying card which is not a key card is used for copying the configuration data from the first lock to the remaining locks. For example, at some applications it is essential that the locks are not unlocked during configuration and re-configuration. This may be the case for instance at public swimming pools where the guests may have personal belongings stored in the lockers also during the re-configuration process. At such instances it is important that the person caring out the re-configuration is not capable of opening such occupied lockers since this would offence the integrity of the guests.

[0019] The configuration data may be transferred between the electromechanical locks and the copying card via Radio Frequency Identification (RFID). This allows for a reliable and comparatively cost efficient transferring of configuration data.

[0020] The first one of the electromechanical locks may be configured by means of sequentially reading configuration data from a number of different configuration data input cards to the first electromechanical lock, which input cards are arranged to communicate via short range wireless communication. This allows for an simple, reliable and cost efficient means for configuring the first lock, which does not require the use of any computer or other advanced electronical device.

[0021] Each input card may then comprise data related to a specific configuration setting. By this means the first lock may be configured in many different ways by utilizing only a limited number of different configuration data input cards.

[0022] The method may further comprise the step of detecting presence of an administrator card by the first electromechanical lock, and transferring authorisation data stored on the administrator card to the second electromechanical lock to enable copying at least a portion of the configuration data from said first electromechanical lock to the copying card in step c). By this means it is assured that the method is not illicitly carried out by persons that have gained access to a copying card.

[0023] The method may further comprise the steps of determining if the first or the second lock respectively has been configured or if it is in factory mode and, when the lock has been configured, copying the configuration data from said lock to the copying card.

[0024] The method may further comprise the step of determining, by the first lock or the second lock respectively, if the copying card comprises a correct authorisation code for the lock in question.

[0025] Then the method may further comprise the step of, when the copying card does not comprise a correct authorisation code for the lock in question, copying the configuration data from the lock in question to the copying card.

[0026] The method may further comprise the step of, when the copying card does comprise a correct authorisation code for the lock in question, copying the configuration data from the copying card to the lock in question.

[0027] By the steps specified in paras. [0022 - 0024] the plurality of locks may efficiently be re-configured also when at least some of the locks have already been configured and thus contain configuration data. By requiring that the copying card in such case comprises a correct authorisation code for the locks which are to be re-configured it is avoided that these locks are not erroneously re-configured with configuration data not intended for these locks to be re-configured.

[0028] According to a second aspect an electromechanical lock system for carrying out the method is disclosed. The electromechanical lock system comprisies; a plurality of stand alone, off-line electromechanical locks, which are arranged to communicate via short range wireless communication, each electromechanical lock comprising means for receiving configuration data and means for detecting the presence of a copying card. The system further comprises at least one dedicated non-key, copying card which is provided with means for detecting if each of the electromechanical locks have been configured or are in factory mode and means for storing and copying configuration data to and from the electromechanical locks via short range wireless communication.

[0029] The electromechanical locks and the copying card may be arranged to communicate via Radio Frequency Communication (RFID).

[0030] The electromechanical lock system may further comprise a plurality of different configuration data input cards and at least the first lock may comprise means for sequentially reading configuration data stored on the configuration data input cards, for configuring at least the first lock and wherein the configuration data is read via short range wireless communication.

[0031] The copying card may comprise means for storing an authorisation code which is detectable by the electromechanical locks.

[0032] The electromechanical locks may comprise means for detecting a correct authorisation code stored on the copying card and/or on an administrator card.

[0033] The electromechanical lock system exhibits the same objects and advantages as the method disclosed above.

[0034] Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.

[0035] The term "a plurality of stand alone electromechanical locks" refers to a number of electromechanical locks which, in normal use, are not in communicating contact with each other.

[0036] The term "a plurality of off-line electromechanical locks" refers to a number of electromechanical locks which, in normal use, are not in communicating contact with a central computer, control centre or other central communication device.

[0037] By the term "presenting a card to a lock" is meant that a short range wireless communication card is brought sufficiently close to the lock such that configuration data may be transferred wirelessly between the card and the lock.

BRIEF DESCRIPTION OF THE DRAWINGS



[0038] Aspects and embodiments are now described, by way of example, with reference to the accompanying drawings, in which:

Fig 1a-c illustrate schematically an electromechanical lock system comprising a number of electromechanical locks and a number of short range wireless communication cards. The figures 1a, 1b and 1c illustrate schematically respective steps of a method for configuring the electromechanical locks.

Fig. 2 is a schematic representation of certain steps in the method illustrated in figs 1a-c.


DETAILED DESCRIPTION



[0039] The aspects of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown.

[0040] These aspects may, however, be embodied in many different forms and should not be construed as limiting; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and to fully convey the scope of all aspects of invention to those skilled in the art. Like numbers refer to like elements throughout the description.

[0041] The electromechanical lock system illustrated in figs 1a-c comprises a plurality of stand alone, off-line electromechanical locks 1, 2, 3, 4. As readily understood, the locks are only schematically represented and a keyhole symbol is used for illustrating the locks. Normally however, the locks are not operated by a mechanical key and do not comprise any key hole. Each lock comprises a housing 1a, 2a, 3a, 4a and mechanical locking means 1b, 2b, 3b, 4b for keeping a door, a window, a lid, a hatch or any other openable and closable arrangement (not shown) closed and locked. In the shown example the mechanical locking means 1b, 2b, 3b, 4b comprises a lock bolt. However, the mechanical locking means may also be formed of or comprise many other mechanical arrangements well known in the art. A lock mechanism (not shown) for manoeuvring the mechanical locking means 1b, 2b, 3b, 4b is arranged in each housing 11, 2a, 3a, 4a. Each housing also holds a control unit (not shown) for controlling the lock mechanism and the mechanical locking means. The control unit comprises or is connected to a memory (not shown) in which configuration data may be stored. The control unit also comprises or is connected to a short range wireless communication unit (not shown). In the shown example the short range wireless communication unit is a Radio Frequency Communication (RFID) unit. The communication unit may however be arranged to communicate by many other communication standards such as by NFC, Bluetooth and the like. It is also possible to use communication means involving physical contact such as so called iButtons and Dallas tags or chips.

[0042] The system also comprises a number of different key cards (not shown) for operating the locks. i.e. for unlocking the locks 1, 2, 3, 4. At some applications, such as at public systems as described above, the key cards may also be used for locking the locks. At other applications, such as at private systems the locks may be arranged to be locked manually or electrically without the use of any key card. In the shown example the key cards are arranged to communicate with the control unit via RFID, but just as for the control unit other short range wireless communication standards may also be used. The communication standard used by the control unit should be able to communicate with the communication standard used by the key cards.

[0043] The key cards may be divided into several groups depending on the authorisation level of the card. Typically, the system may comprise the following key card authorisation levels:
  • Normal user key cards, which allow the holder of the card to unlock and possibly lock at least one of the electromechanical locks in the system.
  • Janitor key cards, which allow the holder to unlock and possibly lock all locks in the system.
  • Administrator cards, which allow the holder both to unlock and possibly lock as well as to configure all locks in the system.


[0044] The system further comprises a set of configuration data input cards A1 - An and at least one copying card B. In the shown example the configuration data input cards A1 - An and the copying card B are also arranged to communicate via RFID. However, any short range wireless communication standard may be used as long as these cards are able to communicate with the control unit of the locks 1, 2, 3, 4.

[0045] The configuration data input cards A1 - An and the copying card B are used for configuring and re-configuring the electromechanical locks comprised in the system. In the following some different exemplifying embodiments of the method for configuring the electromechanical locks will be explained.

[0046] When the electromechanical locks have been installed, they are all normally in so called factory mode, in which mode they do not contain any configuration data. For this reason, all locks need to be configured in accordance with the application at which they should operate. Such initial configuration of the system will now be explained.

[0047] Initially a first lock 1 is configured by sequentially presenting a number of configuration data input cards A1 - An to the first lock 1. This is done by first powering up the first lock and thereafter presenting an administrator card to the first lock. The first lock then reads an authorisation code stored on the administrator card, stores this code in the memory thereby registering this administrator card to be a correct administrator card for the first lock. If additional administrator cards are to be registered, an administrator registration card is the presented to the lock followed by presenting the already registered administrator card and thereafter a second and sequentially any further administrator cards that should be registered. This or these administrator cards are thereby registered as correct administrator cards for the first lock 1.

[0048] If at least one janitor card is to be registered, a janitor registration card is presented to the first lock followed by presenting an already registered administrator card and thereafter sequentially presenting the janitor card or cards that are to be registered.

[0049] If it is desired to activate a sound confirmation feature of the first lock, a administrator registration card is presented followed by presenting a janitor registration card.

[0050] At some applications, it may also be desirable to register one or a number of user key cards to the first lock. This may be the case e.g. when one or a number of user key cards should be able to operate a large proportion of the total numbers of locks comprised in the system. At such cases a user key registration card is first presented to the first lock followed by presenting a registered administrator card and thereafter sequentially presenting the user key cards that are to be registered.

[0051] Once the first lock has been given the configuration that should apply to all or at least a large proportion of the locks comprised in the system, the configuration data stored in the first lock is copied onto the copying card B. As illustrated in fig 1b, this may readily be done by presenting the key copying card B to the first lock 1. The first lock 1 then detects the presence of the copying card B and the configuration data stored in the memory of the first lock 1 is copied onto the copying card B. In case where a higher degree of security is desired the system may be set up to require the presentation of a registered administrator card before the configuration data is copied onto the copying card.

[0052] Once the configuration data has been stored on the copying card B, the same configuration data may readily be copied from the copying card B to all or any desired portion of the further locks 2, 3, 4 comprised in the system. This is done simply by first powering up a second lock 2, which is in factory mode, and thereafter presenting the copying card B to the second lock. By this means the configuration data is copied from the copying card B to the second lock 2, such that the second lock 2 is configured with the same configuration data as the first lock 1. Thereafter, the further locks 3, 4 that are to be configured with the same configuration data are sequentially powered up and the copying card is presented to the respective further locks 3, 4.

[0053] By this means, once the first lock has been properly configured, all remaining locks may readily be configured in a very short time and with very little effort. The method also assures that, as long as the first lock is correctly configured, all further locks will also be correctly configured.

[0054] Now, re-configuration of locks, which have already been initially configured, will be described. Such re-configuration is useful e.g. when an administrator card or a janitor card has been lost. At such occasions the lost card or cards should be de-registered from the locks such that a person gaining access to the lost cards may not illicitly open or re-configure the locks.

[0055] Initially, a first lock 1 is first re-configured such that the lost master card and janitor card are de-registered from the first locks memory. This is done by first presenting the administrator registration card to the first lock 1 followed by presenting a registered administrator card and thereafter again the administrator register card. By this means, all registered administrator cards except the one used for this re-configuration are de-registered from the lock. Thereafter any additional administrator cards except the lost administrator card is re-registered as described above.

[0056] For de-registering a lost janitor card from the first lock 1, the janitor registration card is presented to the first lock followed by presenting a registered administrator card and thereafter again the janitor registration card. Thereby all janitor cards registered in the first locks memory will be de-registered. Any further janitor card except the lost janitor that should be registered may then be re-registered as described above.

[0057] In case where an administrator card which has not been lost is to be de-registered, de-registration is carried out as follows. The administrator registration card is first presented to the first lock, followed by the unwanted administrator card and thereafter again the administrator registration card. De-registration of a not lost janitor card is accomplished in a fully corresponding manner by using the janitor registration card and the unwanted janitor card.

[0058] Once the unwanted administrator and/or janitor cards have been de-registered from the first lock, the copying card is presented to the first lock 1, whereby the corrected configuration data is copied onto the copying card. Thereafter the copying card is presented to a second lock 2 and subsequently to the remaining locks 3, 4, whereby the corrected configuration data is sequentially copied from the copying card to the second 2 and the remaining 3, 4 locks.

[0059] For increasing the security of the system it may be desired to require that an correct authorisation code is first presented to the second and the remaining locks before the configuration data is copied from the copying card to the second and the remaining locks. In such case the system may be arranged such that copying of configuration data from the copying card to the second and the remaining locks requires that a registered administrator card is first presented to the second and the further locks. In practice re-configuration of each of the second and the remaining locks may the be accomplished in the following manner: First the copying card is presented to the lock in question, thereafter a registered administrator card is presented followed by again presenting the copying card. During such procedure the configuration data is copied to from the copying card to the lock at the second presentation of the copying card and thus first after the administrator card has been presented.

[0060] Alternatively the copying card itself may comprise an authorisation code, which, during the initial configuration of the locks in factory mode has been registered as a correct authorisation code for the locks in question. In such cases, when re-configuring the second and the remaining locks, it will suffice to present the copying card only one time to each of the second and the remaining locks for re-configuring these locks.

[0061] The re-configuration process just described results in the same advantages and benefits as the initial configuration process described earlier.

[0062] Figure 2 illustrates schematically the logical steps preformed when a copying card is presented to a lock of the system. As seen in fig 2, the copying card first determines if the lock is in factory mode or not. If so, the lock determines if the copying card carries configuration data and, if it does, the configuration data is copied from the copying card to the lock. If the copying card does not carry configuration data the lock generates an audible and/or visual error signal. This sequence thus represents initial configuration of the lock from factory mode.

[0063] If it is determined that the lock, when presenting the copying card, is not in factory mode, i.e. that the lock has already been configured, then the lock determines if the copying card is provided with a correct authorisation code for the lock. If so, the configuration data is copied from the copying card to the lock. This sequence thus represents re-configuration of an already configured lock.

[0064] If the lock determines that the copying card is not provided with a correct authorisation code, then the lock detects the presence of any administrator card presented to the lock. When the lock has detected such an administrator card it determines if the administrator card is provided with a correct authorisation code. When this is the case the configuration data is copied from the lock to the copying card. This sequence thus represents copying configuration data from an initially configured or re-configured first lock of the system. In cases when the lock determines that the administrator card does not contain a valid authorisation code, the lock generates an error signal.

[0065] An important advantage of the methods for configuring and re-configuring the electromechanical locks of the system described above is that the entire methods may quickly be carried out by one and the same administrator. The administrator will thus be in control of the entire process and it is assured that the configuration and re-configuration is actually correctly carried out for all intended locks of the system.

[0066] The aspects of the present disclosure have mainly been described above with reference to a few embodiments and examples thereof. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.


Claims

1. Method for configuring a plurality of stand alone, off-line electromechanical looks (1, 2, 3, 4), which locks are arranged to communicate via short range wireless communication, the method comprising the steps of:

a) receiving configuration data into a first one (1) of said electromechanical locks,

b) detecting presence of a dedicated non-key, copying card (B), by said first electromechanical lock (1), said copying card (B) being a short range wireless communication card,

c) copying at least a portion of the configuration data from said first electromechanical lock (1) to the copying card (B),

d) detecting presence of said copying card (B), by a second one (2) of said plurality of electromechanical locks,

e) determining if the second electromechanical lock (2) has been configured or is in factory mode,

f) when the second electromechanical lock (2) is in factory mode, copying the configuration data from the copying card (B) to the second electromechanical lock (2),

g) repeating steps d) to f) for the remaining number of the plurality of electromechanical locks (3, 4).


 
2. Method according to claim 1, wherein the configuration data is transferred between the electromechanical locks (1, 2, 3, 4) and the copying card (B) via Radio Frequency Identification (RFID).
 
3. Method according to claim 1 or 2, wherein said first one (1) of the electromechanical locks is configured by means of sequentially reading configuration data from a number of different configuration data input cards (Ai-An) to the first electromechanical lock (1), which input cards (Ai-An)are arranged to communicate via short range wireless communication.
 
4. Method according to claim 3, wherein each configuration data input card (Ai-An) comprises data related to a specific configuration setting.
 
5. Method according to any of claim 1 - 4, further comprising the step of detecting presence of an administrator card by the first electromechanical lock (1), and transferring authorisation data stored on the administrator card to the first electromechanical lock (1) to enable copying at least a portion of the configuration data from said first electromechanical lock (1) to the copying card (B) in step c).
 
6. Method according to any of claim 1 - 5, further comprising the steps of determining if the first (1) or the second (2) lock respectively has been configured or if it is in factory mode and, when the lock has been configured, copying the configuration data from said lock (1, 2) to the copying card (B).
 
7. Method according to any of claim 1 - 6, further comprising the step of determining, by the first (1) lock or the second (2) lock respectively, if the copying card (B) comprises a correct authorisation code for the lock (1, 2) in question.
 
8. Method according to claim 7, further comprising the step of, when the copying card (B) does not comprise a correct authorisation code for the lock in question, copying the configuration data from the lock (1, 2) in question to the copying card (B).
 
9. Method according to claim 7 or 8, further comprising the step of, when the copying card (B) does comprise a correct authorisation code for the lock in question, copying the configuration data from the copying card (B) to the lock (1, 2) in question.
 
10. Method according to any of claims 1 - 9, wherein an administrator of the system first presents the copying card (B) to the first lock (1) for carrying out steps b) and c) and thereafter sequentially presents the copying card (B) to the second lock (2) and the remaining locks (3, 4) for carrying out steps d) to f) for each of the second (2) and the remaining (3, 4) locks.
 
11. An electromechanical lock system comprising;

- a plurality of stand alone, off-line electromechanical locks (1, 2, 3, 4), which are arranged to communicate via short range wireless communication, each electromechanical lock comprising means for receiving configuration data and means for detecting the presence of a copying card (B), and

- at least one dedicated non-key, copying card (B) which is provided with means for detecting if each of the electromechanical locks (1, 2, 3, 4) have been configured or are in factory mode and means for storing and copying configuration data to and from the electromechanical locks (1, 2, 3, 4) via short range wireless communication.


 
12. An electromechanical lock system according to claim 10, wherein the electromechanical locks (1, 2, 3, 4) and the copying card (B) are arranged to communicate via Radio Frequency Communication (RFID).
 
13. An electromechanical lock system according to claim 10 or 11, further comprising a plurality of different configuration data input cards (Ai - An) and wherein at least the first lock (1) comprises means for sequentially reading configuration data stored on the configuration data input cards (Ai-An), for configuring at least the first lock (1) and wherein the configuration data is read via short range wireless communication.
 
14. An electromechanical locks system according to any of claims 10-12, wherein the copying card (B) comprises means for storing an authorisation code which is detectable by the electromechanical locks (1, 2, 3, 4).
 
15. An electromechanical lock system according to any of claims 10 - 12, wherein the electromechanical locks (1, 2, 3, 4) comprises means for detecting a correct authorisation code stored on the copying card (B) and/or on an administrator card.
 




Drawing










Search report









Search report




Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description