Patent application number | Description | Published |
20090184801 | Method for Unlocking a Lock by a Lock Device Enabled for Short-Range Wireless Data Communication in Compliance With a Communication Standard and Associated Device - A method is presented for unlocking a lock by a lock device enabled for short-range wireless data communication in compliance with a communication standard. In one embodiment, the method includes: a) detecting a key device within operative range of the lock device; b) determining a wireless communication address of the key device; c) evaluating the determined key device address by reference to a data storage with a number of wireless communication addresses stored therein; d) generating an evaluation result from said evaluating step c), wherein a match between the determined key device address and any of the wireless communication addresses stored in the data storage is a requisite for a positive evaluation result; and e) unlocking said lock if a positive evaluation result is generated in step d). | 07-23-2009 |
20100089109 | Lock device - A lock device is adapted to unlock a lock by transferring a lock catch from a locking position to a releasing position. The device comprises an electric motor, which is mechanically connected to an axle by means of at least one transmission means, and rotation of said axle actuates the lock catch. The lock device is characterized in that the transmission means comprise a weakening structure adapted to break and disrupt the mechanical connection between the electric motor and the axle if a predetermined threshold force is exceeded. | 04-15-2010 |
20100127517 | DEVICE AND METHOD FOR UNLOCKING A LOCK BY USE OF MONITORING OF CURRENT - A lock device is adapted to unlock a lock by transferring a lock catch from a locking position to a releasing position. The device has an electric motor mechanically connected to an axle by means of at least one transmission means, and rotation of said axle actuates the lock catch. The device is characterized in that it comprises means for monitoring the current consumed by the electric motor. | 05-27-2010 |
20100141381 | ACCESS CONTROL SYSTEM, LOCK DEVICE, ADMINISTRATION DEVICE, AND ASSOCIATED METHODS AND COMPUTER PROGRAM PRODUCTS - An access control system uses an existing file format standard, e.g. for personal data interchange (PDI) or image file interchange, for novel access control purposes to provide temporary access for a wireless key device to a lock device and its protected environment by creating appropriate temporary access defining data in a data object compliant with the file format standard and communicating the data object to the lock device via the wireless key device. | 06-10-2010 |
20100148921 | Lock actuating device for a lock mechanism of a lock, and a method of providing wireless control of a lock - In one embodiment of the present invention, a lock actuating device for a lock mechanism of a lock has a transceiver capable of interaction with a wireless key device, a controller coupled to the transceiver and capable of generating a control signal, and a lock actuator adapted for actuation of the lock mechanism upon receipt of the control signal from the controller. The controller has a sleep mode and an operational mode. The lock actuating device also has a wake-up arrangement including a sensor and associated circuitry. The sensor is positioned to detect the presence of a user in a vicinity of the lock actuating device. The circuitry is adapted to generate a wake-up control signal to the controller upon detection of the user, so as to cause the controller to switch from sleep mode to operational mode. | 06-17-2010 |
20120213362 | Distribution Of Lock Access Data For Electromechanical Locks In An Access Control System - A method of updating lock access data for an electromechanical lock is disclosed. The lock is of a type capable of being actuated by a user desiring to open the lock with a key having electronic key data stored therein. Updated lock access data for the lock may be configured by an administrator from a remote site and communicated to the lock using public networks. According to the method, updated lock access data from the remote site for the lock is transmitted over a telecommunication channel to a mobile terminal. The updated lock access data is transmitted from the mobile terminal to the key using short-range wireless communication. When the user attempts to open the lock with the key, the updated lock access data as received from the mobile terminal is forwarded from the key to the lock. The lock verifies that the user is trusted and then accepts the updated lock access data as received from the key. | 08-23-2012 |
20120222103 | ACCESS CONTROL METHOD, AND ASSOCIATED LOCK DEVICE AND ADMINISTRATION SERVER - An access control method is disclosed in which a lock device provides conditional access to a protected environment by short-range wireless communication with a key device having a key device identifier (KD_ID). In the method, the lock device requests the key device to provide a challenge response to a challenge generated by the lock device based on a challenge code kept by the lock device. The lock device receives the challenge response from the key device. The challenge response is generated by a remote administration server and is based on the key device identifier of the key device. The generated response is sent to the key device and forwarded from the key device to the lock device. The lock device then verifies the received challenge response based on the challenge code and on the key device identifier of the key device. | 08-30-2012 |
20150310685 | ACCESS CONTROL METHOD, AND ASSOCIATED LOCK DEVICE AND ADMINISTRATION SERVER - An access control method is disclosed in which a lock device provides conditional access to a protected environment by short-range wireless communication with a key device having a key device identifier (KD_ID). In the method, the lock device requests the key device to provide a challenge response to a challenge generated by the lock device based on a challenge code kept by the lock device. The lock device receives the challenge response from the key device. The challenge response is generated by a remote administration server and is based on the key device identifier of the key device. The generated response is sent to the key device and forwarded from the key device to the lock device. The lock device then verifies the received challenge response based on the challenge code and on the key device identifier of the key device. | 10-29-2015 |