Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ACCESS SOLUTION FOR CONVEYOR SYSTEMS
Document Type and Number:
WIPO Patent Application WO/2021/229134
Kind Code:
A1
Abstract:
The invention relates to a method for determining an access right to an entity (120) of a conveyor system (110), wherein it is: received data comprising data representing an identity of a wireless key (160) and data representing a location of the wireless key (160); detected that the wireless key (160) resides in a pre- defined location; identified the conveyor system (110) and the entity (120) on a basis of data representing the predefined location; determined status of an identified conveyor system (110); determined an access right with the wireless key (160) to the entity (120); and generated a control signal to cause one of the following: (i) a grant of an access to the entity (120), (ii) a refusal of an access to the entity (120). The invention also relates to a network node (140), a computer program product and to a conveyor system (110).

Inventors:
SILTANEN SANNI (FI)
SAINIO HENRI (FI)
VALLIOVUO SEPPO (FI)
Application Number:
PCT/FI2020/050316
Publication Date:
November 18, 2021
Filing Date:
May 13, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
KONE CORP (FI)
International Classes:
B66B1/34; B66B5/00; G07C9/00; G07C9/20
Foreign References:
US20190276272A12019-09-12
US20180158267A12018-06-07
US20200126337A12020-04-23
US20200140233A12020-05-07
US20130272506A12013-10-17
Other References:
See also references of EP 4149871A4
Attorney, Agent or Firm:
BERGGREN OY (FI)
Download PDF:
Claims:
WHAT IS CLAIMED IS:

1 . A method for determining an access right to an entity (120) of a conveyor system (110), the method, performed by a network node (140), comprises: receiving data comprising data representing an identity of a wireless key (160) and data representing a location of the wireless key (160), detecting that the wireless key (160) resides in a predefined location, identifying the conveyor system (110) and the entity (120) of the conveyor sys tem (110) on a basis of data representing the predefined location, determining status of an identified conveyor system (110), determining an access right with the wireless key (160) to an identified entity (120) of the conveyor system (110) on a basis of the identity the wireless key (160), generating, in accordance with a determined status and a determined access right, a control signal to cause one of the following: (i) a grant of an access to the entity (120) of the conveyor system (110), (ii) a refusal of an access to the entity (120) of the conveyor system (110).

2. The method of claim 1 , wherein a detection that the wireless key (160) resides in the predefined location is performed by at least one of: positioning the wireless key (160) in a space the entity (120) resides; based on data carried in a signal received from a reader device (155) of the conveyor system (110) in response to a communication between the reader device (155) and the wireless key (160).

3. The method of any one of the preceding claims, wherein the access right with respect to the entity (120) is determined by inquiring the access right from a database (145) with the data identifying the wireless key (160).

4. The method of any of the preceding claims, wherein the status information of the conveyor system (110) is inquired from at least one of: a database (145) accessible by the network node (140); a conveyor controller (130).

5. The method of any of the preceding claims, wherein the control signal causing the grant of the access to the entity (120) of the conveyor system (110) comprises an instruction to unlock a lock (125) of the entity (120) of the conveyor system (110).

6. The method of claim 5, wherein the control signal is generated to the lock (125) by one of: through a direct communication between the network node (140) and the lock (125); through an indirect communication between the net work node (140) and the lock (125) through the conveyor controller (130).

7. The method of claim 5 or 6, wherein the lock (125) is an electric lock of at least one of the following: a control panel, a car operating panel, a car roof door.

8. The method of any of the preceding claims, wherein the control signal causing the refusal of the access to the entity (120) of the conveyor system (110) comprises an instruction to generate an indication to indicate the refusal by at least one of: the lock (125) of the entity (120) of the conveyor system (110); the reader device (125) of the conveyor system (110); the wireless key (160).

9. The method of claim 8, wherein the control signal to generate an indication to indicate the refusal to the at least one of: the lock (125); the reader device

(155) is generated by one of: through a direct communication between the network node (140) and the at least one of: the lock (125); the reader device (155); or through an indirect communication between the network node (140) and the at least one of: the lock (125); the reader device (155) through the conveyor con troller (130). 10. The method of any of the preceding claims, wherein the access is granted to a user interface for reporting of at least one pit task in response to a detection that the wireless key (160) resides at a pit.

11 . The method of any of the preceding claims, wherein the access is granted to an elevator car inspection drive in response to a detection that the wireless key (160) resides on an elevator car roof.

12. The method of any of the preceding claims, wherein the access is granted to perform a test emergency call in response to a detection that the wireless key (160) resides in the elevator car.

13. A network node (140) for determining an access right to an entity (120) of a conveyor system (110), comprising: at least one processor (310); at least one memory (320) including computer program code (325); the at least one memory (320) and the computer program code (325) configured to, with the at least one processor (310), cause the network node (140) to per form: receive data comprising data representing an identity of a wireless key (160) and data representing a location of the wireless key (160), detect that the wireless key (160) resides in a predefined location, identify the conveyor system (110) and the entity (120) of the conveyor system (110) on a basis of data representing the predefined location, determine status of an identified conveyor system (110), determine an access right with the wireless key (160) to an identified entity (120) of the conveyor system (110) on a basis of the identity the wireless key (160), generate, in accordance with a determined status and a determined access right, a control signal to cause one of the following: (i) a grant of an access to the entity (120) of the conveyor system (110), (ii) a refusal of an access to the entity (120) of the conveyor system (110).

14. The network node (140) of claim 13, wherein the network node (140) is arranged to perform a detection that the wireless key (160) resides in the pre- defined location by at least one of: positioning the wireless key (160) in a space the entity (120) resides; based on data carried in a signal received from a reader device (155) of the conveyor system (110) in response to a communication be tween the reader device (155) and the wireless key (160).

15. The network node (140) of any one of the preceding claims 13 or 14, wherein the network node (140) is arranged to determine the access right with respect to the entity (120) by inquiring the access right from a database (145) with the data identifying the wireless key (160).

16. The network node (140) of any one of the preceding claims 13 - 15, wherein the network node (140) is arranged to inquire the status information of the conveyor system (110) from at least one of: a database (145) accessible by the network node (140); a conveyor controller (130).

17. The network node (140) of any of the preceding claims 13 - 16, wherein the network node (140) is arranged to generate the control signal causing the grant of the access to the entity (120) of the conveyor system (110) by adding an instruction to unlock a lock (125) of the entity (120) of the conveyor system (110) in the control signal.

18. The network node (140) of claim 17, wherein the network node (140) is arranged to generate the control signal to the lock (125) by one of: through a direct communication between the network node (140) and the lock (125); through an indirect communication between the network node (140) and the lock (125) through the conveyor controller (130).

19. The network node (140) of claim 17 or 18, wherein the network node (140) is arranged to generate the control signal to the lock (125) being an electric lock of at least one of the following: a control panel, a car operating panel, a car roof door.

20. The network node (140) of any one of the preceding claims 13 - 19, wherein the network node (140) is arranged to add to the control signal causing the refusal of the access to the entity (120) of the conveyor system (110) an instruction to generate an indication to indicate the refusal by at least one of: the lock (125) of the entity (120) of the conveyor system (110); the reader device (125) of the conveyor system (110); the wireless key (160).

21. The network node (140) of claim 20, wherein the network node (140) is arranged to generate the control signal to generate an indication to indicate the refusal to the at least one of: the lock (125); the reader device (155) by one of: through a direct communication between the network node (140) and the at least one of: the lock (125); the reader device (155); or through an indirect communication between the network node (140) and the at least one of: the lock (125); the reader device (155) through the conveyor con troller (130).

22. The network node (140) of any one of the preceding claims 13 - 21, wherein the network node (140) is arranged to grant the access to a user inter face for reporting of a pit task in response to a detection that the wireless key (160) resides at a pit.

23. The network node (140) of any one of the preceding claims 13 - 22, wherein the network node (140) is arranged to grant the access to an elevator car inspection drive in response to a detection that the wireless key (160) resides on an elevator car roof. 24. The network node (140) of any one of the preceding claims 13 - 23, wherein the network node (140) is arranged to grant the access to perform a test emergency call in response to a detection that the wireless key (160) resides in the elevator car. 25. A computer program product for determining an access right to an entity (120) of a conveyor system (110) which, when executed by at least one proces sor, cause a network node to perform the method according to any of claims 1 - 12. 26. A conveyor system (110), comprising: an entity (120), and a network node (140) according to any of claims 13 - 24.

Description:
ACCESS SOLUTION FOR CONVEYOR SYSTEMS

TECHNICAL FIELD

The invention concerns in general the technical field of conveyor systems. More particularly, the invention concerns access solution to the conveyor systems.

BACKGROUND

Conveyor systems, like elevators or escalators, comprise spaces that may only be accessed by authorized persons, such as technicians. Such spaces may e.g. be elevator cars, shafts and external parts of an elevator car accessible e.g. through a roof door and control units residing behind locked doors, such as MAP (Maintenance Access Panel). In addition to spaces access to some systems belonging to the conveyor system, such as a user interface, or e.g. its configu ration, may be limited. The access is limited by arranging a lock to respective entries, such as to doors, of the space or the system in question. Traditionally the lock has been a mechanical lock which is operative with a dedicated physical key the technicians are carrying with.

More sophisticated locking solutions are based on electric locks which are con figured to operate through an electro-magnetic interaction, such as with short range wireless communication. For example, the electric lock may operate as a reader device which may communicate with a wireless key when the wireless key is brought in a vicinity of the reader device. The vicinity may be defined by the electro-magnetic technology applied to the system. In response to the inter action the lock is opened if the authorization procedure indicates that the wire- less key allows the access to the entity in question. The wireless key may be in a form of a tag or a card, and configured to implement the wireless technology in question. The above described prior art solutions have a disadvantage that they are tied to the above mentioned devices being either physical or electric. This also means that the technicians need to have the key being either physical or wire less with him/her in order to be capable of unlocking the lock and in that manner to access the entity, such as the space or the system, in question.

Hence, there is need to develop further solutions to provide freedom for access ing the conveyor system by authorized persons.

SUMMARY The following presents a simplified summary in order to provide basic under standing of some aspects of various invention embodiments. The summary is not an extensive overview of the invention. It is neither intended to identify key or critical elements of the invention nor to delineate the scope of the invention. The following summary merely presents some concepts of the invention in a simplified form as a prelude to a more detailed description of exemplifying em bodiments of the invention.

An object of the invention is to present a method, a network node, a computer program product and a conveyor system for determining an access right.

The objects of the invention are reached by a method, a network node, a com- puter program product and a conveyor system as defined by the respective in dependent claims.

According to a first aspect, a method for determining an access right to an entity of a conveyor system is provided, the method, performed by a network node, comprises: receiving data comprising data representing an identity of a wireless key and data representing a location of the wireless key; detecting that the wire less key resides in a predefined location; identifying the conveyor system and the entity of the conveyor system on a basis of data representing the predefined location; determining status of an identified conveyor system; determining an access right with the wireless key to an identified entity of the conveyor system on a basis of the identity the wireless key; generating, in accordance with a de termined status and a determined access right, a control signal to cause one of the following: (i) a grant of an access to the entity of the conveyor system, (ii) a refusal of an access to the entity of the conveyor system.

A detection that the wireless key resides in the predefined location may be per formed by at least one of: positioning the wireless key in a space the entity re sides; based on data carried in a signal received from a reader device of the conveyor system in response to a communication between the reader device and the wireless key.

The access right with respect to the entity may be determined by inquiring the access right from a database with the data identifying the wireless key.

The status information of the conveyor system may be inquired from at least one of: a database accessible by the network node; a conveyor controller.

The control signal causing the grant of the access to the entity of the conveyor system may comprise an instruction to unlock a lock of the entity of the conveyor system. For example, the control signal may be generated to the lock by one of: through a direct communication between the network node and the lock; through an indirect communication between the network node and the lock through the conveyor controller. For example, the lock ay be an electric lock of at least one of the following: a control panel, a car operating panel, a car roof door.

The control signal causing the refusal of the access to the entity of the conveyor system may comprise an instruction to generate an indication to indicate the refusal by at least one of: the lock of the entity of the conveyor system; the reader device of the conveyor system; the wireless key. For example, the control signal to generate an indication to indicate the refusal to the at least one of: the lock; the reader device may be generated by one of: through a direct communication between the network node and the at least one of: the lock; the reader device; or through an indirect communication between the network node and the at least one of: the lock; the reader device through the conveyor controller. For example, the access may be granted to a user interface for reporting of at least one pit task in response to a detection that the wireless key resides at a pit. Alternatively or in addition, the access may be granted to an elevator car inspection drive in response to a detection that the wireless key resides on an elevator car roof. Still further, the access may be granted to perform a test emer gency call in response to a detection that the wireless key resides in the elevator car.

According to a second aspect, a network node for determining an access right to an entity of a conveyor system is provided, the network node comprising: at least one processor; at least one memory including computer program code; the at least one memory and the computer program code configured to, with the at least one processor, cause the network node to perform: receive data compris ing data representing an identity of a wireless key and data representing a loca tion of the wireless key; detect that the wireless key resides in a predefined lo cation; identify the conveyor system and the entity of the conveyor system on a basis of data representing the predefined location; determine status of an iden tified conveyor system; determine an access right with the wireless key to an identified entity of the conveyor system on a basis of the identity the wireless key; generate, in accordance with a determined status and a determined access right, a control signal to cause one of the following: (i) a grant of an access to the entity of the conveyor system, (ii) a refusal of an access to the entity of the conveyor system.

The network node may be arranged to perform a detection that the wireless key resides in the predefined location by at least one of: positioning the wireless key in a space the entity resides; based on data carried in a signal received from a reader device of the conveyor system in response to a communication between the reader device and the wireless key.

The network node may be arranged to determine the access right with respect to the entity by inquiring the access right from a database with the data identify ing the wireless key. The network node may be arranged to inquire the status information of the con veyor system from at least one of: a database accessible by the network node; a conveyor controller.

Still further, the network node may be arranged to generate the control signal causing the grant of the access to the entity of the conveyor system by adding an instruction to unlock a lock of the entity of the conveyor system in the control signal. For example, the network node may be arranged to generate the control signal to the lock by one of: through a direct communication between the net work node and the lock; through an indirect communication between the network node and the lock through the conveyor controller. For example, the network node may be arranged to generate the control signal to the lock being an electric lock of at least one of the following: a control panel, a car operating panel, a car roof door.

The network node may be arranged to add to the control signal causing the refusal of the access to the entity of the conveyor system an instruction to gen erate an indication to indicate the refusal by at least one of: the lock of the entity of the conveyor system; the reader device of the conveyor system; the wireless key. For example, the network node may be arranged to generate the control signal to generate an indication to indicate the refusal to the at least one of: the lock; the reader device by one of: through a direct communication between the network node and the at least one of: the lock; the reader device; or through an indirect communication between the network node and the at least one of: the lock; the reader device through the conveyor controller.

For example, the network node may be arranged to grant the access to a user interface for reporting of a pit task in response to a detection that the wireless key resides at a pit. Alternatively or in addition, the network node may be ar ranged to grant the access to an elevator car inspection drive in response to a detection that the wireless key resides on an elevator car roof. Still further, the network node may be arranged to grant the access to perform a test emergency call in response to a detection that the wireless key resides in the elevator car. According to a third aspect, a computer program product for determining an ac cess right to an entity of a conveyor system is provided which computer program product, when executed by at least one processor, cause a network node to perform the method according to the first aspect as described above.

According to a fourth aspect, a conveyor system is provided, the conveyor sys tem comprising: an entity, and a network node according to the second aspect above.

The expression "a number of refers herein to any positive integer starting from one, e.g. to one, two, or three.

The expression "a plurality of refers herein to any positive integer starting from two, e.g. to two, three, or four.

Various exemplifying and non-limiting embodiments of the invention both as to constructions and to methods of operation, together with additional objects and advantages thereof, will be best understood from the following description of specific exemplifying and non-limiting embodiments when read in connection with the accompanying drawings.

The verbs “to comprise” and “to include” are used in this document as open limitations that neither exclude nor require the existence of unrecited features. The features recited in dependent claims are mutually freely combinable unless otherwise explicitly stated. Furthermore, it is to be understood that the use of “a” or “an”, i.e. a singular form, throughout this document does not exclude a plural ity.

BRIEF DESCRIPTION OF FIGURES

The embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings.

Figure 1 illustrates schematically an example of an environment in which the present invention may be implemented to. Figure 2 illustrates schematically an example embodiment of a method accord ing to the invention.

Figure 3 illustrates schematically as a block diagram an example embodiment of a network node according to the invention. Figure 4 illustrates schematically as a block diagram an example embodiment of a wireless key according to the invention.

DESCRIPTION OF THE EXEMPLIFYING EMBODIMENTS

The specific examples provided in the description given below should not be construed as limiting the scope and/or the applicability of the appended claims. Lists and groups of examples provided in the description given below are not exhaustive unless otherwise explicitly stated.

Figure 1 illustrates schematically an example of an environment in which the present invention may be implemented to. The environment comprises a con- veyor system 110 implemented in a building 115. The conveyor system 110 may e.g. be an elevator system, as illustrated in Figure 1, an escalator, or a moving walkway, for example. In the forthcoming description of the present invention the conveyor system 110 is mainly considered to be an elevator system, but the aspects of the present invention are directly applicable in the other conveyor system. The conveyor system 110 may comprise a number of entities 120 whose access is controlled by a lock 125. Such entities 125 may e.g. reside in elevator cars, shafts or in the buildings. Some non-limiting examples of the en tities may e.g. be control panels, doors used for accessing some parts of the conveyor system, such as car roof doors, machinery room and/or control units residing behind locked doors. The lock 125 in the context of the present inven tion is an electric lock which may communicate at least with other parts of the conveyor system 110, such as with a network node 140 accessible directly through a communication network 150 (communication route referred with A in Figure 1) or indirectly through other entities, such as through a conveyor controller 130 (communication routes referred with B and C in Figure 1 ). The network node 140 may be communicatively connected to other entities, such as one or more databases 145. The network node 140 may be arranged to operate in the manner as will be described in the forthcoming description as a stand alone device or as a distributed computing environment in which a plurality of network nodes, i.e. computing devices, may be arranged to operate together e.g. as a cloud computing environment to implement the functionality as will be described in the forthcoming description.

Furthermore, the conveyor system 110 may comprise a number of reader de vices 155 communicatively connected to the network node 140 either directly (communication route referred with D in Figure 1 ) or indirectly through other en tities, such as through a conveyor controller 130 (communication routes referred with B and E in Figure 1 ) or a control device controlling an operation of the num ber of reader devices 155. The reader device 155 may be understood as a de vice comprising necessary hardware and software to communication with a wire less key 160 over an electro-magnetic radiation. In other words, the communi cation between the reader device 155 and the wireless key 160 may be imple mented in wireless manner e.g. utilizing some short-range wireless communica tion technology, such as RFID technology or a Bluetooth ®.

The wireless key 160, in turn, shall be understood, in an embodiment as sche matically illustrated in Figure 1 , as a device arranged to communicate at least with the reader device 155 in response to entering in a vicinity of the reader device 155. The communication capability is defined by the communication tech nology applied to the communication i.e. by that the entities are within a com munication range of the applied communication technology from each other. The wireless key 160 may, as well comprise, other capabilities, such as other com munication capabilities. For example, the wireless key may comprise necessary hardware and software to communicate with the network node 140 over a com munication channel established over the communication network 150. The wire less key 160 may be implemented as a single device or as a pair of devices, such as a key device communicatively connected to a mobile terminal wherein the mobile terminal may be arranged to implement the communication towards the communication network 150. Naturally, in such an embodiment an appropri ate application software may be installed in the mobile terminal in order to com municate with the key device and the communication network 150 in a manner as will be described. For sake of clarity it is worthwhile to mention that the wire less key 160 may be implemented with a mobile terminal device, being e.g. a mobile phone, a tablet device, a laptop computer, smart glasses, a smart watch or anything similar.

For at least some purposes of the invention it is necessary to be able to deter mine a position of the wireless key 160 and in the system as schematically illus trated in Figure 1 as a non-limiting embodiment of the invention the position of the wireless key 160 may be determined through the communication with the reader devices 155 whose position is known.

In some other embodiments of the invention in which the wireless key 160 is equipped with such a technology that its position may be determined in a re quired accuracy the implementation of the system does not necessarily require the reader devices 155 especially if the network node 140 is arranged to monitor the position of the wireless key with respect to a number of locks 125. In other words, the building 115, or at least some parts of it, may be equipped with indoor positioning system with whom the wireless key 155 may be arranged to com municate with for providing position information to the network node 140. Alter natively or in addition, the indoor positioning system may be arranged to provide position information of the wireless key 155 to the network node 140 with other information and in such an implementation the indoor positioning system may comprise a number of devices corresponding to the reader devices 155 of Figure 1 for determining the position and delivering the position information with other data to the network node 140. As said, for implementing at least some parts of the present invention it is necessary to be able to determine the position of the wireless key 155.

For sake of completeness, it is worthwhile to mention that the communication network 150 may, for example, be arranged to implement any mobile communication technology, such as 3G, 4G or 5G communication technology, in order to provide a communication channel with the communicating entities which are equipped with necessary hardware and software to implement the communication. Alternatively or in addition, the communication network 150 may be implemented with a wired communication technology, such as using any data network like Internet.

Still further, the network node 140 may be arranged to communicate with the conveyor system 110, such as with the conveyor controller 130 of the conveyor system 110. With the communication the network node 140 may obtain status information of the conveyor system 110 for the purpose of the invention as will be described in the forthcoming description.

Next, some further aspects of the invention are now described by referring to Figure 2 illustrating schematically an example embodiment of the method ac cording to the invention. The method may be performed for determining an ac cess right to an entity of a conveyor system 110. The method as schematically illustrated in Figure 2 is shown from a network node point of view. First, the network node may receive data 210. The received data may at least comprise data representing an identity of a wireless key 160 and data representing a lo cation of the wireless key 160.

According to an example embodiment of the invention the data received by the network node 140 may be generated by a detection system implemented in a space the conveyor system 110 resides. The detection system may comprise a number of reader devices 155 configured to communicate with the wireless key 160. In accordance, with an example embodiment the reader devices 155 may receive, through the communication at least data representing an identity of the wireless key 160. The identity of the wireless key 160 may be represented in any manner, such any data string, stored in a memory of the wireless key 160 and transmitted, e.g. by broadcasting, to the reader device 155 in the communi cation. In response to the receipt of the identity data of the wireless key 160 the reader device 155 may prepare a data record for transmitting it to the network node 140. The data record may comprise the identity of the wireless key 160 in question as well as data identifying the reader device 155. The data record may be transmitted to the network node 140 directly from the reader device 155 or indirectly through a control device controlling the reader devices 155 in the space, e.g. in the building, or through a conveyer controller 130 for example. If the data is transmitted to the network node 140 through another entity, the re spective entity may include further data, such as its identity, to the data record.

In accordance with another example embodiment of the invention the data re ceived by the network node 140 may be generated by a positioning system im plemented in the space in question. The positioning system may be an indoor positioning system or outdoor positioning system wherein the first is preferably used in buildings and similar whereas the latter system is applicable in outdoor spaces wherein the conveyor system 110 may be implemented to. The aspects relating to the present invention are now described in an environment into which an indoor positioning system is established. The indoor positioning system may comprise a number of access points with whom the wireless key 160 communi cate with. Based on the communication the indoor positioning system may e.g. collect the identity of the wireless key 160, but also to determine its position within the space in an accuracy of the indoor positioning system. The indoor positioning system may generate a data record comprising at least the identity of the wireless key 160 and data representing the location of the wireless key 160 within the space and transmit it directly to the network node 140 through an established communication channel or indirectly through other entities, such as a control device of the indoor positioning system and/or conveyor controller 130, for example.

Alternatively or in addition, if the wireless key 160 is equipped with a communi cation means for communicating with the network node 140, the wireless key 160 may be arranged, on a basis of received signals from the indoor positioning system, to generate a data record comprising its identity as well as data repre senting its location within the space 115. The data representing the location of the wireless key 160 may be a calculated position by the wireless key 160 from the received signals from the indoor positioning system or the raw data received from the indoor positioning system, such as signal strength values of signals received by the wireless key 160 from a plurality of beacon devices.

Next, in step 220 the network node 140 is arranged to perform a detection if the wireless key 160 resides in a predefined location. The detection 220 may be performed so that the network node 140 may be arranged to compare the data representing the location of the wireless key 160 either directly or by modifying the data through predefined calculation process into a form being suitable to be used in the comparison to one or more comparison values representing prede fined location(s) in the space 115. The comparison may e.g. be performed so that network node 140 may inquire from a database 145 if there is predefined location area consisting of one or more locations covering the location of the wireless key 160. This may e.g. be implemented so that the location of the wire less key 160 is provided as a parameter in the inquiry to the database 145, which performs the comparison and gives response to the network node 140 in a pre determined manner. Fundamentally thinking, a detection that the location of the wireless key 160 is within the predefined area(s) means that the network node 140 may continue the method to determine the access right. On the other hand, if there is no match with the location of the wireless key 160 and the predefined locations the process may be discontinue because there is no need to give any special attention to the wireless key 160. Such a conclusion may also occur in a situation that the wireless key 160 is e.g. detected by a reader device 155 de fined not being relevant from the wireless key 160 in question point of view even if the network node 140 receives information of the detection.

In the following it is assumed that a result of the comparison indicates that the wireless key 160 resides in the predefined location. Then, as schematically il lustrated in Figure 2, the network node 140 may be arranged to identify 230 the conveyor system 110 and identify 250 an entity 120 of the conveyor system 110 on a basis of data representing the predetermined location. The identification of the mentioned entities may be performed so that it is inquired from a database 145, e.g. by including data representing the position in the inquiry, identification information of the conveyor system 110 and identification information of the entity 120 of the conveyor system 110. The database 145 may return, in re sponse to a detection of a match of the locations of the wireless key 160 and a respective conveyor system 110 in the space as well as at least one entity 120 of the conveyor system 110. In other words, the result is to determine the identity of the conveyor system 110 and the identity of the at least one entity 120 in accordance with the location of the wireless key 160. In some embodiments the at least one entity 120 may be associated to the conveyor system 110, and the database may return the identity of the at least one entity 120 based on a de tection of the conveyor system 110. It is also worthwhile to mention that the conveyor system 110, and especially the at least one entity 120 may be detected or identified so that it resides close to the location of the wireless key 160, but this is not necessary the basis for identification.

In step 240, the network node 140 may be arranged to generate a signal to the conveyor system 110 to determine status of the conveyor system 110. In other words, based on the identity of the conveyor system 110 the network node 140 may generate an inquiry towards a respective entity, such as the database 145 or the conveyor controller 130 or to a database through the conveyor controller 130, to receive status information on the conveyor system 110. The inquiry to the database 145 may be performed on the basis of the identity information of the conveyor system 110. If the inquiry is performed to the conveyor controller 130, the database 145 may have returned together with the identity of the con veyor system 110 further data, such as a network address of the conveyor con troller 130 and other instructions, for reaching the conveyor controller 130 in order to inquire the piece of information of the status. The status information may e.g. indicate if the conveyor system is in use or not, if there is indicated any failure reports of an operation of the conveyor system, or any similar information on the status of the conveyor system 110. The status information is in accord ance with at least some embodiments of the invention such that it is to be taken into account in a determination if an access to the entity may be allowed or not, e.g. if the conveyor system 110 is in use, the access may be prevented. Moreover, since the network node 140 is aware of the at least one entity 120 associated in some manner to the location of the wireless key 160 as a result of step 250 and since it is also aware of the identity of the wireless key 160 due to procedure described in the context of the step 220, the network node 140 may be arranged to inquire from the database 145 if there is an access right based on the wireless key 160 to the entity of the conveyor system 110. In other words, an inquiry may be performed to the database 145 wherein the inquiry comprises the identity of the wireless key 160 and the identity of the entity in question as parameters in order to determine it the wireless key 160 allows accessing the entity or not. The database 145 may determine the access right based on the received pieces of information and return a response expressing the status with respect to the access right.

For sake of clarity it should be noted that the steps of the identification 230 of the conveyor system 110 and the determination of status of the conveyor system 110 may be performed at least in part concurrently to the steps of the identifica tion 250 of the entity 120 and the determination 260 of the access right, or con secutively to each other.

Next, in response to that the network node 140 has determined, or collected, the necessary pieces of information it may be arranged to generate, in accordance with a determined status and a determined access right, a control signal to cause one of the following: (i) a grant of an access to the entity 120 of the conveyor system 110, (ii) a refusal of an access to the entity 120 of the conveyor system 110. The generation of the control signal may e.g. be performed so that a signal indicating the grant of the access to the entity 120 is generated only if the wire less key 160 is authorized to access the entity 120 and the status of the conveyor system 110 is such that the access to the entity 120 may be performed. In all other situations such a control signal is generated which indicates the refusal of the access to the entity 120 of the conveyor system 110. In accordance with the type of the generated control signal it may be directed to different entities. For example, if a grant of the access to the entity is determined, the control signal may be generated, e.g. composed and transmitted, to a lock 125 of the entity 120 in question. The control signal may cause the lock 125 to unlock i.e. a per son, such as a technician, carrying the wireless key 160 may access the entity. For example, a door may be opened, and the technician may enter a space to perform maintenance work. In addition to this, a control signal may be generated to the wireless key 160, if it is equipped with a communication means, in order to inform the carrier of the wireless key 160 that the access right is granted. On the other hand, if the network node 140 determines that no access right may be given and it is arranged to generate the signal expressing the refusal, the control signal may be generated, i.e. composed and transmitted, e.g. towards the wire less key 160 if it is equipped with a communication means, or e.g. towards a reader device 155 which generated the detection of the wireless key 160. In such a case the respective entity receiving the control signal indicating the re fusal is advantageously equipped with application input/output devices, such as a control light or a loudspeaker or any similar, which may be activated with the control signal to show the user of the wireless key 160 the refusal.

In accordance with some example embodiments the term “lock” may refer to a lock implemented with software means. In other words, an entity, such as a con trol panel or a car operating panel, may be locked so that 3 rd parties may not access to configuration settings of the panel when e.g. entering in an elevator car. Contrary to that the method according to an embodiment of the present invention may operate so that if the outcome of the method is that an access right is given to the control panel or the car operating panel, or to any similar entity 120, the car operating panel is set to a configuration mode for allowing the technician the access to modify the configuration of the panel. In other words, a lock implemented with computer program means may be unlock. Hence, the entity 120 locked with the software means in such a context may e.g. refer to a user interface which may be opened i.e. access to certain features, such as the configuration settings, may be provided in response to a detection of the wire less key 160 in the manner as described.

The solution according to some embodiments of the invention may be imple mented so that different wireless keys 160 may be provided with different access rights with respect to the entity 120 of the conveyor system 110. Hence, certain wireless key 160 may be provided with dedicated access rights to the wireless key 160 and some other wireless key 160 may be provided with other dedicated access rights. For example, in case the lock refers to software implemented lock e.g. in a context where the entity is the user interface of the car operating panel different wireless keys 160 may provide different levels of access rights with respect to a configuration of the car operating panel. For example, with a first wireless key 160 a technician may access to first set of configuration settings of the conveyor system 110 whereas with a second wireless key 160 the technician may access to a second set of configuration settings of the conveyor system 110.

In accordance with some example embodiments the control signal may be gen erated, such as to unlock, a lock 125 being an electric lock of at least one of the following: a control panel, a car operating panel, a car roof door. According to some further example embodiment an access right may be granted, or refused, as an outcome of the method, to a user interface for reporting of at least one pit task in response to a detection that the wireless key 160 resides at a pit. The user interface may e.g. be a display in an elevator car or even in a user terminal carried by the technician residing in the pit. Alternatively or in addition, the ac cess may be granted, as an outcome of the method, to perform an elevator car inspection drive in response to a detection that the wireless key 160 resides on an elevator car roof. Still further, the access may be granted, as an outcome of the method, to perform a test emergency call in response to a detection that the wireless key 160 resides in the elevator car. For example, the test emergency call may be performed with the car operating panel residing in the elevator car in which the wireless key 160 is detected to reside. Naturally, the above de scribed situations may occur when other aspects of the method are also fulfilled to. For example, the status of an identified conveyor system shall be a predeter mined, such as it is not in use or it is set to a maintenance mode, and the wire less key shall comprise rights to access the respective entities as described. Still further, especially in example embodiments of the invention in which a po sition of the wireless key 160 may be monitored and determined in an appropri ate accuracy it is possible to provide access to certain features, such as config uration settings, e.g. with a device carried along with the wireless key 160, or a device also implementing the characteristics of the wireless key 160. Hence, a location dependent access right provisioning may be implemented to. For ex ample, if a technician has entered a roof of an elevator car of the conveyor sys tem 110, his/her position may be determined and detected and as a result an access to an entity 120 e.g. with a first set of configuration settings may be pro vided to the technician carrying a respective wireless key 160. In this kind of implementation the configuration settings, or any similar, may be such that the technician may see an effect of the configuration only in the detected position. Similarly, other access rights may be provided in some other positions. The above kind of approach also allows a remote monitoring of the technician which may be implemented in order to fulfil security requirements e.g. operations to be performed.

As may be derived from the foregoing description the present invention enables a wide variety of sophisticated possibilities to improve a technician work as well as improve a security in an area of conveyor systems 110.

As discussed above, a network node140 arranged to perform a determination of an access right in a manner as described. Figure 3 illustrates schematically as a block diagram a non-limiting example of the network node 140 applicable to perform the method. The block diagram of Figure 3 depicts some components of an apparatus that may be employed to implement an operation of the network node. The apparatus comprises a processor 310 and a memory 320. The memory 320 may store data and computer program code 325. The apparatus may further comprise communication means 330 for wired and/or wireless com munication with other apparatuses, such as other network nodes, entities of the conveyor system itself as well as databases and any other entities. Furthermore, I/O (input/output) components 340 may be arranged, together with the processor 310 and a portion of the computer program code 325, to provide a user interface for receiving input from a user and/or providing output to the user of the system and the network node 140 when necessary. In particular, the user I/O compo nents may include user input means, such as one or more keys or buttons, a keyboard, a touchscreen, or a touchpad, etc. The user I/O components may include output means, such as a display or a touchscreen. The components of the apparatus may be communicatively coupled to each other via a bus 350 that enables transfer of data and control information between the components.

The memory 320 and a portion of the computer program code 325 stored therein may be further arranged, with the processor 310, to cause the apparatus, i.e. the network node 140 to perform a method as described in the foregoing de scription. The processor 310 may be configured to read from and write to the memory 320. Although the processor 310 is depicted as a respective single component, it may be implemented as respective one or more separate pro cessing components. Similarly, although the memory 320 is depicted as a re spective single component, it may be implemented as respective one or more separate components, some or all of which may be integrated/removable and/or may provide permanent / semi-permanent / dynamic / cached storage.

The computer program code 325 may comprise computer-executable instruc tions that implement functions that correspond to steps of the method when loaded into the processor 310. As an example, the computer program code 325 may include a computer program consisting of one or more sequences of one or more instructions. The processor 310 is able to load and execute the com puter program by reading the one or more sequences of one or more instructions included therein from the memory 320. The one or more sequences of one or more instructions may be configured to, when executed by the processor 310, cause the apparatus to perform the method be described. Hence, the apparatus may comprise at least one processor 310 and at least one memory 320 including the computer program code 325 for one or more programs, the at least one memory 320 and the computer program code 325 configured to, with the at least one processor 310, cause the apparatus to perform the method as described. The computer program code 325 may be provided e.g. a computer program product comprising at least one computer-readable non-transitory medium hav ing the computer program code 325 stored thereon, which computer program code 325, when executed by the processor 310 causes the apparatus to perform the method. The computer-readable non-transitory medium may comprise a memory device or a record medium such as a CD-ROM, a DVD, a Blu-ray disc or another article of manufacture that tangibly embodies the computer program. As another example, the computer program may be provided as a signal config ured to reliably transfer the computer program.

Still further, the computer program code 325 may comprise a proprietary appli cation, such as computer program code for executing the determination of an access right in the manner as described.

Any of the programmed functions mentioned may also be performed in firmware or hardware adapted to or programmed to perform the necessary tasks.

Moreover, as mentioned a functionality of the network node 140 may be shared between a plurality of devices as a distributed computing environment. For ex ample, the distributed computing environment may comprise a plurality of net work nodes as schematically illustrated in Figure 3 arranged to implement the method in cooperation with each other in a predetermined manner. For example, each device may be arranged to perform one or more method steps and in re sponse to a finalization of its dedicated step in may hand a continuation of the process to the next device.

In the foregoing description it is referred to the database 145 in a context of a plurality of method steps. For sake of clarity, it is worthwhile to mention that the database 145 may be arranged to maintain a plurality of data structures storing different types of data, such as the mentioned types of data inquired from the database 145. Flowever, this does not limit the present invention so that only one database 145 may be used for, but it is also possible that a plurality of da tabase systems are harnessed to maintain the respective data structures and the network node 140 is configured so that it is aware of the plurality of databases 145 for inquiring the necessary piece of information from a correct database.

Still further, Figure 4 illustrates schematically as a block diagram a non-limiting example of the wireless key 160. The block diagram of Figure 4 depicts some components of an apparatus that may be employed to implement an operation of the wireless key. The apparatus comprises a processor 410 and a memory 420. The memory 420 may store data and computer program code 425. The apparatus may further comprise communication means 430 for at least wireless communication with other apparatuses or systems, such as a network node 140, reader devices 125, other entities of the system, such as positioning systems and the like. Furthermore, I/O (input/output) components 440 may be arranged, together with the processor 410 and a portion of the computer program code 425, to provide a user interface for receiving input from a user and/or providing output to the user of the wireless key 160 when necessary. In particular, the user I/O components may include user input means, such as one or more buttons, a keyboard, a touchscreen, or a touchpad, etc. The user I/O components may include output means, such as a display or a touchscreen or light emitting de vices or loudspeakers. The components of the apparatus may be communica tively coupled to each other via a bus 450 that enables transfer of data and control information between the components.

The system for determining the access right may comprise at least the network node 140 as described, one or more databases 145, a conveyor system 110 comprising at least one entity 120 to which the access is limited with some sort of locking means 125 and a detection system for monitoring a location of the wireless key 160 and a wireless key 160. At least the mentioned entities may be arranged to communicate with each other either directly or indirectly with an ap plicable communication technology. The communication technology may be im plemented in a wireless or wired manner. In case the wireless communication technology is applied to a short-range wireless communication technology and a wide-range communication technology may be used in accordance with the need. In some embodiments e.g. the detection system may not, by definition, belong to the conveyor system 110, but it may provide necessary data to the conveyor system 110, or at least to the network node 140 for performing the method.

The specific examples provided in the description given above should not be construed as limiting the applicability and/or the interpretation of the appended claims. Lists and groups of examples provided in the description given above are not exhaustive unless otherwise explicitly stated.