Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
LOCK SYSTEM, SERVER OF A LOCK SYSTEM AND A DOOR LOCK
Document Type and Number:
WIPO Patent Application WO/2017/182709
Kind Code:
A1
Abstract:
Lock system, lock and method, wherein the presence of electronic keys in the proximity of a lock (102, 202) is monitored, an electronic key and/or a user profile associated with an electronic key is identified, and a predefined procedure is performed on the basis of the identified electronic key and/or user profile associated with the electronic key.

Inventors:
KANKKUNEN HANNU (FI)
REKONEN ARI (FI)
NURMONEN HELINÄ (FI)
TUOMIKUMPU JOONAS (FI)
TERÄS SAMPO (FI)
KRÖGER LAURA (FI)
Application Number:
PCT/FI2017/050289
Publication Date:
October 26, 2017
Filing Date:
April 18, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ROLLOCK OY (FI)
International Classes:
E05B47/00; G07C9/28
Foreign References:
JP2007247254A2007-09-27
US20100097225A12010-04-22
US20040113754A12004-06-17
Other References:
"ABLOY OPTIMA Avain vaivattomaan kulunhallintaan", ASSA ABLOY, September 2012 (2012-09-01), Retrieved from the Internet [retrieved on 20170630]
Attorney, Agent or Firm:
HEINÄNEN OY (FI)
Download PDF:
Claims:
CLAIMS

1. Method in a lock system, which comprises at least one lock (102, 202),

characterized in that in the method :

the presence of electronic keys in the proximity of a lock (102, 202) is monitored,

an electronic key and/or a user profile associated with an electronic key is identified, and

a predefined procedure is performed on the basis of the identified electronic key and/or user profile associated with an electronic key.

2. Method according to claim 1, characterized in that the procedure is the controlling of a certain device, apparatus and/or home automation.

3. Method according to claim 1 or 2, characterized in that a procedure is set specifically for each user profile or specifically for each user group, wherein the user group is e.g. elderly people, children, people who are ill, mentally handicapped people, physically handicapped people and/or prisoners.

4. Method according to any whatsoever of the preceding claims, characterized in that the system comprises a setting for when keys belonging to a user profile and/or to a user group have the right to open a lock,

and wherein the system gives an alarm or sends a messages if a key belonging to a certain user profile and/or user group requests the opening of a lock at a time when the key belonging to the certain user profile and/or user group does not have the right to open the lock.

5. Method according to any whatsoever of the preceding claims, characterized in that when a key arrives in the proximity of a lock (102, 202), a message and/or reminder is sent to a device connected to the key.

6. Method according to any whatsoever of the preceding claims, characterized in that the system gives the right to use at least one electrical device inside a locked space, such as a device adjusting home automation, on the basis of a user profile and/or a user group associated with a key opening a lock.

7. Method according to any whatsoever of the preceding claims, characterized in that the system controls off at least one device or apparatus inside a locked space, such as lights and/or devices defined in the home automation, and/or controls at least one device or apparatus outside the locked space on when the lock detects a key leaving the locked space.

8. Method according to claim 7, characterized in that the system controls the lights outside the locked space on automatically when the lock (102, 202) detects a key leaving the locked space.

9. Method according to claim 7 or 8, characterized in that the system automatically controls at least one electrical device off, into standby mode or into power-saving mode inside the locked space when the lock detects a key leaving the locked space if keys connected to the lock do not remain inside the locked space.

10. Method according to any whatsoever of the preceding claims, characterized in that the system controls on and/or into normal operating mode at least one device or apparatus inside a locked space, such as lights and/or devices defined in the home automation, when the lock detects a key arriving in the locked space. 11. Method according to any whatsoever of the preceding claims, characterized in that the system controls at least one device or apparatus outside a locked space off when the lock detects a key arriving in the locked space. 12. Method according to any whatsoever of the preceding claims, characterized in that the lock (102, 202) comprises means for detecting the presence of an electronic key, movement and/or location and/or a user profile associated with an electronic key.

13. Lock system, characterized in that it comprises at least one lock (102, 202) and

wherein the system is adapted to implement any method whatsoever according claims 1 - 12.

14. Lock system according to claim 13, characterized in that it comprises a server, which is adapted to receive from the lock information relating to operation of the lock, such as information about the presence of an electronic key, movement information and/or location information and/or user profile information associated with an electronic key, and is further adapted to perform procedures on the basis of the information received from the lock, wherein the procedure is the sending of a message and/or a control command relating to a device, to an apparatus or to home automation.

15. Lock for a lock system, which lock (102, 202) comprises a lock case (203) fixable into a door, which lock case comprises a locking latch and a latch mechanism, wherein the latch mechanism comprises electrical means for opening and/or closing the locking latch,

characterized in that

the lock (102, 202) is adapted to monitor for the presence of electronic keys in the proximity of a lock,

the lock (102, 202) is adapted to identify an electronic key and/or user profile associated with an electronic key, and

the lock (102, 202) is further adapted to send information about an identified electronic key and/or user profile associated with an electronic key to the server. 16. Lock according to claim 15, characterized in that the lock

(102, 202) comprises means for detecting the presence of an electronic key and/or a user profile associated with an electronic key.

17. Lock according to claim 15 or 16, characterized in that the lock (102, 202) comprises at least one antenna, by means of which the lock is adapted to detect whether an electronic key is moving into a locked space or out of the locked space.

18. Lock according to any whatsoever of claims 15 - 17, characterized in that the lock (102, 202) is adapted to send a message and/or a reminder to a device connected to a key when the key arrives in the proximity of the lock.

19. Server for a lock system, which comprises at least one lock, characterized in that

the server is adapted to receive information relating to operation of the lock, such as information about the presence of an electronic key, movement information and/or location information and/or user profile information associated with an electronic key, from the lock, and

the server is further adapted to perform procedures on the basis of the information received from the lock, wherein the procedure is the sending of a message and/or a control command relating to a device, to an apparatus or to home automation.

20. Server according to claim 19, characterized in that the server is adapted to record messages associated with a certain lock, and

wherein the server is further adapted to send a message to a device in the proximity of the lock, which device comprises an electronic key, when the server has received a message about the presence of the aforementioned device from the lock. 21. Server according to claim 19 or 20, characterized in that the server is adapted to adjust devices, apparatuses and/or home automation in a locked space on the basis of a user profile and/or user group associated with a certain electronic key.

Description:
LOCK SYSTEM, SERVER OF A LOCK SYSTEM AND A DOOR LOCK Field of the invention

The invention relates to a lock system and also to a door lock and server belong ing to the system .

Background of the invention

Known in the art are door locks comprising a lock case and a locking latch, which door locks can be opened and closed mechanically. Also known in the art are electrical locks, which can be controlled to open and close by means of electrical commands and electrical opening means. In the arrangements known in the art, the electrical connections of a lock that is in a door are arranged e.g . by means of wi res or other correspond ing conductors throug h the frame of the door. The conductors cou ld be led to the door lock e.g . via the door frame from the hinge side of the door.

Lead ing the conductors requ ires a passageway i n the door for the conductors and, that being the case, a conventional door cannot be used with an electric lock without adapting the door. In their present state, pre-ordered special doors must be used for doors that are provided with an electric lock, said doors having passageways for electrica l conductors, or otherwise a conventional door must be ada pted by making in it passageways going throug h the door for the conductors. Both methods are expensive relative to the costs of conventional doors. In add ition to this, accord ing to regu lations holes may not be made in some doors, such as e.g . in fire doors.

Also known in the art are electrical door locks to which electrical power ca n be transferred wirelessly. By means of these locks enabling wireless power transmission, wi ring coming throug h the structu re of the door to the lock that is in the door ca n be avoided . These electrica l locks can be used i n conventional doors in which space for wires has not been arranged . In solutions known in the art power can be transferred, e.g . from the striking plate to the lock case, when the door is closed and the lock and striking plate are face to face.

In recent times locks that can be opened wirelessly, e.g. by means of a mobile phone, have also been launched onto the market. In systems of this type the owner of a lock can send to different devices a user right, i.e. an electronic key for a lock he/she owns. In this way the lock owner can create keys for different devices and for different people.

Brief description of the invention

The purpose of the present invention is to provide a new type of lock system, in which a key in the proximity of a lock and a user associated with the key can be identified, and by means of this identification various procedures can be automatically performed.

The lock system according to the invention comprises at least one lock. In the solution according to the invention the presence of electronic keys in the proximity of a lock is monitored, an electronic key and/or a user profile associated with an electronic key is identified, and a predefined procedure is performed on the basis of the identified electronic key and/or user profile associated with an electronic key. The solution according to the invention can also comprise a server of the lock system, which server can be implemented e.g. as a cloud service.

In one embodiment of the invention the procedure is the controlling of a certain device, apparatus and/or home automation. According to one embodiment of the invention the device to be controlled in the solution of the invention is some other device than a lock, e.g. a device inside a locked space, which device can be controlled e.g. by means of home automation.

In one embodiment of the invention a procedure can be set for a certain user profile or for a certain user group, such as e.g. elderly people, children, people who are ill, mentally handicapped people, physically handicapped people and/or prisoners. In one embodiment of the invention when an electronic key arrives in the proximity of a lock, a message and/or reminder is sent to a device connected to the key. The message can be left directly in the lock or it can be left in a cloud service e.g. when the device of a user is near a certain lock and the lock reports the presence of the key to the server.

In one embodiment of the invention the lock system comprises a server. The user rights for domestic electrical devices, the rights belonging to a user profile, or certain user group, associated with a certain key, for example, can be adjusted via a server of the lock system, e.g. via a server of a cloud service.

In one embodiment of the invention Devices in a locked space can be controlled automatically, e.g. via home automation, according to whether users and/or electronic keys are coming into a locked space or leaving the locked space.

In one embodiment of the invention the lock updates the information about the electronic keys suited to it from the server, and by means of this information the lock knows which electronic keys have the right to open the lock.

The solution according to the invention now presented has some significant advantages when it is compared to prior-art solutions. By means of the solution of the invention a key in the proximity of a lock and a user associated with a key can be identified, and by means of this identification various procedures can be automatically performed. One advantage of the solution according to the invention is also that the automation does not need a separate system but instead the functionality can be integrated into a lock system, in which case the information of users in the lock system and the electronic keys that users have can be utilized in implementing automation.

Brief description of the figures In the following, the invention will be described in more detail by the aid some examples of its embodiment with reference to the drawings 1 - 5, wherein Fig. 1 presents a schematic view of the operating principle of a lock according to one embodiment of the invention;

Fig. 2 presents the structure of a lock according to an embodiment of the invention;

Fig. 3 presents the structure of a counterpart of the lock according to an embodiment of the invention;

Fig. 4 presents the structure of a lock according to an embodiment of the invention, wherein a coil used for receiving electrical power is presented;

Fig. 5 presents a schematic view of the operating principle of a lock system according to an embodiment of the invention.

Detailed description of the invention

In the solution according to the invention a key in the proximity of a lock and a user associated with the key can be identified, and by means of this identification various procedures can be automatically performed with a lock system that comprises at least one lock and possibly also a server. Fig. 1 presents a schematic view of a lock according to one embodiment of the invention, which lock can be used in the lock system according to the invention. The counterpart 101 of the lock, which counterpart is presented in Fig. 1 and is fitted into the frame of the door, scans for the presence of the door lock 102 at regular intervals. The lock 102 and the counterpart 101 of the lock comprise coils 103, 104, which are used for the wireless transfer of electrical power. When the lock 102 is at a suitable distance from the counterpart 101 of the lock, e.g . when the door is closed, the counterpart 101 of the lock controls current to the transmitter coil 103, which produces a magnetic field. The magnetic field connects to the receiver, i.e. to the coil 104 of the lock, and forms alternating current there, which is rectified and filtered . The power transfer is thus based on magnetic induction, correspondingly to that in a mains transformer (primary and secondary coils). In the solution according to the invention e.g. two planar coils are used, instead of an iron core transformer. In practice the medium of the coils is air, in some embodiments of the invention partly also plastic.

When the lock system is functioning, the unit sending power, i.e. the counterpart 101 of the lock, scans for the presence of the lock 102 at regular intervals (so-called ping function). If the lock 102 does not respond to the scan and/or if the object is not identified, the power transfer is not switched into use. In this way the warming of the wrong metal objects and also the unnecessary power consumption of the device can be prevented, and also it can be detected whether the door is open (lock does not respond to a scan) or whether the door is closed (power transfer succeeds).

In one embodiment of the invention instead of inductive power transfer, the principle of magnetic resonance or some other method can be used for wirelessly transferring electrical power from the counterpart of the lock to the lock.

Fig. 2 presents an exemplary structure of a lock according to an embodiment of the invention, which lock can be used as a lock of the lock system according to the invention. The lock comprises a lock case 203, which lock case comprises a locking latch 204 and a latch mechanism. The latch mechanism comprises electrical means for opening and/or closing the locking latch. Means are arranged in connection with the lock case 203 for wirelessly receiving 205 electrical power from the means for sending electrical power that are arranged in connection with the counterpart of the lock.

In one embodiment of the invention the lock functions mechanically and the mechanical lock can also be opened and/or closed electrically. Fig. 3 presents a counterpart 301 of the lock according to an embodiment of the invention, which lock can also be used in the lock system according to the invention. The counterpart 301 of the lock presented in Fig. 3 comprises an aperture 302 for the locking latch 302 of the lock, and means for sending 303 electrical power. The counterpart of the lock is fastenable into the door frame at a point corresponding to the door lock, and wiring to the counterpart of the lock is arranged via the door frame. In the solution according to the invention, the means for receiving 205 and for sending 303 electrical power can be coils. A lock environment is characteristically narrow and high in structure. The electronics used in the solution according to the invention can be disposed inside the lock to some extent more freely than the coils that transfer power - the coils, on the other hand, must be brought close to each other on the front surfaces of the lock and of the counterpart. The coils can be implemented to be planar in structure (planar coils).

Fig. 4 presents a magnification of the bottom part of the lock. The lock of Fig. 4 corresponds in its structure to the lock presented in Fig . 2, but in it a coil 404 used for receiving electrical power is presented.

The width of the magnetic field between the coils is small in the lateral direction. Thus the metal in the environs of the transmitter coil and receiver coil hardly affects the functionality of the power transfer and the resonance circuits at all.

For shielding the other electronics behind the coils from interference and also for directing the magnetic field, a relatively thin, e.g. 1 - 2 mm thick, ferrite sheet can generally be used. Ferrite material is used as a suitable material for shielding from interference. The ferrite sheet that is background material behind the transmitter coil and receiver coil guides the direction of the magnetic field and prevents the field spreading behind a coil, and thus in turn shields the other electronics from interference.

In the solution according to an embodiment of the invention the lock and the counterpart of the lock, as well as the means comprised in them for sending and receiving electrical power, are arranged in the door and in the door frame in such a way that the door can be opened and closed but the transfer of power only succeeds when the door is closed . It is not good for the transfer of electrical power and/or the transfer of information to operate when the door is open because in this case the door would appear to the system, and e.g. to access control systems, to be closed even though it was really open.

In one embodiment of the invention the transfer of electrical power is possible at an operating range of approx. 10 mm. The maximum distance between the frame and the lock when the door is closed is typically approx. 6 mm. Both the transmitter coil and the receiver coil can be shielded with an approx. 2 mm layer, in which case an operating range of approx. 10 mm is sufficient in a lock application.

In the system according to the invention information can also be wirelessly sent between the lock and the counterpart of the lock. The transfer of information can be implemented with the means used for the transfer of electrical power.

The solution according to the invention can be based on electronic keys that enable the opening of a lock. Electronic keys can be stored e.g . in a mobile device, in which case the mobile device functions as a key, and/or in a cloud service, by means of which electronic keys can be administered.

In one embodiment of the invention one electronic key can provide a lock opening right also for a number of locks instead of for one lock, e.g. for a lock group, which comprises all the locks of one building, in which case by creating one key an opening right is given to a number of locks. When the owner of a lock requests with his/her device the creation of an electronic key from the service, he/she can select for which lock or locks he/she wishes to create a key. The lock can also comprise at least one antenna, by means of which the lock can detect an electronic key and the presence, location and/or direction of travel of the device comprising an electronic key. The lock can also comprise e.g. two antennas having radiation lobes directed in essentially different directions in such a way that the radiation lobes of antennas installed on a door are directed at different sides of the door. In this case, by means of the two antennas, the lock can detect whether an electronic key and the device comprising an electronic key is inside or outside the door and whether the electronic key and the device comprising an electronic key is approaching from outside or inside the door.

Fig. 5 presents a lock system according to the invention, which comprises at least one lock and possibly also a server. The owner and administrator of a lock can administer a certain lock or certain locks and the electronic keys connected to them. The owner or administrator of a lock can also receive notifications and alarms from the service. Electronic keys connected to a lock can be sent from the service to the device of a user of the lock. In this way a user can, by means of his/her device, e.g. a mobile device such as a mobile phone, tablet, electronic key or other device, open a lock when the user is in the proximity of the lock. A lock can also send a message to a device comprising an electronic key. A user of a lock has the opportunity of changing the settings associated with the lock via the server and he/she can receive notifications relating to the lock from the server.

In the solution according to the invention the presence of electronic keys in the proximity of a lock is monitored and an electronic key and/or a user profile associated with an electronic key is identified . Based on the identified electronic key and/or user profile associated with an electronic key a predefined procedure is performed . The procedure can be e.g . the controlling of a certain device, apparatus and/or home automation and/or the sending of a message.

In the solution of the invention a lock can send the information it detects, such as information regarding the presence of keys and the state of the lock, to a server and on the basis of information received from the lock procedures can be performed on the server for implementing different services. Information can be collected also by means of possible other sensors and/or devices. The collected information is sent to the server and it can be analyzed on the server, e.g. on a server or servers of a cloud service. In one embodiment of the invention a lock can e.g. send to the server information as to which key and/or which user profile associated with a key was used to open the lock. The server can, on the basis of information received from the lock, perform procedures of the aforementioned type, e.g. send commands to the home automation on the basis of the information received from the lock.

In one embodiment of the invention a lock or a control unit connected to a lock can, on the basis of received information collected by the lock, perform at least some procedures locally without the need for server participation. From the server a message and/or alarm formed on the basis of information received can be sent to a body associated with the lock. The message can be sent e.g. to a body administering electronic keys connected to a lock and/or to a body using a lock and/or to a body responsible for servicing the lock. Control requests of devices and/or the settings of a lock can be sent to a body administering electronic keys connected to a lock and/or to a body using a lock, or a body servicing the lock via a connection formed directly with the lock or via a cloud service. Electrical devices, apparatuses and/or home automation can be controlled via a server, via a lock and/or directly via the device of the administrator or user of a lock.

The procedures to be performed can be set for a certain user profile or for a certain user group, such as e.g. elderly people, children, people who are ill, mentally handicapped people, physically handicapped people and/or prisoners. The procedures to be performed can also be set to be similar for all keys or for all user profiles associated with keys. Both the aforementioned procedures can be in the solution of the invention.

In one embodiment of the invention the system can, for example, comprise a setting for when keys belonging to a user profile and/or to a user group have the right to open a lock. The system can give an alarm or send a messages if a key belonging to a certain user profile and/or user group requests the opening of a lock at a time when the key belonging to the certain user profile and/or user group does not have the right to open the lock. Accord ing to one embod iment of the lock system according to the invention the system can perform various procedu res when it detects that a key is leaving a locked space or arriving in a locked space. One such proced u re can be the send ing of a message to a device in the proximity of the lock, said device containing the electronic key connected to the lock. In one em bod iment of the i nvention when a key arrives in the proximity of a lock, a message a nd/or reminder is sent to the device connected to the key. The reminder ca n be self-generated or another person cou ld have sent the reminder via a cloud service. The message or reminder can be stored d irectly in the lock, i n which case it can be sent d irectly from the lock to the user's device in which is recorded a n electronic key matching the lock. The message or remi nder ca n be stored on a server, in which case it ca n be transmitted from the server to the device of a user when the lock detects the presence of the device of the user and reports this to the server.

The message can be left di rectly in the lock or it can be left in a cloud service e.g . when the device of a user is near a certain lock and the lock reports the presence of the key to the server. One example of leaving a message cou ld be a situation in which a repair person visits a locked space and when exiting leaves the information he/she wants to i n the lock. When the user arrives i n the proximity of the lock, he/she can see the message connected with the lock by the repa ir person .

The system can also send reminders to the users of the system . A reminder can be e.g . a reminder about the du ration and/or type of a user rig ht or it can be about whether a key has been used and/or whether a key has not been used . A lock can remind about a user rig ht, e.g . if someone has been g iven a temporary key, e. g . for wateri ng the flowers. A person who has received a key can receive at defined intervals, in the device in which the electronic key is stored, a reminder that the key shou ld be used . Also a key holder can be sent a message about whether a key has not been used and/or whether a key has been used . Reminders can be sent e.g . via a cloud service.

The user rig hts for domestic electrical devices, sa id rig hts belong ing to a user profile or a certain user g rou p and are associated with a certain key, can e.g . be adjusted via a server of the lock system, e.g . via a server of a cloud service. In this case certain users or users belong ing to a certain user g rou p can have the rig ht to use only certain of the devices inside a locked space. In such a case, for example, if a small schoolchild goes home alone, he/she may not use the cooker for safety reasons, or e.g . use of the Internet can be restricted in a locked space on the basis of the electronic keys present at that time. There can also be d ifferent settings associated with the presence of a certa in user profile or user g rou p for home automation systems, which settings ca n be adjusted via a cloud service.

Devices in a locked space ca n a lso be control led automatica lly, e. g . via home automation, accord ing to whether users and/or electronic keys are coming into the locked space or leaving the locked space.

When i n the lock system accord ing to the invention an electronic key and the device comprising a n electronic key arrive in the proximity of a lock and/or the key is interpreted as moving from outside the locked space into the locked space, other types of procedu res can also be performed . In one embod iment of the invention the system can control on at least one device or apparatus inside a locked space, such as lig hts and/or devices defined in the home automation . In one embod iment of the invention the system can e.g . put the lig hts on automatically at home when it detects a key coming into the locked space. The system can control at least one device or apparatus outside a locked space off when the lock detects a key arriving i n the locked space. When the key moves to inside the locked space and/or the door is opened, the system can extingu ish e.g . the outdoor lig hts or the stairway lig hts. This can be implemented e.g . via a home automation system or bu ild ing automation system to which the lig hting can be connected .

When the key exits the proximity of the lock and/or the key is interpreted as moving from inside the locked space to outside the locked space, d ifferent procedu res ca n also be performed . In one embod iment of the invention the system controls at least one device or apparatus inside a locked space off when the lock detects a key leaving the locked space. The system can control at least one device or appa ratus outside a locked space on when the lock detects a key leavi ng the locked space. The system can e. g . automatically control the lig hts on outdoors and/or on the stairway when the lock detects a key leaving the locked space.

In one embod iment of the invention if no key connected to a lock of a locked space remains inside the locked space, the system can control and switch off electricity automatically from devices, such as from e. g . an oven, coffee-maker, certa in sockets, a washing machine, et cetera . Also, for example, the air cond itioning , heating , sauna, home entertainment electronics can be set to power-saving mode. Power- saving mode can be switched on e.g . accord ing to the length of absence from the locked space. Power-saving mode can be switched to normal use mode when an electronic key arrives back in the locka ble space.

In the system accord ing to the invention functions relating to switching off devices, to switching on devices and/or to home automation can be adjusted via a server and/or a cloud service. By means of a server, certain fu nctions can e.g . be timed or switched on manually, or the settings for automatic switching of fu nctions can be adj usted . It ca n also be possible to receive information about the state of devices i n a locked space via a server and/or a cloud service. By means of the fu nctionality described above, it is possible e.g . to change a fu nction relating to heating , e.g . in a timed manner or manua lly, or to switch e.g . the heating back to normal mode before returning home or to a vacation home. In one embod iment of the invention the lock system comprises a doorbell. The doorbell can be arranged e.g . in the lock or in con nection with the striking plate of a lock. The doorbell can send a message about the ring ing of the doorbell to a lock and/or to the server of the lock system . In the lock system accord ing to the invention the owner of the lock can receive a message e. g . if some rings the doorbell . The embod iment i n question is advantageous if no-one is inside the locked space and therefore cannot come to open the door. The embod iment in question is advantageous also to people inside the locked space e.g . if they are deaf, hard-of-hearing, in poor health or far away from the doorbell.

In one embodiment of the invention monitoring of working time can be implemented by means of the lock system. In this embodiment when an employee holding a certain key travels from a certain door/doors, the arrival time at work and leaving time from work of the employee is ascertained and this information can be recorded in the system and/or in a database. The system can record and save this information on the server and transmit it to a separate service.

In one embodiment of the invention the lock system can monitor the time-dependency and repetitive nature of different observations made by the lock system. In this way behavior profiles can be created for users or spaces. If the observed behavior varies from the behavior observed earlier, an alarm can be sent by means of the differing behavior profile. Such a situation can be e.g. if/when a cleaner does not do his/her usual round but instead moves mainly between the outer door and a high-security space, in which case an alarm/notification about the observed deviation can be created, or e.g. in a situation in which a guard does not leave a space being checked, an alarm can be created so that e.g. a security body can go and check the condition of the guard. Also other procedures can be performed on the basis of information relating to use of the lock. In one embodiment of the invention the state of a certain lock, and also whether there is no key connected to the lock in the proximity of the lock, is detected. In this case a message or alarm can be formed e.g. if a key is not detected in the proximity of the lock when the door is opened. In such a case e.g. in a situation in which a user does not have a key with him/her when leaving his/her home, the lock can report the lack of a key e.g. with a sound notification or visual notification. The lock can be configured in such a way that it does not become locked, so that a user cannot lock himself/herself outside. The function in question can be set on or off e.g. by an action of the user and/or of the body administering the lock. The locks connected to a system and the mobile devices comprising an electronic key can communicate safely via an encrypted connection with a server and/or a cloud service via the Internet. For example, the lock can in this way send its user information in encrypted form to a server. The lock is also aware, via an encrypted connection, of electronic keys connected to it that are administered in a cloud service. The lock can contact the service at certain intervals and can update the list of electronic keys authorized to open the lock. Also the server can notify the lock of changes when they occur such as e.g. when a new key is created or the right of use of an old key is removed or other settings associated with the lock are changed.

In the following the operation of a lock according to one embodiment of the invention is presented in more detail by way of illustration. The lock and lock striking plate of the lock system according to the invention, which are shown in Figs. 1 - 4, can operate as described below in a situation in which the door closes and the lock system detects the closing of the door. When the system detects that the door has closed, the counterpart of the lock starts to wirelessly send electrical power to the lock case and/or into connection with the lock case e.g. with the means that are for sending electrical power. The lock case wirelessly receives electrical power sent from the counterpart of the lock with the means that are for receiving electrical power, when the lock and the counterpart of the lock are at a certain distance from each other. In one embodiment of the invention the sending of power can always be started from a certain initial power level or, alternatively, from the power level used earlier. A certain power level can be set to be suitable for each lock & striking plate pair in conjunction with installation of the lock, or the initial level can be the same for all the locks and it can be set e.g. already at the factory.

In one embodiment of the invention the electrical power received from the connection of the lock, e.g. from the means for receiving electrical power, can further be measured, so that it is known how much electrical power has been received by the lock. Losses occurring during the sending, such as e.g. the distance of the lock and the counterpart of the lock from each other and how well aligned the lock and the counterpart of the lock are, affect the power level received. The power level of the electrical power sent is decreased and/or increased in such a way that the measured level of the electrical power received is between certain predetermined upper and lower values or essentially at a given preset level. In this way enough power from the viewpoint of reliable functioning of the lock is always sent to the lock, but at the same time the transfer of excess power is avoided. In the solution of the invention the lock can communicate the level of electrical power received to the counterpart of the lock, so that the power level can be decreased, increased and/or kept unchanged. The lock can e.g. communicate to the counterpart of the lock the measured electrical power level, voltage and/or current. The lock can e.g. communicate to the counterpart of the lock whether the power level received is too low, too high and/or essentially the magnitude of a certain predetermined level or between certain upper and lower values. That being the case, the counterpart of the lock can adjust the electrical power sent to be suitable on the basis of the information received from the lock. Changing the power level that is sent can be performed in steps or otherwise the lock can try to determine the power level needed on the basis of one measurement result. When the power level received has reached a determined target level, the adjustment of the power level can be ended until the door is opened and the electricity supply is disconnected, or until information is received from the lock that the power level received is no longer within the defined range. Information about the power level sent and received can also be sent to a server and/or the power levels can be changed on the basis of commands given by the server.

In the following the operation of a solution according to one embodiment of the invention will be presented in a situation in which electricity supply to the lock has been started. In this case when it is desired to open the lock, the access control system or some other access control device sends a command to the counterpart of the door lock about opening the door lock after the power supply has started. Before sending a command over a wireless interface, the command is encrypted. The command can be encrypted in the counterpart of the lock or already previously, e.g. in the access control system. After encryption, the counterpart of the door sends a message to the door lock, utilizing the components to be used in the transfer of electrical power. When the door lock receives the message, the encryption is decrypted and the content of the message interpreted. After this, the lock executes the command, in other words e.g. opens the lock, locks the lock, or sends the status information of the lock to the counterpart of the lock.

If the lock wants to send a message to the counterpart of the lock, the system functions in such a way that the door lock encrypts the message (e.g. its status information) and sends it utilizing the components used for receiving electrical power. Correspondingly, the counterpart of the lock receives the message and sends it onwards. When the encryption of the message is decrypted, the content of the message can be read. The encryption of a message can be decrypted e.g. in the counterpart of the lock or not until the final receiving destination e.g. in the access control system.

For practical reasons, e.g. in a situation in which a damaged lock is replaced with a new lock, the identifier and encryption key of the new lock to be installed can be set in connection with the installation. For permitting the changing of the identifier, the authentication method described above can be used between the lock and/or the counterpart of the lock and the replacement tool.

The lock system according to the invention can function at the start of the lock and the counterpart of the lock forming contact e.g. in the manner described in the following. When the door is open, there is no data link between the lock and the counterpart of the lock. The counterpart of the lock occasionally switches power to the lock so that the electronics of the lock would wake up when the door is closed fully and the transfer of power succeeds. When closing the door fully, the distance of the counterpart of the lock and the lock from each other is such that the transfer of power can be started. In this case the electronics of the lock activates as a consequence of the connection of power and the software of the lock starts up and begins to receive electrical power. The power to be sent can be adjusted e.g. in this phase to a predefined level or to within predefined limits. When the connection transferring electrical power has been formed, the lock and the cou nterpart of the lock can create a data link between the lock and the cou nterpa rt of the lock. For creating the data link, the lock and the cou nterpart of the lock authenticate each other. After authentication the cou nterpart of the lock sends an encrypted control command and the command is sent via the mea ns of the counterpart of the lock that are for send ing electrical power, over the wireless interface, to the lock via the devices of the lock that are for receiving electrical power. After this the lock decrypts and interprets the control command and executes the control command . In one embod iment of the invention the level of power to be sent is adjusted only after authentication .

The lock ca n send e. g . its status information in encrypted format to the counterpart of the lock. In this case the cou nterpart of the lock receives, by the aid of the means send ing electrical power, the status information sent by the lock, which status information the lock sends by the aid of the means receiving electrical power. After receiving, the counterpart of the door decrypts and interprets the status information . The counterpart of the lock can tra nsmit the status information onwards, e.g . to the access control . Information can also be sent i n encrypted format to the access control or i n encrypted format to some other correspond ing system or u nit, where the encryption is then decrypted .

When the door is opened , the transfer of electrica l power and data l in k between the lock and the cou nterpart of the lock are disconnected . When the door is closed again, the aforementioned proced ures a re performed aga in from the beg inning . After closing of the door, the status of the lock can be set to a status correspond ing to the opening of the door or to a new control command received .

The lock can be without cu rrent when the door is open because in this case there is no need to control it. The lock fu nctions in this case as a mecha nical lock. By means of the solution of the invention it can be deduced that the door is open when the transfer of power and/or the transfer of information cannot be performed and that it is closed when power tra nsfer and/or information transfer is possible and/or i n progress. In addition to this, in one embodiment of the invention the closed state and locked state of the door can be determined even more precisely when the lock and the counterpart of the lock are close to each other even though the door is not fully closed or locked. This situation can be detected by the power transfer means, e.g. by comparing the power sent and the power received, such that power reception is possible but the power level received is low. This kind of situation is when the door is still slightly ajar and the lock and the counterpart of the lock are not fully face to face. In one embodiment of the invention when it is detected that the door is almost, but not quite, closed, i.e. when the lock and the counterpart of the lock are close but not exactly face to face, the door can be tightened closed by means of the lock or other means, e.g. by controlling the latch tightening the lock to tighten the door closed. In one embodiment of the invention the lock and/or the counterpart of the lock can have a separate identification for the purpose of locking the lock.

In one embodiment of the invention information can be collected about the development of the power level received by the lock and if changes occur in the power received and/or in the ratio of power received with respect to the power level of the power sent, it can be deduced, e.g. on the server, that the door, in which the lock system is installed, is damaged or worn, or that there is some other defect in the door that prevents it from closing properly.

In one embodiment of the invention, the lock can have a battery, which keeps the electrical components of the lock on when the power transfer is disconnected. By means of the solution according to the invention it is also possible to wirelessly transfer information between the lock and the counterpart of the lock. The information transfer is digital and authentication methods and/or encryption methods are used in the lock application to ensure data security.

By means of encryption and authentication it is ensured that the lock reacts only to commands transmitted by an identified (acting as the correct pair) counterpart. An unauthorized device that does not know the encryption key used cannot create or send to the lock a control message in an acceptable format and therefore ca nnot mislead the lock into the incorrect operating mode. The counterpart of the lock accepts and transmits onwards only the status information it receives from a n identified lock (acting as the correct pa ir) . An u nauthorized device that does not know the encryption key used cannot send status information in an acceptable format and therefore cannot mislead the access control system . The encryption key used is not sent at any stage to another device. The encryption key used is kept in the device in such a way that it wou ld not be economically reasonable to uncover it.

The a im of authentication is therefore to ensu re that the devices communicating with each other recog nize one another. In this way, a fraudu lent device cannot control one of the devices. Li kewise the transmission of information to a fraudu lent device is prevented . Authentication ca n be performed before permitting use of the service.

Authentication can be one-way (server identifies user) or two-way (the service identifies user, a nd the user the service) .

In the solution accord ing to the invention the lock ensures, by means of authentication, before implementing a control, that that the control command comes from an identified device (from an identified counterpart of the lock) . By checking the identity of the counterpart of the lock, the lock ensu res that the device of an u nauthorized person (intruder) cannot control the operation of the lock.

The cou nterpart of the lock ensures, by means of authentication, before transmission to the bu ild ing automation of the status i nformation received from a lock, that the status i nformation orig i nates from an identified device (from an identified lock) . In this way the counterpart of the lock ensu res that incorrect status information delivered by the device of an u nauthorized person (intruder) does not travel onwards a nd endanger the safety of the locking .

After successfu l authentication, information, which is encrypted, can be transferred between the lock and the counterpart of the lock. Va rious encryption technolog ies used in telecommu nications or in computers can be used as encryption methods for encrypting the messages of the information transfer. Encryption means the converting of the plain text information to be encrypted into a type of format that makes clarification of the original information either impossible or too expensive (i.e. breaking the encryption takes too much time or resources compared to the value of the encrypted information).

The handling of encrypted information is generally two-directional: the information to be encrypted can be converted into an unreadable format for encrypting the information and correspondingly the encrypted information can be returned back to the original format for utilizing it. Examples of algorithms to be used for the encryption of the information are, inter alia, DES, AES and Blowfish. In the solution according to one embodiment of the invention the data transfer speed between the lock and the counterpart of the lock is approx. 1 kBit/s. This transfer speed is sufficient for the solution according to the invention, because the amount of information to be transferred between the counterpart of the lock and the lock is small despite the authentication and encryption protocols.

In one embodiment of the invention, the means for sending electrical power are separate and the means that can be installed in connection with the counterpart of the lock and/or the means for receiving electrical power are separate and the means that can be installed in connection with the lock.

In one embodiment of the invention, the means for receiving electrical power are arranged in the lock case and/or the means for sending electrical power are arranged in the counterpart of the lock.

In one embodiment of the invention, the lock and the counterpart of the lock comprise means for encrypting and decrypting the information to be transmitted.

In one embodiment of the invention when a mobile device is in the proximity of the lock it forms an encrypted connection with the lock. The connection can be formed e.g. by means of some short-range technology such as by means of Bluetooth technology or by means of WLAN . After this the mobile device requests opening of the lock by means of the encrypted electronic key. The lock receives the encrypted key and decrypts the encryption . After this the lock, e.g . the lock case or its striking plate, compares the information contained i n the electronic key to the information it received about electronic keys from the service. The lock opens the locking if the information of these two electronic keys corresponds. The lock ca n record an opening event i n a cloud service for monitoring the operation and use of the lock. An opening event is recorded i n a database on the basis of the electronic key and/or on the basis of data associated with the identifier of the lock. Opening events, the number of them and/or the numbers of keys created can be recorded i n the database and reports can be formed by mea ns of these. The aforementioned data recorded i n the database can also be used as the basis for invoicing a customer.

In one embod iment of the invention a lock can be opened with a mobile device also when the mobile device is not in the proximity of the lock. In this case other means of contact are used for commu nications between the lock and the mobile device.

In one embod iment of the invention the system comprises a camera, which is arranged e.g . in the proximity of the lock inside a nd/or outside the locked space. In one embod iment of the invention movement ca n be detected by means of the camera . If the camera detects movement, an ala rm can be formed and/or a message can be sent. In one embod iment of the invention an alarm can be formed and/or a message can be sent if movement is detected and the lock is in the locked state. In one embod iment of the invention a user can be identified by means of the camera, e. g . by means of face recog nition, by means of iris recog nition, a nd after recog nition the lock ca n open. In this case the procedu res accord ing to the invention that are specific to each user profile can be performed without the presence and/or identification of an electronic key. In this case, therefore, it is sufficient that the system detects the arrival of a user, identifies the user and his/her user profile and/or his/her user profi le associated with an electronic key, and performs a predefined proced ure on the basis of the identified user profile and/or on the basis of the user profile associated with an electronic key.

In one embod iment of the invention the system comprises a motion sensor or movement detector, which is arranged e.g . in connection with the lock inside and/or outside the locked space. If the motion sensor detects movement, an ala rm can be formed and/or a message can be sent. In one embod iment of the invention an alarm can be formed and/or a message can be sent if movement is detected and the lock is in the locked state.

In one embod iment of the invention the data traffic between the lock and a server ca n be arra nged to travel via the means for the wi reless transfer of power, e.g . i n the manner described earlier i n this application . In this case e.g . the cou nterpart of the lock can be connected to a wirel ine or wi reless telecommu nications network and the data traffic going to the door lock is arranged to travel via the counterpart of the lock. It is obvious to the person skilled i n the art that the d ifferent embod iments of the invention are not limited solely to the examples described above, and that they may therefore be varied within the scope of the claims presented below. The characteristic features possibly presented i n the description in conju nction with other cha racteristic features can also, if necessary, be used sepa rately to each other.