Movatterモバイル変換


[0]ホーム

URL:


EP2833330B1 - Communication method and system - Google Patents

Communication method and system
Download PDF

Info

Publication number
EP2833330B1
EP2833330B1EP14179202.8AEP14179202AEP2833330B1EP 2833330 B1EP2833330 B1EP 2833330B1EP 14179202 AEP14179202 AEP 14179202AEP 2833330 B1EP2833330 B1EP 2833330B1
Authority
EP
European Patent Office
Prior art keywords
mobile
communication
communication device
identifier
range wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP14179202.8A
Other languages
German (de)
French (fr)
Other versions
EP2833330A1 (en
Inventor
Adam Stroud
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Paxton Access Ltd
Original Assignee
Paxton Access Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filedlitigationCriticalhttps://patents.darts-ip.com/?family=51228377&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP2833330(B1)"Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from GB1313586.8Aexternal-prioritypatent/GB2516686B/en
Application filed by Paxton Access LtdfiledCriticalPaxton Access Ltd
Publication of EP2833330A1publicationCriticalpatent/EP2833330A1/en
Application grantedgrantedCritical
Publication of EP2833330B1publicationCriticalpatent/EP2833330B1/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Description

  • The present invention relates to methods and systems for implementing or managing control or access functions, particularly via short range wireless communication with a local device or system associated with a control or access function.
  • The use of wireless communication systems is widespread and such systems have many applications, including but not limited to tracking, identification or tagging, access control, payment, etc. Secure access systems are widely used to ensure only authorised personnel are permitted entry to a building or area, allowing an employee to enter their office but not an unauthorised person, for example. Authentication is typically achieved by use of a short range wireless communications module such as an RFID (Radio Frequency Identification) tag being presented at close range to a reader located near an entry point to a secure area. The reader, or associated local control unit, may contain the necessary information to authenticate the tag or, in many cases, will be connected to a central authentication unit, and if the person is authorised to enter the secure area, the associated door will be unlocked or opened.
  • Secure access systems commonly have more than one entry point, thus requiring a number of readers. If the authentication information is stored in the reader, or associated local control unit, as a result a system having multiple readers can be expensive and requires each reader to be updated separately with any new or changed information. Alternatively, if the readers communicate with a central authentication unit, significant costs and effort are required to install the wires or cables required to connect each reader to the central unit. In any event, the installation of the readers requires each reader to be provided with a power connection irrespective of whether a data communication connection is required so the installation of such systems is expensive and not straightforward.
  • EP-A1-2192560 describes method and apparatus for controlling access to a restricted area containing machinery.
  • US-A1-2006/0170533 describes a system and method for controlling networked wireless locks in which a server receives from a lock identification and a user identification from a mobile device.
  • EP-B1-196559581 describes a method and system for controlling access granted by a security device.
  • WO-A1-2004/034334 describes an access control system for doors.
  • DE-A1-10246668 describes an access control system with a reader for identifying a person and a radio transceiver, which transmits data to a central radio transceiver.
  • The present invention seeks to provide systems and methods for implementing or managing control or access functions that are convenient for the user and that are simple to install, modify and update. The present invention also seeks to provide versatile and adaptable systems that are capable of many different functions.
  • Aspects of the invention are set out in the independent claim and preferred features are set out in the dependent claims.
  • There is described herein a communication device having a low-power mode and a higher-power mode for implementing a control or access function, comprising: a short range wireless communication interface; a long range wireless communication interface; a local identifier stored therein; wherein in the low-power mode the communication device is operable to receive a mobile identifier from a mobile device over the short range wireless communication interface and upon receiving the mobile identifier the higher-power mode is enabled; in the higher-power mode the communication device is operable to communicate over the long range wireless communication interface with a remote device having a controller; wherein the communication device is configured to send the local identifier and the received mobile identifier to the remote device; and wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the local identifier and the mobile identifier.
  • There is described herein a communication device that can be used as an access or control device. For example the communication device can be used as an access control reader that can be provided beside an access-controlled door or other device to be controlled. To conserve power, the communication device is provided with two power modes: a low power mode, for example the BLE "Whisper Mode", enabling short range communications; and a higher- or normal-power mode enabling longer-range communications. The communication device can communicate both with a mobile device (via Bluetooth Low Energy (BLE) operating in a low-power "Whisper Mode") and with a remote device via a long range wireless communication (via Bluetooth Low Energy (BLE) connection operating in a higher-power or normal-power mode). While waiting for a mobile device to
    move into range and transmit a mobile identifier to the communication device, the communication device can conserve power by not operating in a higher- or normal-power mode constantly or for long periods of time. When a mobile identifier is received, the communication device engages the higher- or normal-power mode to enable the long range wireless communications required to communicate with the remote device. This provides a communication device that can use available power sources or a battery due to low-power consumption requirements and no requirement for a wired connection to a data infrastructure as it communicates wirelessly, making it suitable for locations to which it would be uneconomic or difficult to provide data cabling and/or power cabling. This is advantageous because each communication device can be placed in the location that is most suited to its purpose and there is a reduced constraint imposed on locating devices due to wiring requirements.
  • There is also described herein a method of implementing a control or access function in a communication device having a low-power mode and a higher-power mode comprising the steps of: receiving at the communication device while the communication device is operating in a low-power mode a short range wireless communication from a mobile device, the short range wireless communication comprising at least a mobile identifier associated with the mobile device; enabling a higher-power mode of the communication device on receipt of the mobile identifier; transmitting from the communication device a long range wireless communication to a remote device while the communication device is operating in a normal-power mode, the long range wireless communication comprising at least the mobile identifier and a local identifier associated with the communication device; wherein the remote device is operable to receive and process the long range wireless communication in order to perform at least one control or access action based on the information obtained from processing of the long range wireless communication.
  • Preferably, the short range wireless communication interface and the long range wireless communication interface of the communication device are comprised of one and the same communication interface, preferably operating in different modes. The use of a single communication interface by the communication device reduces device hardware complexity and power usage as only one transceiver and antenna can be used to perform both short and long range communications using different modes.
  • Preferably, the communication device returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device to the remote device via the long range communication interface. By returning to a low-power mode after transmitting the identifiers, the communication device can reduce or minimise power consumption.
  • Preferably, the communication device is operable to communicate substantially within a range of approximately 30cm in the low-power mode. When operating in a low-power mode, thus reducing or minimising power consumption, the range of communication using a wireless communication interface is restricted. As a result of the range of the communication being restricted, the communication device will operate to detect only mobile devices within a short range of approximately 30cm. This limited
    range is useful for verifying that the mobile device as it is only possible to communicate
    with a mobile device that is definitely near the communication device, i.e. within 30cm of the communication device. This also reduces the likelihood that, when a mobile device is detected, a user intends to present to the mobile device to the communication device to trigger an access or control function.
  • Preferably, the communication device is operable to communicate substantially within a range of 30m in the higher-power mode. When operating in higher-power or normal-power mode, the communication device needs to be able to communicate with a remote device usually not located in the vicinity of the communication device but usually located within a range of 30m of the communication device. Alternatively, there may be provided one or more intermediate nodes using the long-range communication protocol enabling the communication device and remote device to communicate via the intermediate nodes.
  • Preferably, the communication device further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device. Some systems are likely to operate a hybrid arrangement where existing identification tokens are still used by one or more users and thus the communication device can support both legacy active or passive identification tokens using the second short range communication interface and also user mobile devices using the (first) short range communications interface.
  • Preferably, the second short range wireless communication interface is NFC. NFC provides a protocol that allows the use of passive tokens by users and is supported by most manufacturers of such tokens.
  • Preferably, the communication device further comprises a battery and the communication device is powered by the battery. Further preferably, the battery is a coin battery. The communication device is designed to reduce or minimise power consumption and due to this reduced or minimised power the use of a battery, preferably a coin battery, is possible to provide power to the device for a useful amount of time without requiring the battery to be regularly replaced or charged.
  • The communication device further comprises a proximity sensor configured to activate the low-power mode of the communication device and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device. Through the use of a proximity sensor, the communication device can operate with no power being provided to the communications interfaces until the proximity sensor detects that a user is nearby the communication device. In a non-claimed alternative, the communication device can further comprise a proximity sensor configured to trigger the communication device to request a mobile identifier from the mobile device via the short range wireless communications interface and wherein the proximity sensor is operable to detect any or all of: the movement of a hand in the vicinity of the communication device; the mobile device in the vicinity of the communication device; or a change in capacitance in the vicinity of the communication device. Through the use of a proximity sensor, the communication device can only accept receipt of mobile identifiers in response to a request sent in response to the proximity sensor verifying that the user or mobile device is near the communication device and that the user is performing an action such as waving a hand or a mobile device near the communication device that indicates that the user is requesting an access or control function to be performed by the communication device. In this alternative, the proximity sensor can also power up one or both communication interfaces as well.
  • Preferably, the communication device begins communications with the mobile device over the short range wireless communication interface by requesting the mobile identifier from the mobile device. By requesting the mobile identifier from the mobile device, the mobile device can confirm that it is near the communication device thus removing the need to broadcast or otherwise determine when to communicate the mobile identifier.
  • Preferably, the mobile identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier. The use of an existing identifier such as a MAC address or a Bluetooth MAC address for example enables the re-use of an integral and unique feature of a mobile device while the use of a dedicated identifier or QR code allows a user to store such an identifier on their mobile device to add the functionality required for the access or control system.
  • Preferably, the communication device also receives a unique identifier in addition to the mobile identifier from the mobile device and sends the received unique identifier to the remote device using the long range wireless communication interface along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier. It may be necessary to send both a mobile identifier and a unique identifier from a mobile device to the communication device, for instance the user can have an identifier associated with that user while the mobile device can have an identifier associated with that mobile device enabling both the user to be verified and the mobile device to be verified. Alternatively, the user may have two identifiers associated with them, for instance a personal identifier and a team identifier or the mobile device may have two identifiers associated with it to verify an identifier associated with the mobile device hardware as well as a software provided identifier. The use of a unique identifier allows more flexibility in verification of the combination of user, mobile device and communication device for access or control purposes.
  • Preferably, the controller of the remote device is further configured to request the mobile device to make a connection using a third long range protocol to verify that the mobile device is within the proximity of the communication device, preferably requesting location data from the mobile device to be transmitted to the remote device wherein the location data can be a GPS location. As a further verification that the user's mobile device is in the proximity of the communication device, a direct connection can be established with the mobile device by the remote device to verify that the mobile device is near the communication device, preferably using GPS location data to verify the mobile device location. Preferably the location of the communication device is predetermined and stored by the remote device in order to enable the remote device to assess whether the location data provided by the mobile device is within a predetermined range of the communication device, preferably further taking into account a tolerance for incorrect location data reporting. As an alternative, the mobile device and remote device can communicate indirectly via the communication device.
  • Preferably, the third long range protocol is Wi-Fi. As Wi-Fi networks are extremely common in most situations where an access or control system is installed, for example an office or factory, the use of an existing Wi-Fi network to which a mobile device may be connected enables an alternative path to connect the remote device directly to the mobile device to perform verification or data exchange as required for the access or control system.
  • Preferably, the communication device has a medium-power mode that is used to communicate with the mobile device over the short range wireless communication interface when the communication device receives the mobile identifier from the mobile device. Where a medium-power mode is used, the range of the communication interface is usually increased in comparison to the range possible in a low-power mode, thus use of a medium-power mode can enable either faster or more efficient or longer range communication between a mobile device and a communication device.
  • Preferably, the controller of the remote device is operable to send a security query to the mobile device, the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device or via the communication device, any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation. Where further verification of a user is required, to ensure that an unauthorised user is not simply using an authorised device to gain access or control in place of an authorised user, the remote device can communicate either directly or indirectly with the mobile device to perform a further verification step such as requiring the user to correctly answer a security query.
  • Preferably, the system comprises: a communication device; one or more mobile devices; the remote device comprising a long range wireless communication interface and a controller; wherein the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the communication device. The system can support more than one mobile device, each associated either with a specific user or group of users or a pool of mobile devices to be used by a group of users or single user.
  • Preferably, the mobile device comprises a mobile communications device, preferably a smartphone, tablet or the like. The use of existing user hardware such as smartphones or tablets means that dedicated identity tokens are not required for each user and a more flexible solution is possible.
  • Preferably, the short range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) whisper mode interface and the mobile device is preferably a BLE-enabled smartphone. The use of the BLE protocol allows the communication device to operate efficiently in terms of power use and provides a well-supported communication means that many mobile devices support, enabling the access or control system to be supported using existing mobile devices.
  • Preferably, the long range wireless communication interface of the communication device comprises a Bluetooth Low Energy (BLE) interface and the remote device is preferably BLE-enabled. The use of the BLE protocol allows the communication device to operate efficiently in terms of power use and provides a communication means that has sufficient range to enable communication between a remote device and communication device.
  • There is also described herein a system for implementing a control or access function, the system comprising a mobile device having a mobile identifier stored therein and comprising a short range communication interface and a long range communication interface, a local device having a local identifier stored therein, and a remote device comprising a long range communication interface and a controller, wherein the mobile device is configured for short range communication with the local device for receiving the local identifier, the remote device is configured for long range communication with the mobile device for receiving a communication comprising at least the local identifier and the mobile identifier, and the controller of the remote device is configured to perform at least one control or access action in response to receiving the communication from the mobile device.
  • There is also described herein a system in which a mobile device communicates both with a local device via short range wireless communication and with a remote device via a long range communication. Therefore the remote device does not need to communicate with the local device directly, which is advantageous because it then follows that the local device does not require the significant amount of power that would otherwise be needed for long range communication directly with the remote device. The mobile device has its own mobile identifier and is provided with a local identifier that identifies the local device, both of which the mobile device can transmit to a remote device and the remote device is therefore provided with enough information so that an appropriate control or access action can be performed, the action being relevant to the local device that has been identified via the mobile device. Advantageously, wires or cables are not required to connect each local device to the remote device or the mobile device. Therefore this aspect provides a system that is simple to install and cost effective yet is reliable and enables local control and access to be implemented from a remote location.
  • In all aspects, the local device, mobile device or communication device may be provided with additional wireless communication capabilities in order to support any suitable legacy device that is capable of storing an identifier and that is responsive to short range communication. For example, the local device may be an active device, such as an active token, that comprises an internal power source for powering short range transmission of at least the local identifier to another device. The power source may, for example, be an external power supply or a low power internal battery. Alternatively, for example, the local device may be passive and therefore requires no internal power source. For example the local device may comprise a passive token. Examples of suitable passive tokens are MIFARE tokens, such as the MIFARE UltraLight range of tokens. Passive tokens can be small and lightweight and inexpensive to manufacture, enabling a number of tokens to be installed in an area without significant expense. Furthermore with no power source required, the tokens can easily be installed simply by affixing the token (with adhesive or mechanical fixing means for example) to a suitable location or object with no wiring required and the token does not need to be removable to enable an internal battery to be replaced. This is advantageous because each token can be placed securely in the location that is most suited to its purpose and there is no constraint due to wiring requirements or the need to have the token be removable that might otherwise cause the token to be located in a less than ideal location. Passive tokens are powered by interaction with another device, for example with the mobile device inductively coupling or otherwise providing power to the passive token to enable the token to release information.
  • In the alternative aspect, the local devicehas an identifier stored therein. The identifier comprises information of any type that identifies either the specific device (i.e. the local identifier is unique to that token) or may identify a group or set of devices. For example the local identifier is a passive token and may identify the token as being one of a set of tokens that are associated with one or more common systems, or groups of users, as discussed further below. The mobile device may be configured to provide power to the local device when the mobile device is brought into contact or into close proximity with the local device, to enable the local device to release the local identifier to the mobile device. In other aspects, the communication device has an identifier stored therein and in this and other aspects the mobile device can, alternatively or additionally, have an identifier stored therein.
  • The mobile device comprises any suitable device which can be transported to different locations so that it can communicate via short range wireless transmissions with other devices with which the mobile device comes into range. The mobile device can be a dedicated device such as an RFID card equipped additionally with a long range communication interface. The mobile device can, for example, be an active token provided with a short range interface and a long range interface and a power supply, such as a coin cell battery or the like. Alternatively the mobile device may be an existing device, e.g. a computer, such as a laptop or other portable device, or may be a personal digital organiser (PDA), or a tablet device or a mobile phone, such as a smartphone. Therefore the user of the mobile device does not require a separate or dedicated device to be able to control or access functions of a system and instead can use their existing mobile device.
  • In the aspects above, the mobile device can comprise a short range communication interface which may comprise any suitable short range interface such as, for example, a Bluetooth Low Energy (BLE) interface when operating in a low-power "Whisper Mode", a near field communications (NFC) interface or any other short range, radio frequency (RF) interface such as an RFID interface. The mobile device may be a BLE-enabled or an NFC-enabled smartphone. The conventional way of adopting NFC is by way of the phone emulating a token or credential. For such conventional systems to be secure, the mobile phone, its SIM card, or both, must have a secure element against which secure data can be verified. In addition, a trusted service provider (TSP) must perform online verification of the NFC. Compatibility issues with phone manufacturers and SIM card providers makes such systems difficult and complex to implement whereas the present system is advantageous because it enables compatibility with any NFC-enabled phone without the above complications present with emulating a token or credential.
  • The mobile device comprises a long range communication interface which may comprise any suitable long range interface such as, for example, a Bluetooth (e.g. Bluetooth or Bluetooth LE) interface, or a Wi-Fi interface, etc. The mobile device may be a Bluetooth-enabled smartphone.
  • References throughout the specification to "short range" and "long range" communications, interfaces, etc., are intended to distinguish between localised communication and communication with another device that is remote from the local device. In particular, short range communication is intended to describe systems which
    require either contact between the two communicating devices or at least for the interfaces of the two communicating devices to be in close proximity with each other, i.e. to be separated from each other by no more than about 0.3m, preferably by no more than about 0.2m or preferably by no more than about 0.1m. As discussed above, NFC, Bluetooth Low Energy (BLE) when operating in a low-power "Whisper Mode" and RFID communications are considered to be short range communications. Long range communication is intended to describe systems which typically do not require contact between the two communicating devices nor for the interfaces of the two communicating devices to be in close proximity with each other. Long range communications are communications that typically occur over a distance of one or more metres, such as over about 1m or preferably over a range of about 0.5 to 500m, preferably over a range of about 1 to 200m, preferably over a range of about 10 to 100m. As discussed above, Bluetooth, Bluetooth Low Energy (BLE) when operating in a normal-power mode (i.e not operating in a low-power "Whisper Mode") and Wi-Fi communications are considered to be long range communications, as are communications over the mobile/cellular/3G/4G/mobile broadband, etc., networks.
  • The remote device can be any suitable device which can receive long range wireless communications from a mobile device or communication device and that can control one or more control or access functions of a system. For example, the remote device may comprise a wireless router or access point that may also be connected either wirelessly and/or via wired connections to one or more devices, appliances, systems, etc. The devices, appliances, systems, etc., which the remote device controls may be related by one or more common features. For example, the devices, appliances, systems, etc., may all be located in the same or in related areas of, for example, a building, e.g. inside an office or an office floor plate of a business premises. In such an example, the systems may comprise the building/office access systems (e.g. controlling the door locking mechanisms), the lighting systems, the communications systems, the heating and/or cooling systems, etc. The devices or appliances may comprise power sockets, lighting units, heating units, computers or other IT equipment, audio and/or video equipment, etc. Thus the remote device can advantageously control any one or more of the electronic devices, appliances and systems in an office (or indeed any other) environment in response to receiving a long range communication from a mobile device or communication device that is located in the environment.
  • The above examples are particularly advantageous when combined with passive tokens as discussed above or with the communication devices described herein. For example, in an office environment as described above, a token or communication device can be located (e.g. adhered or otherwise affixed) where a light switch would typically be located. A user entering the office can place their smartphone in close proximity to the token or communication device in order to control the lighting system via the remote device to switch on the lights. More than one token or communication device may be located about the office environment to enable the lighting system to be operated from a number of different locations. Advantageously, tokens or communication devices can additionally or alternatively be placed in locations where a light switch may not normally be located (typically due to wiring/cost constraints), such as on a wall next to where an office user sits when at their desk. Tokens or communication devices can also be used to enable the user to gain access to the office environment. For example, a token or communication device can be affixed near to any door that permits access to the environment. A user wishing to enter the office can place their smartphone in close proximity to the token or communication device in order to control the locking mechanism of the door, causing the door at least to be unlocked and also may be opened by the remote device. Any other appliances, systems, devices, etc., in the office can also likewise be controlled by appropriate placement of a token or communication device nearby or on the item and a controlling connection with the remote device. Further examples of such applications are discussed in detail below wherein the token or communication devices can be interchanged or combined.
  • The remote device receives a long range communication from a mobile device or communication device and performs an access or control function accordingly, as discussed above. In some instances, however, it may be desirable for the remote device to perform another control or access action. The controller of the remote device therefore may be configured to perform at least one further control or access action in the absence of the remote device receiving a further communication from the mobile device or communication device, for example in the absence of the remote device receiving a further communication from the mobile device or communication device within a time period. This is advantageous in that if, for example, the user leaves the area where the local device or communication device is located without deactivating the system which the remote device has switched on, then the remote device further controls the system to switch it off again, even without a specific command.
  • In the example of an office environment in which one or more tokens is located to enable activation of a lighting system via a mobile device, then if the user leaves the office, the remote device can switch off the lights even without the user bringing their mobile device within short range of a token. The token can be a local device or a communication device. Switching off the lights could be done automatically, for example, after an elapsed time period. Alternatively, after an elapsed period of time the remote device could send a long range communication to the mobile device or communication device and in the absence of a response from the device (thus indicating that the user is no longer in the environment), the remote device can then deactivate the system (e.g. switch off the lights).
  • Alternatively or additionally, the remote device can determine whether to perform a further control or access action in response to a different communication from the mobile device or one or more communication devices. For example, if the mobile device or a communication device sends a communication to the remote device to switch on the lighting system, but then the remote device receives a further communication from the mobile device or from the same or another communication to operate the door locking mechanism, the remote device can also operate the lighting system to switch off the lights as operation of the door locking mechanism suggests that the user is leaving the environment. Many different combinations of communications from the mobile device and/or communication device are possible and can inform the remote device of the user's activity and requirements even without the user needing to present their mobile device to a particular local device or communication device.
  • The controller of the remote device can be configured to perform at least one control or access action in response to receiving the communication from the mobile device or communication and can do so in any suitable manner. The controller of the remote device may transmit a control signal to control at least one device or system located in the vicinity of the local device or communication device, and/or may transmit, via the long range wireless communication interface of the remote device, at least one of information and a command to the mobile device. The controller may store information related to the mobile device and/or the local device or communication device in a memory of the remote device. When the remote device transmits a long range communication comprising information and/or a command to the mobile device, this may cause information to be displayed on the mobile device and/or may require a user to input information into the mobile device. For example for implementing an access function to enable a person to enter an office environment, the user places their mobile device in the vicinity of the token located near the door as discussed above. In response to the long range wireless communication from the mobile device or communication device, the remote device transmits back a long range wireless communication causing an image to be displayed on the mobile device. The user is required to interact with the display (e.g. to touch certain parts of the display to authenticate their request for access) and in response a further long range wireless communication is transmitted to the remote device, which can then control operation of the access function to enable the user to enter the environment if they are entitled to do so.
  • As stated above, the controller of the remote device can be configured to perform at least one control or access action in response to receiving the communication from the mobile device. However, although the controller of the remote device can be configured to perform at least one control or access action, it may be that no control or access action is necessary in some scenarios and thus no control or access action is actually performed. For example, if an unrecognised mobile device is brought within range of the local device or communication device and if the remote device receives a communication comprising the local identifier and/or a mobile identifier, it may be determined that the mobile device is unrecognised and that no control or access action should be performed. In another scenario, the local device may be unrecognised, for example if a mobile device is brought within range of a local device that is part of another system. If the remote device receives a communication comprising the local identifier and a mobile identifier, it may be determined that the local device is unrecognised and that no control or access action should be performed.
  • As discussed above, the controller of the remote device may be configured to transmit a control signal to a device or system in the vicinity of the local device or communication device to switch on and/or to switch off the device or system. The device or system in the vicinity of the local device or communication device may comprise at least one of a locking mechanism for a door, the door preventing access to at least one area when locked by the locking mechanism, a lighting system for lighting the area in which the local device or communication device is located, a heating and/or cooling system for heating and/or cooling the environment in the vicinity of the local device or communication device, at least one power source for enabling power to be provided to devices and systems located in the vicinity of the local device or communication device, a communications device or system for enabling two-way communication with at least one remote communications device or system, an audio and/or video device or system for providing audio and/or video output to the area in the vicinity of the local device or communication device, and any other powered device or system located in the vicinity of the local device or communication device. Thus a remote device is provided that is ideally suited to controlling an environment such as an office or the like.
  • In the alternative aspect, the local identifier that is released to the mobile device may be encrypted for enhanced security. However for some local devices, particularly for passive tokens, the identifier is simply released in response to a short range wireless communication and is not encrypted by the local device for transmission. For short range local devices such as passive tokens, this is not much of a security risk because any other device that wanted to intercept the identifier would need to be within the short range of the local device (typically within about 10cm of the device, e.g.), which would likely be apparent to the genuine user. Nevertheless, the mobile device subsequently transmits the local identifier (and indeed its own mobile identifier) over a long range wireless communication to the remote device, which may be more susceptible to interception. Therefore the mobile device may further comprise a processor configured for processing the local identifier received from a local device such that the communication transmitted to the remote device comprises the processed local identifier. The processor may be configured for encrypting the local identifier. Therefore even if the local identifier received by the mobile device is unencrypted, the mobile device can encrypt the information before transmitting it for reception by the remote device, protecting the more risky transmission over the longer range. In other aspects, one or more of the communications and/or identifiers may be encrypted in a similar manner.
  • As discussed above, systems in accordance with the present invention advantageously provide the means to implement a control or access function at a communication device using the communication device to transmit the necessary communications via its short range and long range interfaces. From a further non-claimed aspect, there is provided a method of implementing a control or access function comprising receiving at a mobile device a short range communication from a local device having a local identifier stored in a memory thereof, the short range wireless communication comprising at least the local identifier, transmitting from the mobile device a long range wireless communication to a remote device, the long range wireless communication comprising at least the local identifier and a mobile identifier stored in a memory of the mobile device, receiving and processing the long range wireless communication at the remote device, and performing at least one control or access action based on the information obtained from processing of the long range communication.
  • In an alternative broad aspect, there is provided a method of implementing a control or access function comprising receiving at a communication device a short range communication from a mobile device having a mobile identifier stored in a memory thereof, the short range wireless communication comprising at least the mobile identifier, transmitting from the communication device a long range wireless communication to a remote device, the long range wireless communication comprising at least the mobile identifier and a local identifier stored in a memory of the communication device, receiving and processing the long range wireless communication at the remote device, and performing at least one control or access action based on the information obtained from processing of the long range communication.
  • The method is advantageous because a control or access function can be implemented in any existing devices that are capable of receiving and/or transmitting the wireless communications as set forth in the above method, enabling such a function to be implemented without significant installation costs or efforts. The controller of the remote device may control the performing of the at least one control or access action.
  • The step of transmitting from or receiving at a mobile device a short range wireless communication to/from a local device may comprise establishing any suitable communication, for example a Bluetooth LE communication or Near Field Communication (NFC), with the local device or communication device. Particularly for methods implemented for passive tokens, the method may further comprise providing power via a short range transmission from the mobile device to the local device, to enable the local device to release the local identifier. As discussed above, short range wireless communications may be communications that occur over a range of only a few cm to under about 1m. Therefore the method may further comprise moving the mobile device into contact, or into close proximity, with the local device or communication device to initiate the short range communication with the local device or communication device.
  • The step of transmitting from the mobile device or communication device a long range wireless communication to the remote device may comprise establishing any suitable communication, for example a Bluetooth (or Bluetooth LE) communication or Wi-Fi or cellular data communication, with the remote device.
  • As discussed above, additional actions may be performed under other circumstances. The method may further comprise performing at least one further control or access action in the absence of receiving a further long range wireless communication from the mobile device or communication device at the remote device within a time period.
  • Any of the actions discussed above may comprise at least one or more of transmitting a control signal to control at least one device or system located in the vicinity of the local device or communication device, transmitting, via the long range wireless communication interface of the remote device or the communication device, at least one of information and a command to the mobile device or communication device, and storing information related to the mobile device and/or the local or communication device in a memory of the remote device. The control or access action may comprise transmitting a control signal to a device or system in the vicinity of the local device or communication device to switch on and/or to switch off the device or system. The control or access action may comprise at least one of operating a locking mechanism of a door, the door preventing access to at least one area when locked by the locking mechanism, operating a lighting system for lighting the area in which the local or communication device is located, operating a heating and/or cooling system for heating and/or cooling the environment in the vicinity of the local or communication device, operating at least one power source for enabling power to be provided to devices and systems located in the vicinity of the local or communication device, operating a communications device or system for enabling two-way communication with at least one remote communications device or system, operating an audio and/or video device or system for providing audio and/or video output to the area in the vicinity of the local or communication device, and operating any other powered device or system located in the vicinity of the local or communication device.
  • As discussed above and in particular in the alternative aspect where a passive token or the like is used, the local identifier received at the mobile device may not be in any way altered for security purposes. Therefore the method may further comprise processing at the mobile device the local identifier received from the local device to provide a processed communication, wherein the step of transmitting from the mobile device a long range wireless communication to the remote device comprises transmitting the processed communication. The processed identifier may prevent the identifier being immediately recognisable or readable. The method may comprise processing at the mobile device the local identifier received from the local device to provide an encrypted communication, wherein the step of transmitting from the mobile device a long range wireless communication to the remote device comprises transmitting the encrypted communication. Thus security of the communication to the remote device is increased. In other aspects, some or all identifiers transmitted to the remote device can be similarly processed.
  • The above method may be implemented on components of an existing system. This may be simply implemented by setting up the system by registering the various components for use with the system and installing any necessary software or applications, etc. From a further broad aspect, there is provided a method of providing a system for implementing a control or access function, the method comprising registering a local device or communication device with a remote device by moving the local device or communication device within communication range of a short range reader of the remote device, storing information in a memory of the remote device comprising at least a local identifier of the local device or of the communication device, associating the local identifier stored in the memory of the remote device with at least one remotely located controllable system or device, and placing the local device or communication device in the vicinity of the remotely located controllable system or device such that the local device or communication device is visible to a user of the remotely located controllable system or device, wherein the local device is capable of releasing the local identifier only over a short range wireless communication or the mobile device is capable of releasing the mobile identifier only over a short range wireless communication, the remote device is capable of communicating over a long range wireless communication, and the local device or communication device when located in the vicinity of the remotely located controllable system or device is within the long range wireless communication of the remote device or communication device. Thus one or more local devices or communication devices, for example local devices implemented as passive tokens, can be registered with a remote device and then the tokens placed wherever it is required for their control or access function to be performed, which may be in a different location to the remote device. For example, when the token is to be used for accessing premises (i.e. to perform an access control function), the token can be stuck on the relevant door or on a wall next to the door, whereas the remote device may be located inside the premises, perhaps in an area that is not accessible to the user. By simply interacting with the token via a mobile device, the user is able to communicate with the remote device and access desired functions.
  • The above method may be implemented using an existing mobile device, such as a mobile computer, tablet, phone or smartphone. This may be simply implemented by registering the mobile device for use with the system and installing any necessary software or applications, etc., on the mobile device From a further broad aspect there is provided a method of registering a mobile device for use with a system for implementing a control or access function, the method comprising providing information relating to a mobile device to a remote device, the information relating to the mobile device comprising at least one address or number associated with the mobile device, transmitting a unique identifier from the remote device to the at least one address or number associated with the mobile device, providing to the mobile device an application having information for establishing secure communications with the remote device, processing the unique identifier with the application on the mobile device, the application determining whether the mobile device is to be registered with the system, and registering the mobile device with the system when the outcome of the determining step is positive. Thus a user's mobile device such as a smartphone can be provide with software, e.g. an application (or 'app'), that enables a code or unique identifier sent to the device from a remote device to be processed by the app and if the unique identifier has not previously been registered, the app is enabled on the mobile device for accessing the system.
  • As discussed above, a mobile device such as a smartphone can be used in the systems and methods described herein, for example by having an app on the mobile device to control and/or authenticate the various communications. From a further broad aspect, there is provided a method of implementing a control or access function with a mobile device comprising a short range communication interface, a long range communication interface and a memory with a mobile identifier stored therein, the method comprising receiving a short range communication comprising a local identifier from a local device and transmitting a long range communication comprising the local identifier and the mobile identifier to a remote device, the communication for enabling the remote device to control or perform at least one control or access action in relation to a system or device located in the vicinity of the local device.
  • The remote device according to embodiments described herein can be any suitable device, such as an access point or wireless router. The remote device may control the implementation of the control or access function. From a further broad aspect, There is provided a controller for implementing a control or access function, the controller comprising a long range wireless communication interface for receiving a communication from a mobile device or communication device, and at least one control interface for controlling at least one system or device located in the vicinity of a local device or communication device, wherein the controller is configured to determine whether a mobile device is authorised to use the control or access function based on information contained in a long range wireless communication received from the mobile device or communication device, and the control interface is configured to control a system or device identified by an identifier contained in the long range wireless communication received from the mobile device or communication device when it is determined that the mobile device is authorised to use the control or access function. Thus there is provided a controller that can recognise a permitted or authenticated device in a system and can implement a control or access function in the vicinity of the permitted device in response to a communication from the device either directly or via a communication device.
  • The systems and methods described above involve long range wireless communication between a mobile device or communication device and a remote device that are separated by a distance of more than a few metres and typically would be separated to the extent that the mobile device could not readily be located near to the remote device. For example the mobile device and the remote device may be located in different areas or rooms of a building or floorplate or may be in different buildings or floorplates entirely.
  • The long range communication between the mobile device or communication device and the remote device can be direct communication, i.e. from the mobile device or communication device directly to the remote device and vice versa or the long range wireless communication can be indirect, i.e. the mobile device or communication device communicates with an intermediate device within long range wireless communication and the intermediate device communicates (either directly or indirectly) with the remote device. For example, the mobile device or communication device may communicate with an access point or router within long range wireless communication and that router communicates with the remote device either via a wireless or wired connection (e.g. via WiFi, a LAN, a WAN or the like).
  • Therefore systems in accordance with embodiments of the present invention can comprise more than one remote device with communications between the mobile device or communication device and the controlling remote device being via one or more other remote devices. Examples will now be described, by way of example only and with reference to the accompanying drawings, in which:
    • Figure 1 schematically illustrates a systemin which a token communicates over a short range communication with a mobile device that communicates over a long range communication with a remote device;
    • Figure 2 schematically illustrates a system in which a remote device controls various functions of an office environment in response to a long range communication from a mobile device;
    • Figure 3 schematically illustrates a system which a remote device controls an access function in response to an indirect long range communication from a mobile device;
    • Figure 4 schematically illustrates a in which a remote device controls an access function in response to a direct long range communication and subsequent authentication from a mobile device;
    • Figure 5 schematically illustrates a system in accordance with the present invention in which a local device communicates over a short range communication with a mobile device and also communicates over a long range communication with a remote device;
    • Figure 6 schematically illustrates a system in which a remote device controls various functions of an office environment in response to an indirect long range communication from a local device; and
    • Figure 7 schematically illustrates a system in which a remote device controls an access function in response to a direct long range communication from a local device and subsequent authentication from a mobile device.
  • Aspects of the invention are set out in the independent claim and preferred features are set out in the dependent claims.
  • Figure 1 illustrates asystem 10 for implementing a control or access function in. Amobile device 30, which in this illustration is asmartphone 30, has a short range communication interface comprising an near field communication chip and a long range communication interface comprising a Bluetooth LE chip. Aremote device 40 comprises a wireless access point orcontroller 40 which is also Bluetooth LE enabled for receiving long range Bluetooth LE communications.Local device 20 is apassive token 20 and is located in the vicinity of an appliance or system which the user of thesmartphone 30 may wish to operate or control. Prior to the token 20 being placed in the vicinity of the appliance/system, it is registered as part of thesystem 10 for implementing a control or access function as follows. The token 20 is presented to a reader at the server that controls the system, which in theFigure 1 embodiment is theaccess point 40, but could for example be a remote server with which theaccess point 40 communications (such asserver 40c as shown inFigure 3). Theserver 40 recognises the token 20 and associates it with the appliance/system near to which it will soon be placed. The functionality that is required when the token 20 is used is selected at the server. For example, in the embodiments ofFigures 2 to 4 a token 20 is associated with alockable door 52 and the functionality required is for thedoor 52 to be locked or unlocked. Once the setup at theserver 40 is completed, the token 20 is taken to appliance/system and placed in an appropriate location. For example, with reference again to thedoor 52 example, the token 20 is affixed (e.g. glued or otherwise stuck) next to thedoor 52. As long as there is then aremote device 40 within long range communication of the token 20, the system will be functional.
  • Themobile device 30 to be used in conjunction withtokens 20, such as thesmartphone 30, must be registered with the system for implementing a control or access function. A credential can be issued to thesmartphone 30 as follows. At theserver 40 or any appropriately connected computer or the like, a user record is identified in the software. To register the smartphone 30 a credential is added, the credential being selected as 'NFC' type. An identifying address of the user of thesmartphone 30 is entered, such as an e-mail address or a/themobile phone 30 number and then the software sends a unique identifier and a link to the appropriate app to the user (via SMS or e-mail, e.g.). The user can then download the appropriate app to thesmartphone 30 and enter the unique identifier into the app when it is first run on thesmartphone 30. The app confirms whether the unique identifier has been previously registered with the system and if not, thesmartphone 30 is enabled for use with the system.
  • The user interacts with the system via the registeredsmartphone 30 by bringing thesmartphone 30 within range of a passive token 20 (i.e. by placing thesmartphone 30 in contact with or very close to (within a few cms) the token 20). An identifier of the token 20 is transmitted via an NFC-protocol communication 22 to thesmartphone 30. As the token 20 is passive, power for the transmission is provided by thesmartphone 30 by inductive coupling. The app on thesmartphone 30 takes the identifier of the token 20 and transmits it, along with a smartphone identifier (which may be a user ID, the credential created when thesmartphone 30 is first registered, its phone number, an e-mail address, etc.) to theaccess point 40 via along range communication 32, which in this embodiment is a Bluetooth LE communication. The transmission can be encrypted by the app prior to transmission for increased security. As thesmartphone 30 is registered with the system, theaccess point 40 recognises thesmartphone 30 and also the token 20 and its associated appliance/system, from the transmitted local identifier. Theaccess point 40 can therefore immediately operate or control the appliance/system associated with the token 20 from the singlelong range communication 32.
  • InFigure 2 atypical office environment 60 is schematically illustrated. Theoffice 60 has an entry point which is closed by an electrically lockeddoor 52. Inside the office there is alighting system 58 and acomputer 54, which is connected to apower supply 56. All of these appliances and systems are connected via apower bus 44 or other suitable system to aremote device 40 which is located in a server room some distance away from theoffice 60 and in a secure area that is inaccessible to a user of theoffice 60. A user wishing to enter theoffice 60 approaches thedoor 52 and needs only to place their registeredsmartphone 30 within close proximity of the door token 20a (preferably by touching it against the token 20a for an NFC communication). The token 20a transmits its local identifier to thesmartphone 30 via, e.g. NFC, which transmits the local identifier and its own mobile identifier to theremote device 40, e.g. via Bluetooth LE. Theremote device 40 recognises that the user has interacted with the door token 20a, by virtue of the local identifier and recognises that thesmartphone 30 is registered, via the mobile identifier and performs an action viaconnection 44a to unlock thedoor 52 so the user can gain access to theoffice 60.
  • The user may wish to switch on thelighting system 58 once inside theoffice 60. This is achieved by holding thesmartphone 30 close to one of thelighting tokens 20b located at various positions in theoffice 60 to instruct theremote device 40 to operate thelighting system 58 viaconnection 44b. Thelighting tokens 20b may each have a unique identifier or each lighting token 20b may have the same identifier as another lighting token 20b (but that differs to allother tokens 20, such as the door token 20a and power token 20c). Whilst in this example the user turns on thelighting system 58 if lighting is required, it is within the scope of the example for thelighting system 58 to additionally or alternatively be operated by theremote device 40 in response to, for example, other actions of the user. For example, theremote device 40 could automatically turn on thelighting system 58 in response to the user interacting with the door token 20a, because it is assumed that by opening thedoor 52, the user wants to access theoffice 60 and thelighting system 58 will therefore need operating. This could be done only at certain times if desired, for example after a certain time in the evening when theoffice 60 might become dark. Theremote device 40 can also deactivate thelighting system 58 even if the user does not interact with a lighting token 20b. For example theremote device 40 might determine that, in the absence of any other interactions of the user'ssmartphone 30 with any token 20 in theoffice 60 after a certain time period, the user has in all probability left theoffice 60 and therefore the lights should be turned off. In this scenario, theremote device 40 might transmit a long range signal requesting a response from thesmartphone 30 to check whether thesmartphone 30 is still in theoffice 60. If there is no response, thelighting system 58 can be switched off.
  • Inside theoffice 60 there is also acomputer 54 which is powered from apower socket 56 which is connected to theremote device 40. If the user wishes to operate thecomputer 54, thesmartphone 30 can be touched to or placed very near to the computer token 20c that is stuck on the side of thecomputer 54. The computer token 20c transmits its identifier to thesmartphone 30 so that theremote device 40 can switch on the power tosocket 56 viaconnection 44c. It may be that the user is only permitted to use thecomputer 54 for a period of time, e.g. for one hour. Theremote device 40 can determine this based on either the mobile identifier transmitted from thesmartphone 30 and/or from the data in its database. In such a scenario, theremote device 40 can automatically switch of thecomputer 54 after the time has elapsed.
  • Figure 3 schematically illustrates a similar system to thefigure 2 arrangement but in this scenario more than one remote device is provided because the local office is part of a large environment having multiple controllers and/or access points, etc. Adoor 52 permits entry to one specific area and has an electric locking mechanism as before. Asmartphone 30 is presented to a door token 20 as in other examples and transmits its identifier via ashort range communication 22 to thesmartphone 30. The local identifier and an identifier of thesmartphone 30 are transmitted via along range communication 32 to aremote device 40a that is within the long range. Howeverremote device 40a is not the controlling device/server of the system, which is insteadcontroller 40c. In this arrangement, theremote device 40a that communicates with thesmartphone 30 transmits onwards thelong range communication 42a to a network 43 (which may, for example be a local area network, or a wide area network or the Internet, etc.). The network transmits thecommunication 43a onwards to anotherdevice 40b of the system which is inlong range communication 42b with thecontroller 40c of the system. Thecontroller 40c on receiving thelong range communication 42b recognises the token 20 and thesmartphone 30 and operates thedoor 52 viaconnection 44 to enable the user to enter the building throughdoor 52.
  • Figure 4 schematically illustrates a similar system to theFigure 3 arrangement, but theremote device 40 that is within long range communication of the token 20 (and thus the mobile device 30) is the system controller. In this example thesmartphone 30 is placed close to the token 20 as before to receive the local identifier via ashort range communication 22 and transmits the local identifier and its mobile identifier to theremote device 40 via along range communication 32a. Thecontroller 40 recognises the local identifier and thesmartphone 30 and determines an extra security step is required before thedoor 52 can be opened. Therefore thecontroller 40 sends acommand 42 back to thesmartphone 30 and the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to thecontroller 40 for further authentication and if the input is authenticated, thecontroller 40 operates thedoor 52 via theconnection 44.
  • Therefore there are provided systems and methods for intelligently managing control and access functions in which a user does not need to carry a dedicated control or access device and are therefore convenient, in which passive tokens can be used instead of powered devices so that significant energy is conserved and the installation of the tokens is greatly simplified compared with the need to wire in and power conventional local devices. The systems and methods enable a user to be securely identified and granted control or access where appropriate by identifying the user and the appliance, system or device where the user is located and triggering an appropriate event at the locality of the user if access or control should be granted.Figure 5 illustrates asystem 10 for implementing a control or access function, in accordance with an embodiment of the present invention. A mobile device 30', which in this illustration is a smartphone 30', has a communication interface comprising a Bluetooth LE chip that provides both a short range communication interface and long range communication interface. Aremote device 40 comprises a wireless access point orcontroller 40 which is also Bluetooth LE-enabled for receiving long range Bluetooth LE communications. Local device 20' is a communication device 20' provided with Bluetooth LE chip that provides both a short range communication interface when operating in low-power "Whisper Mode" and long range communication interface when operating in a normal-power mode. Local device 20' is located in the vicinity of an appliance or system which the user of the smartphone 30' may wish to operate or control. Local device 20' is registered as part of thesystem 10 for implementing a control or access function. Theremote device 40 is provided with details for the local device 20' and associates it with the appliance/system near to which it is located. The functionality that is required when the local device 20' is used is selected at theremote device 40.
  • For example, in the embodiments ofFigures 6 and7 a local device 20' is associated with alockable door 52 and therefore the functionality required is for thedoor 52 to be locked or unlocked. Once the setup at theremote device 40 is completed, the local device 20' is taken to appliance/system and placed in an appropriate location. For example, in order to lock or unlock thedoor 52, the local device 20' is affixed (e.g. glued or otherwise stuck) next to thedoor 52. As long as there is then aserver 40 within long range communication of the local device 20', the system will be functional.
  • The mobile device 30' to be used in conjunction with local devices 20', for example a smartphone 30', must be registered with the system for implementing a control or access function. A credential can be issued to the smartphone 30' as follows. At theremote device 40 or any appropriately connected server or computer or the like, a user record is identified in the software. To register the smartphone 30' a credential is added, the credential being selected as a Bluetooth Low Energy or 'BLE' type. An identifying address of the user of the smartphone 30' is entered, such as an e-mail address or a/the mobile phone 30' number and then the software sends a unique identifier and a link to the appropriate app to the user (via SMS or e-mail, e.g.). The user can then download the appropriate app to the smartphone 30' and enter the unique identifier into the app when it is first run on the smartphone 30'. The app confirms whether the unique identifier has been previously registered with the system and if not, the smartphone 30' is enabled for use with the system.
  • The user interacts with the system via the registered smartphone 30' by bringing the smartphone 30' within range of a local device 20' (i.e. by placing the smartphone 30' in contact with or very close to (within a few cms) the local device 20'). An identifier of the mobile device 30' is transmitted via an Bluetooth LE communication 22' to the local device 20'. The local device 20' is operating in a power saving mode, with only Bluetooth LE 'Whisper Mode' active, thereby reducing the range within which it can communicate with the mobile device 30'. The local device 20' takes the identifier of the mobile device 30' (which may be a user ID, the credential created when the smartphone 30' is first registered, its phone number, an e-mail address, etc.) and powers up to operate in a higher-power or normal-power Bluetooth LE mode and then transmits the mobile identifier, along with a local identifier, to theremote device 40 via a long range communication 32', which in this embodiment is a higher-power or normal-power Bluetooth LE communication. The transmission can be encrypted by either or both of the mobile 30' and local 20' device(s) prior to transmission for increased security. As the smartphone 30' is registered with the system, theremote device 40 recognises the identifiers associated with the smartphone 30' and also the local device 20' and its associated appliance/system, from the transmitted identifiers. Theremote device 40 can therefore immediately operate or control the appliance/system associated with the local device 20' from the single long range communication 32'.
  • In the above described example in relation toFigure 2 there is described an electrically lockeddoor 52, alighting system 58 and acomputer 54 connected to apower supply 56. All of these appliances and systems are connected via apower bus 44 or other suitable system to aremote device 40 which is located in a server room some distance away from theoffice 60 and in a secure area that is inaccessible to a user of theoffice 60. As an alternative to this embodiment, the above-described local devices 20' can be substituted for thetokens 20a and 20b to enable a user wishing to enter theoffice 60 using their registered smartphone 30' and to enable the user to switch on thelighting system 58 once inside theoffice 60 using their smartphone 30'. Thecomputer 54 can be similarly activated using the smartphone 30' touched to or placed very near to the computer token 20c, in this alternative embodiment substituted for a local device 20', that is stuck on the side of thecomputer 54.
  • Figure 6 schematically illustrates a similar system to the alternativeFigure 2 arrangement described above but in this scenario more than oneremote device 40a, 40b, 40c is provided because the local office is part of a large environment having multiple controllers and/or access points, etc. Adoor 52 permits entry to one specific area and has an electric locking mechanism as before. A smartphone 30' is presented to a local device 20' as in other examples and transmits its mobile identifier via a short range communication 22' to the local device 20'. The local identifier of the local device 20' and mobile identifier of the smartphone 30' are transmitted by the local device 20' via along range communication 32 to aremote device 40a that is within the long range. However,remote device 40a is not the controlling device/server of the system, which is insteadcontroller 40c. In this arrangement, theremote device 40a that communicates with the local device 20' transmits onwards thelong range communication 42a to a network 43 (which may, for example be a local area network, or a wide area network or the Internet, etc.). The network transmits thecommunication 43a onwards to anotherdevice 40b of the system which is inlong range communication 42b with thecontroller 40c of the system. Thecontroller 40c on receiving thelong range communication 42b recognises the local device 20' and the smartphone 30' and operates thedoor 52 viaconnection 44 to enable the user to enter the building throughdoor 52.
  • Figure 7 schematically illustrates a similar system to theFigure 6 arrangement, smartphone 30' is placed close to the local device 20' as before to receive the mobile identifier via a short range communication 22' and transmits the local identifier and mobile identifier to theremote device 40 via along range communication 32a. Thecontroller 40 recognises the local identifier and the mobile identifier and determines an extra security step is required before thedoor 52 can be opened. Therefore thecontroller 40 sends acommand 42 back to the smartphone 30' via a suitable long range communication protocol, in this example also Bluetooth LE but could be Wi-Fi or a cellular data network for example, and the app running thereon displays a screen to the user which requires an input (such as a PIN, another code, a set of movements, facial recognition or any other identifier or code). If the user responds to the request for input a long range communication 32b is sent to thecontroller 40 for further authentication and if the input is authenticated, thecontroller 40 operates thedoor 52 via theconnection 44.
  • Therefore there are provided systems and methods for intelligently managing control and access functions in which a user does not need to carry a dedicated control or access device and are therefore convenient, in which a low-power battery-powered local device can be used instead of mains-powered devices so that significant energy is conserved or in which a wireless local device can be used so that data cabling need not be installed to connect the local device to a remote device and the installation of the tokens is greatly simplified compared with the need to wire in and power conventional local devices. The systems and methods enable a user to be securely identified and granted control or access where appropriate by identifying the user and the appliance, system or device where the user is located and triggering an appropriate event at the locality of the user if access or control should be granted.

Claims (14)

  1. A communication device (20') having a low-power mode, a higher-power mode and a no-power mode for implementing a control or access function, comprising:
    a Bluetooth Low Energy, BLE, chip providing:
    a short range wireless communication interface (22') when operating in low-power whisper mode;
    a long range wireless communication interface (32') when operating in a normal-power mode;
    a local identifier stored therein; wherein
    in the no-power mode, no power is provided to the short-range or the long-range communication interface;
    in the low-power mode the communication device (20') is restricted to communicate over the short range wireless communication interface (22') only and operates with only Bluetooth Low Energy whisper mode active, and the communication device (20') is operable to receive a mobile identifier from a mobile device (30') over the short range wireless communication interface (22') and upon receiving the mobile identifier the higher-power mode is powered-up to operate in a normal-power Bluetooth Low Energy mode;
    in the higher-power mode the communication device (20') is operable to communicate over the long range wireless communication interface (32') with a remote device (40) having a controller arranged to perform at least one control or access action in response to receiving the local identifier and the mobile identifier; wherein the communication device (20') is configured to, following powering-up the higher-power mode, send the local identifier and the received mobile identifier to the remote device (40) over the long range wireless communication interface; and
    wherein the communication device (20') further comprises a proximity sensor wherein the proximity sensor is configured to:
    when the device is in the no-power mode, detect a user is nearby the communication device by detecting any or all of: the movement of a hand in the vicinity of the communication device (20'); the mobile device (30') in the vicinity of the communication device (20'); and a change in capacitance in the vicinity of the communication device (20'); and
    upon detecting a user is nearby the communication device, activate the low-power mode of the communication device (20') with only Bluetooth Low Energy whisper mode active.
  2. The communication device of claim 1, wherein the short range wireless communication interface (22') and the long range wireless communication interface (32') of the communication device (20') are comprised of one and the same communication interface, the communication interface optionally operating in different modes.
  3. The device of claims 1 or 2, wherein the communication device (20'): (a) returns to the low-power mode after the local identifier and the mobile identifier are sent by the communication device (20') to the remote device (40) via the long range communication interface (32'), and/or (b) communicates substantially within a range of approximately 30cm in the low-power mode, and/or (c) communicates substantially within a range of 30m in the higher-power mode.
  4. The device of any of claims 1 to 3, wherein the communication device (20') further comprises a second short range wireless communication interface for communicating with identification tokens, the identification tokens able to passively or actively transmit a mobile identifier to the communication device (20'), optionally wherein the second short range wireless communication interface is Near Field Communications, NFC.
  5. The device of any of claims 1 to 4, further comprising a battery and wherein the communication device (20') is powered by the battery and wherein optionally the battery is a coin battery.
  6. The device of any of claims 1 to 5, wherein either or both the communication device (20') begins communications with the mobile device (30') over the short range wireless communication interface (22') by requesting the mobile identifier from the mobile device (30') and/or the mobile identifier comprises any of: a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
  7. The device of any of claims 1 to 6, wherein the communication device (20') also receives a unique identifier in addition to the mobile identifier from the mobile device (30') and sends the received unique identifier to the remote device (40) using the long range wireless communication interface (32') along with the mobile identifier, wherein the unique identifier comprises any of a MAC address; a Bluetooth MAC address; a Bluetooth Identifier, a QR code or a dedicated identifier.
  8. The device of any of claims 1 to 7, wherein the remote device further requests the mobile device (30') to make a connection using a third long range protocol to verify that the mobile device (30') is within the proximity of the communication device (20'), optionally wherein the third long range protocol is Wi-Fi.
  9. The device of any of claims 1 to 8, wherein the communication device (20') has a medium power mode that is used to communicate with the mobile device (30') over the short range wireless communication interface (22') when the communication device (20') receives the mobile identifier from the mobile device (30').
  10. The device of any of claims 1 to 9, wherein the remote device (40) sends a security query to the mobile device (30'), the security query comprising a request to receive, via either a long range wireless communications protocol direct with the remote device (40) or via the communication device (20'), any of a random number, a personal identification number, a bar-code or QR-code, GPS co-ordinates of the mobile device or a facial recognition confirmation.
  11. The device of any of claims 1 to 10, wherein the mobile device (30') comprises a mobile communications device, optionally a smartphone, tablet or the like.
  12. The device of any of claims 1 to 11, wherein the mobile device is a BLE-enabled smartphone, and the remote device is optionally BLE-enabled.
  13. A system for implementing a control or access function, the system comprising:
    a communication device (20') according to any of claims 1 to 12;
    one or more mobile devices (30');
    a remote device (40) comprising a long range wireless communication interface (32') and a controller;
    wherein the controller of the remote device (40) is configured to perform at least one control or access action in response to receiving the communication from the communication device (20'); and/or
    wherein the mobile device (30') comprises a mobile communications device, optionally a smartphone, tablet or the like; and/or
    wherein the short range wireless communication interface of the communication device (20') comprises a Bluetooth Low Energy, BLE, whisper mode interface and the mobile device (30') is optionally a BLE-enabled smartphone; and/or
    wherein the long range wireless communication interface of the communication device (20') comprises a Bluetooth Low Energy, BLE, interface and the remote device (40) is optionally BLE-enabled.
  14. A method of implementing a control or access function in a communication device having a low-power mode, a higher-power mode and a no-power mode, wherein the communication device (20') comprises a Bluetooth Low Energy, BLE, chip providing: a short range wireless communication interface (22') when operating in low-power Whisper mode; and a long range wireless communication interface (32') when operating in a normal-power mode; wherein in the low-power mode the communication device (20') is restricted to receive and transmit short range wireless communication only, the method comprising the steps of:
    when no power is provided to the short-range or the long-range communication interface, detecting, by a proximity sensor of the communication device (20'), a user is nearby the communication device by detecting any or all of: the movement of a hand in the vicinity of the communication device (20'); a mobile device (30') in the vicinity of the communication device (20'); and a change in capacitance in the vicinity of the communication device (20');
    upon detecting a user is nearby the communication device, activating the low-power mode of the communication device (20') with only Bluetooth Low Energy whisper mode active;
    receiving at the communication device (20') while the communication device is operating in the low-power mode with only Bluetooth Low Energy whisper mode active a short range wireless communication from a mobile device (30'), the short range wireless communication comprising at least a mobile identifier associated with the mobile device (30');
    powering-up the higher-power mode of the communication device on receipt of the mobile identifier to operate in normal-power Bluetooth Low Energy mode, enabling long-range communications with a remote device;
    following powering-up the higher-power mode, transmitting from the communication device (20') a long range wireless communication to the remote device (40) while the communication device (20') is operating in the higher-power mode, the long range wireless communication comprising at least the mobile identifier and a local identifier associated with the communication device (20');
    wherein the remote device (40) is operable to receive and process the long range wireless communication in order to perform at least one control or access action based on the information obtained from processing of the long range wireless communication.
EP14179202.8A2013-07-302014-07-30Communication method and systemActiveEP2833330B1 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
GB1313586.8AGB2516686B (en)2013-07-302013-07-30Communication method and system
GB1405133.8AGB2516715B (en)2013-07-302014-03-21Communication method and system

Publications (2)

Publication NumberPublication Date
EP2833330A1 EP2833330A1 (en)2015-02-04
EP2833330B1true EP2833330B1 (en)2018-07-18

Family

ID=51228377

Family Applications (1)

Application NumberTitlePriority DateFiling Date
EP14179202.8AActiveEP2833330B1 (en)2013-07-302014-07-30Communication method and system

Country Status (1)

CountryLink
EP (1)EP2833330B1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9087246B1 (en)*2015-02-162015-07-21Polaris Tech Global LimitedRFID-to-bluetooth selective adapter
NL2015145B1 (en)*2015-07-102017-02-01Boekit B V System for managing devices in a building, device and mobile communication device for use in such a system.
CN105719374A (en)*2016-01-222016-06-29慧锐通智能科技股份有限公司Door access control method
CN105719375A (en)*2016-01-222016-06-29慧锐通智能科技股份有限公司Intelligent access control device and communication method thereof
IT201700069463A1 (en)*2017-06-222018-12-22One4 S R L System and method for managing and optimizing spaces and services in business contexts.
KR102050823B1 (en)*2018-11-262019-12-03주식회사 두빛나래소프트System, an apparatus and a method for transmitting and receiving information using quick response code
FR3105534B1 (en)*2019-12-242022-12-23Imprimerie Nat Method and system for sharing authentication data for access control and erasing data after use

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
DE10246668A1 (en)*2002-10-072004-04-22Dorma Gmbh + Co. KgAccess control system has reader for identifying person, radio transmitter/receiver with interface for wirelessly sending reader data to central station for return and processing by central station
WO2004034334A1 (en)2002-10-072004-04-22Dorma Gmbh + Co. KgAccess control system for doors and method for operating an access control system of this type
WO2005066908A2 (en)2004-01-062005-07-21Kaba AgAccess control system and method for operating said system
US20060170533A1 (en)2005-02-032006-08-03France TelecomMethod and system for controlling networked wireless locks
EP1965595A1 (en)2007-02-272008-09-03Lucent Technologies Inc.Wireless communication techniques for controlling access granted by a security device
NL1033539C2 (en)2007-03-132008-09-17Nedap NvAccess control system using mobile phone with NFC technology, compares authorization information on server with identification codes for phone and electronic lock
US20100127821A1 (en)2008-11-252010-05-27Jones Derek WAccess Control
US20110001603A1 (en)2007-12-102011-01-06Nicholas Hedley WillisMethods and apparatus relating to a security system
US8325995B1 (en)2011-06-212012-12-04Google Inc.Proximity wakeup
US20130176107A1 (en)2011-03-172013-07-11Unikey Technologies, IncWireless access control system and related methods

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
DE10246668A1 (en)*2002-10-072004-04-22Dorma Gmbh + Co. KgAccess control system has reader for identifying person, radio transmitter/receiver with interface for wirelessly sending reader data to central station for return and processing by central station
WO2004034334A1 (en)2002-10-072004-04-22Dorma Gmbh + Co. KgAccess control system for doors and method for operating an access control system of this type
WO2005066908A2 (en)2004-01-062005-07-21Kaba AgAccess control system and method for operating said system
US20060170533A1 (en)2005-02-032006-08-03France TelecomMethod and system for controlling networked wireless locks
EP1965595A1 (en)2007-02-272008-09-03Lucent Technologies Inc.Wireless communication techniques for controlling access granted by a security device
NL1033539C2 (en)2007-03-132008-09-17Nedap NvAccess control system using mobile phone with NFC technology, compares authorization information on server with identification codes for phone and electronic lock
US20110001603A1 (en)2007-12-102011-01-06Nicholas Hedley WillisMethods and apparatus relating to a security system
US20100127821A1 (en)2008-11-252010-05-27Jones Derek WAccess Control
EP2192560A1 (en)2008-11-252010-06-02Rockwell Automation LimitedAccess control
US20130176107A1 (en)2011-03-172013-07-11Unikey Technologies, IncWireless access control system and related methods
US8325995B1 (en)2011-06-212012-12-04Google Inc.Proximity wakeup

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
"2.4-GHz Bluetooth® low energy System-on-Chip", TEXAS INSTRUMENTS, October 2010 (2010-10-01), pages 1 - 32, XP055585067
"BlueCore 2-ROM Single Chip Bluetooth System Advnce Information Data Sheet BC213143A", CSR, April 2002 (2002-04-01), Cambridge, pages 1 - 25, XP055585095
"Bluetooth Low Energy", WIKIPEDIA, 5 July 2003 (2003-07-05), XP055585055
"CC2540 and CC2541 Bluetooth low energy Software Developer's Reference Guide", TEXAS INSTRUMENTS, October 2010 (2010-10-01), pages 1 - 154, XP055585090, [retrieved on 20150900]
"Master Table of Contents & Compliance Requirements", SPECIFICATION OF THE BLUETOOTH SYSTEM - COVERED CORE PACKAGE VERSION 4.0, vol. 0, 30 June 2010 (2010-06-30), pages 1 - 38, 17-29,36, XP055585061
ANONYMOUS: "Specification of the Bluetooth System Specification Volume 1", BLUETOOTHTM, 22 February 2001 (2001-02-22), pages 1 - 182, XP055585051
DORMA GMBH: "Sicherungstechnik/Zeit- und Zutrittskontrolle (STA)", PRODUKTEKATALOG, 2003, pages FP - 203, XP055585057

Also Published As

Publication numberPublication date
EP2833330A1 (en)2015-02-04

Similar Documents

PublicationPublication DateTitle
US10158968B2 (en)Communication method and system
EP2833330B1 (en)Communication method and system
CA2948205C (en)Electronic access control device and access control method
GB2533675A (en)Communication method and system
KR101963437B1 (en)System and method for doorlock
CN107295516A (en)Shield the base station of remote-control key challenge request
JP7555400B2 (en) Mobile Digital Lock Technology
US10181230B2 (en)System and method for controlling access at access point
US10740995B2 (en)Access control and location tracking system
KR20170116888A (en)Digital doorlock system
KR101912349B1 (en)Entrance Access Management System
KR101861057B1 (en)Digital door lock based on composite signal and the method for operating the same
KR20150131792A (en)Door lock apparatus and control method for the same
US12205410B2 (en)System and multi-functional wireless communication device for access control and ticket validation
KR101996258B1 (en)Remote information processing system for user apparatus in stroage
EP4459577A1 (en)System and multi-functional wireless communication device for access control and ticket validation
US11558744B2 (en)Location-based asset usage control
WO2015052120A1 (en)Method and system for detection and identification of a wearable device
KR20200077378A (en)Remote information processing system for user apparatus in stroage
HK1102454A (en)Access control method for an area accessible to persons, in particular for a room closed off by means of a door

Legal Events

DateCodeTitleDescription
17PRequest for examination filed

Effective date:20140730

AKDesignated contracting states

Kind code of ref document:A1

Designated state(s):AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AXRequest for extension of the european patent

Extension state:BA ME

PUAIPublic reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text:ORIGINAL CODE: 0009012

R17PRequest for examination filed (corrected)

Effective date:20150724

17QFirst examination report despatched

Effective date:20160218

GRAPDespatch of communication of intention to grant a patent

Free format text:ORIGINAL CODE: EPIDOSNIGR1

STAAInformation on the status of an ep patent application or granted ep patent

Free format text:STATUS: GRANT OF PATENT IS INTENDED

INTGIntention to grant announced

Effective date:20180207

GRASGrant fee paid

Free format text:ORIGINAL CODE: EPIDOSNIGR3

GRAA(expected) grant

Free format text:ORIGINAL CODE: 0009210

STAAInformation on the status of an ep patent application or granted ep patent

Free format text:STATUS: THE PATENT HAS BEEN GRANTED

AKDesignated contracting states

Kind code of ref document:B1

Designated state(s):AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REGReference to a national code

Ref country code:GB

Ref legal event code:FG4D

REGReference to a national code

Ref country code:CH

Ref legal event code:EP

REGReference to a national code

Ref country code:IE

Ref legal event code:FG4D

REGReference to a national code

Ref country code:AT

Ref legal event code:REF

Ref document number:1020174

Country of ref document:AT

Kind code of ref document:T

Effective date:20180815

REGReference to a national code

Ref country code:DE

Ref legal event code:R096

Ref document number:602014028586

Country of ref document:DE

REGReference to a national code

Ref country code:NL

Ref legal event code:MP

Effective date:20180718

REGReference to a national code

Ref country code:LT

Ref legal event code:MG4D

REGReference to a national code

Ref country code:AT

Ref legal event code:MK05

Ref document number:1020174

Country of ref document:AT

Kind code of ref document:T

Effective date:20180718

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:NL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:PL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:LT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:IS

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20181118

Ref country code:AT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:SE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:GR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20181019

Ref country code:NO

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20181018

Ref country code:FI

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:RS

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:BG

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20181018

REGReference to a national code

Ref country code:DE

Ref legal event code:R119

Ref document number:602014028586

Country of ref document:DE

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:HR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:LV

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:AL

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

REGReference to a national code

Ref country code:CH

Ref legal event code:PL

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:LU

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180730

REGReference to a national code

Ref country code:BE

Ref legal event code:MM

Effective date:20180731

PLBIOpposition filed

Free format text:ORIGINAL CODE: 0009260

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:CZ

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:LI

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180731

Ref country code:DE

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20190201

Ref country code:RO

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:CH

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180731

Ref country code:MC

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:ES

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:EE

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:IT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

REGReference to a national code

Ref country code:IE

Ref legal event code:MM4A

PLAXNotice of opposition and request to file observation + time limit sent

Free format text:ORIGINAL CODE: EPIDOSNOBS2

26Opposition filed

Opponent name:DORMAKABA DEUTSCHLAND GMBH

Effective date:20190418

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:BE

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180731

Ref country code:DK

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:SM

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:SK

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:IE

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180730

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:FR

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180918

Ref country code:SI

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

PLBBReply of patent proprietor to notice(s) of opposition received

Free format text:ORIGINAL CODE: EPIDOSNOBS3

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:MT

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180730

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:TR

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:PT

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:HU

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date:20140730

PG25Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code:CY

Free format text:LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date:20180718

Ref country code:MK

Free format text:LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date:20180718

PLCKCommunication despatched that opposition was rejected

Free format text:ORIGINAL CODE: EPIDOSNREJ1

PLBNOpposition rejected

Free format text:ORIGINAL CODE: 0009273

STAAInformation on the status of an ep patent application or granted ep patent

Free format text:STATUS: OPPOSITION REJECTED

27OOpposition rejected

Effective date:20201225

P01Opt-out of the competence of the unified patent court (upc) registered

Effective date:20230530

PGFPAnnual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code:GB

Payment date:20250609

Year of fee payment:12


[8]ページ先頭

©2009-2025 Movatter.jp