CN114008282A - Bolt identity - Google Patents

Bolt identity Download PDF

Info

Publication number
CN114008282A
CN114008282A CN202080044787.5A CN202080044787A CN114008282A CN 114008282 A CN114008282 A CN 114008282A CN 202080044787 A CN202080044787 A CN 202080044787A CN 114008282 A CN114008282 A CN 114008282A
Authority
CN
China
Prior art keywords
bolt
communication module
lock assembly
identity
assembly
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202080044787.5A
Other languages
Chinese (zh)
Other versions
CN114008282B (en
Inventor
马茨·塞德布拉德
托马斯·琼森
佩尔·马克高
斯特凡·约翰松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Assa Abloy AB
Original Assignee
Assa Abloy AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Assa Abloy AB filed Critical Assa Abloy AB
Priority claimed from PCT/EP2020/066633 external-priority patent/WO2020254326A1/en
Publication of CN114008282A publication Critical patent/CN114008282A/en
Application granted granted Critical
Publication of CN114008282B publication Critical patent/CN114008282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B15/00Other details of locks; Parts for engagement by bolts of fastening devices
    • E05B15/10Bolts of locks or night latches
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B41/00Locks with visible indication as to whether the lock is locked or unlocked
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/06Electric alarm locks
    • E05B45/08Electric alarm locks with contact making inside the lock or in the striking plate
    • E05B45/083Electric alarm locks with contact making inside the lock or in the striking plate with contact making either in the striking plate or by movement of the bolt relative to the striking plate
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0057Feeding
    • E05B2047/0059Feeding by transfer between frame and wing
    • E05B2047/0061Feeding by transfer between frame and wing using induction
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0067Monitoring
    • E05B2047/0069Monitoring bolt position
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks
    • E05B2047/0095Mechanical aspects of locks controlled by telephone signals, e.g. by mobile phones

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

There is provided a lock assembly (1) comprising: a strike plate assembly (10), the strike plate assembly (10) including an aperture (12a, 12 b); a first communication module (20 a); and a peg (13, 14), the peg (13, 14) being displaceable so as to be movable through the at least one hole (12a, 12b) of the impingement plate assembly (10), the peg (13, 14) comprising a second communication module (20 b); wherein the first communication module (20a) is configured to receive the identity of the peg (13, 14) by communicating with the second communication module (20b), and wherein a wireless signal from one of the first communication module (20a) and the second communication module (20b) powers the other.

Description

Bolt identity
Technical Field
The present disclosure relates to the field of locks, and in particular to lock assemblies in which a bolt provides its identity to a strike plate assembly.
Background
Locks and keys are constantly evolving from traditional purely mechanical locks. Electronic locks are becoming more and more popular today. For electronic locks, an electronic key is used for authentication of the user. The electronic key and the electronic lock may communicate through a wireless interface or a conductive interface. Such electronic locks and electronic keys provide a number of benefits, including improved flexibility in management of access rights, audit trails, key management, and the like.
In electronic locks, information of the state of a barrier (such as a door or window) is often beneficial, whereby a sensor may be provided in the lock to detect the state of the locking bolt. For example, a user may ensure that a particular lock is in a locked state in this manner, e.g., to ensure that any such lock is locked when leaving a premises. There may for example be a sensor that detects whether the barrier is open or closed. Another sensor may detect that the locking bolt protrudes through the strike plate.
An attacker can potentially tamper with such a system by inserting loose locking pegs or other items into corresponding holes of the strike plate. In this way, the system (and therefore the user) may think that the door or window is locked, even if this is not the case. This may be misinterpreted as the physical space having been locked and protected, while in fact the actual door or window is unlocked and/or open.
Disclosure of Invention
One object is to reduce the risk of an attacker tampering with the lock assembly to consider the lock to be secured when it is unsecured.
According to a first aspect, there is provided a lock assembly comprising: a strike plate assembly including an aperture; a first communication module; and a peg displaceable to enable movement through the at least one aperture of the impingement plate assembly, the peg including a second communication module; wherein the first communication module is configured to receive an identity of the bolt by communicating with the second communication module, and wherein a wireless signal from one of the first communication module and the second communication module powers the other.
The bolt may be a locking bolt.
The peg may be a latch peg.
The first communication module and the second communication module may be configured to wirelessly communicate with each other.
The first communication module may be powered by the second communication module.
The second communication module may be powered by the first communication module.
The lock assembly may be configured to consider the bolt to be in the secured state only if the identity of the bolt is determined to be valid.
The strike plate assembly may also include a sensor device for detecting the proximate presence of the peg.
According to a second aspect, there is provided a method performed in a lock assembly comprising a strike plate assembly and a bolt displaceable to enable movement through an aperture of the strike plate assembly, the method comprising the steps of: a wireless signal transmitted from one of the first communication module and the second communication module to power the other; sending, by a second communication module of the bolt, an identity of the bolt; and receiving, by the first communication module, an identity of the bolt.
The bolt may be a locking bolt.
The peg may be a latch peg.
The step of transmitting the identity may comprise wirelessly transmitting the identity.
The method may further comprise the steps of: a wireless signal is transmitted from one of the first communication module and the second communication module to power the other.
The method may further comprise the steps of: the bolt is considered to be in a fixed state only if the bolt's identity is determined to be valid.
The method may further comprise the steps of: when the bolt has been retracted is detected by a proximity sensor.
According to a third aspect, there is provided a computer program comprising computer program code which, when run on a lock assembly comprising a strike plate assembly and a bolt which can be displaced to enable movement through an aperture of the strike plate assembly, causes the lock assembly to: a wireless signal transmitted from one of the first communication module and the second communication module to power the other; sending, by a second communication module of the bolt, an identity of the bolt; and receiving, by the first communication module, an identity of the bolt.
According to a fourth aspect, there is provided a computer program product comprising a computer program according to the third aspect and a computer readable means on which the computer program is stored.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a)/an/the element, device, component, means, step, etc" are to be interpreted openly as referring to at least one instance of the element, device, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
Drawings
Aspects and embodiments are now described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is a schematic diagram illustrating an environment in which embodiments presented herein may be applied;
FIG. 2 is a schematic view illustrating one embodiment of the lock assembly of FIG. 1;
FIG. 3 is a flow diagram illustrating an embodiment of a method for verifying the identity of a peg;
FIG. 4 is a schematic view showing components of the lock assembly of FIGS. 1 and 2; and
fig. 5 shows an example of a computer program product 90 comprising computer readable means.
Detailed Description
Aspects of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. These aspects may, however, be embodied in many different forms and should not be construed as limited; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of all aspects of the invention to those skilled in the art. Like reference numerals refer to like elements throughout the description.
FIG. 1 is a schematic diagram illustrating an environment in which embodiments presented herein may be applied. Access to the physical space 6 is restricted by a physical barrier 5, which physical barrier 5 is selectively controlled to be in a locked state or an unlocked state. The physical barrier 5 may be a door, window, gate, hatch, cabinet door, drawer, etc. The physical barrier 5 is disposed in a surrounding physical structure 7 (the surrounding physical structure 7 being a wall, fence, ceiling, floor, etc.), and the physical barrier 5 is disposed between the confined physical space 6 and the accessible physical space 4. It should be noted that the accessible physical space 4 may itself be a restricted physical space, but with respect to the physical barrier 5, the accessible physical space 4 is accessible.
The lock assembly 1 is arranged to lock the physical space 6. The lock assembly 1 includes a strike plate assembly 10 and a lock portion 15. One of the strike plate assembly 10 and the lock portion 15 is provided in the barrier 5 and the other is provided in the surrounding structure 7 (as shown) or in an opposing door (not shown) of a double door pair. For example, as shown in fig. 1, the lock 15 may be provided in the barrier 5 and the impact plate assembly 10 may be provided in the surrounding structure 7, or vice versa.
The lock portion 15 comprises one or more pegs (as shown in figure 2). The bolt may be displaceable (linearly or otherwise) to enable movement through a corresponding one of the holes of the strike plate assembly, whereby the bolt engages the strike plate and the barrier is locked. The bolt may for example be in the form of a locking bolt and/or a latch bolt.
In one embodiment, the lock assembly 1 is an electronic lock. To unlock the barrier 5, a controller 17 is then provided. The controller 17 forms part of a lock assembly 1, the lock assembly 1 being controllable by the controller 17 to be set in an unlocked state or a locked state. Alternatively, the lock is a mechanical lock for which it is desirable to monitor the locked/unlocked state.
Fig. 2 is a schematic diagram showing one embodiment of the lock assembly 1. The strike plate assembly 10 includes a strike plate and optionally at least one sensor device 11. When present, a sensor device 11 is provided for detecting the proximate presence of the peg. In the embodiment shown in fig. 2, there are two sensor devices 11, one sensor device 11 for each peg 13, 14. The strike plate may be made of metal and when the bolt (locking bolt 13 and/or latch bolt 14) extends through the holes 12 a-12 b in the strike plate into the surrounding structure 7, the strike plate fixes the position of the bolt (locking bolt 13 and/or latch bolt 14), thus making it difficult for an attacker to break the barrier.
The lock assembly also includes at least one instance of a first communication module 20 a. In this example, there are two instances of the first communication module 20a provided by the holes 12a to 12b, respectively. There are two instances of the first communication module 20a here, one first communication module 20a for each peg 13, 14.
Each peg 13, 14 comprises a second communication module 20 b. Each set of the first communication module 20a and the second communication module 20b communicate with each other. Optionally, the communication is encrypted. Alternatively or additionally, an authorization protocol, such as a challenge-response procedure, is employed. As explained in more detail below, this communication is used by the second communication module 20b to inform the first communication module 20a of the identity of the bolt. The identity may be transmitted digitally between the first communication module 20a and the second communication module 20b in the form of an alphanumeric sequence or a pure numeric sequence.
The strike plate assembly 10 is for use with a lock 15, the lock 15 including one or more pins 13, 14 in the form of a locking pin 13 and/or a latch pin 14. The striking plate 10 includes a first key hole 12a through which the locking key 13 can pass. When the lock bolt 13 has passed through the first bolt hole 12a, the lock portion 15 is in a locked state.
The sensor device 11 of the impact plate assembly 10 is used to detect the state of the locking bolts 13, 14. The state is that the bolt has extended through the hole of the striking plate or that the locking bolt has not extended through the striking plate. When applied to the locking bolt 13, this indicates that the lock is in a locked state when the locking bolt 13 extends through the strike plate. Conversely, when the locking bolt 13 does not extend through the strike plate, the lock is in the unlocked state. The sensor device 11 is arranged to be attached to the striking plate 10 such that a proximity sensor of the sensor device 11 is located in the vicinity of the location through which the locking bolt 13 is intended to pass.
Each instance of the first communication module 20a is arranged such that it can communicate with a corresponding second communication module 20 b. The communication between the first communication module 20a and the second communication module 20b may be wireless. Wireless signals from one of the first and second communication modules 20a, 20b power the other, for example, by inductive power transfer. In this way, only one of the first and second communication modules needs to be provided with an integrated power supply (e.g. a battery) or an external wired power link. The communication between the first communication module 20a and the second communication module 20b may be of any suitable type, such as RFID or a subset of the RFID specification and/or modifications. Since this communication between the communication modules 20a, 20b is carried out within the lock assembly 1, the communication protocol can be freely selected and need not conform to any particular communication standard.
The proximity sensors of the sensor device 11 may be based on any one or more of capacitance, inductance, infrared light, magnetism (e.g., hall sensors), photocells, sonar, mechanical switches, and the like. When the proximity sensor is an inductive sensor, this simplifies retrofitting since the inductive sensor can be used to detect the presence of a conventional metal locking bolt. The sensor device 11 may be a self-contained device including a proximity sensor, a battery, an antenna, and control circuitry. Such a sensor device 11 is easy to integrate in the impingement plate and can be replaced or upgraded when required.
Optionally, a ferrite film is provided between the sensor and the metal material proximate to the sensor. The ferrite film reduces the generation of eddy currents in the metallic material. The ferrite film may be disposed on the sensor side or the metal side. In this way, the energy losses caused by the eddy currents are greatly reduced.
The controller 17 may be connected to the first communication module 20a and each instance of the sensor device 11. The interface between the controller 17 and the first communication module 20a and the sensor device 11 may be implemented using a wireless interface or a wired interface. The wireless interface may be implemented, for example, using bluetooth, Bluetooth Low Energy (BLE), any of the IEEE802.15 standards, Radio Frequency Identification (RFID), any of the IEEE 802.11 standards, wireless USB (universal serial bus), etc. The wired interface may be implemented, for example, using USB, ethernet, a serial connection (e.g., RS-485), etc.
Further, the controller 17 may include a user credential interface 16 for communicating with user credentials 27. User credential interface 16 may be implemented using any suitable wireless interface, for example using bluetooth, BLE, any of the IEEE802.15 standards, RFID, Near Field Communication (NFC), any of the IEEE 802.11 standards, wireless USB, and so forth. Alternatively or additionally, the user credential interface 16 may be implemented using wired communications, e.g., using USB, ethernet, a serial connection (e.g., RS-485), etc.
Optionally, the controller 17 is provided with means for communicating with a remote control device (not shown) such as a smart phone, computer, etc. for remote lock management. Using remote communication, the controller 17 is remotely controllable, for example to allow access to specific user credentials or to unlock the lock remotely (e.g. for a merchant who has lost a key, a cleaner, a child, etc.). In addition, remote communication enables event monitoring of, for example, unlocked states, locked states, open, closed, etc., which may be detected using sensor devices and communication modules. Of particular importance, the lock status may be relied upon when a remote control interface is provided.
The user credentials 27 may be implemented using any suitable device that can be portable by the user and used to authenticate through the credential interface 16. The user credentials 27 are typically carried or worn by the user 8 and may be implemented as a mobile phone, smart phone, key fob, wearable device, smart phone case, access card, electronic physical key, or the like.
Using the user credential interface 16, the controller 17 may check the authenticity of the user credentials 27 during access control, for example using a challenge and response scheme. The authorisation to open the lock assembly 1 is then checked by the controller 17 itself or by communicating with an external (local or remote) authorisation device (not shown) to arrive at an access decision whether to grant or deny access.
The controller 17 also receives sensor data from the sensor device 11 indicating the presence or absence of the pegs 13, 14. The presence of the locking bolt 13 indicates an extended locking bolt 13 corresponding to a locked state, while the absence of the locking bolt 13 indicates a retracted locking bolt 13 corresponding to an unlocked state. Notably, the identity of the peg is also used by the controller 17. For example, the controller 17 may be configured to consider the bolt to be in a fixed state only if the bolt's identity is determined to be valid. In this manner, the loose bolt cannot be inserted into the strike plate to tamper with the lock assembly to consider the lock assembly as being in a locked state. An identity is considered valid when it is on the list of valid identity(s). In one embodiment, there is only one valid identity for a particular aperture (and thus a particular first communication module 20 a). The valid identity may be configured, for example, at deployment time.
The controller 17 is configured to: the lock assembly 1 is selectively controlled based on the identity of the bolt and sensor data received from the sensor device 11 and user credential data received through the credential interface 16.
Using the access decision, bolt identity and sensor data, the controller 17 determines whether to retract or extend the bolt 13 by sending appropriate control signals to the lock assembly 1.
Optionally, as shown in fig. 2, the strike plate assembly 10 further includes a second sensor device 11, the second sensor device 11 being used to detect the status of the individual latch bolts 14 of the lock assembly 1 to obtain better information about the status of the door. When the latch bolt 14 is present this indicates that the barrier 5 is closed. Conversely, when the latch bolt 14 is not present, this indicates that the barrier is open. Likewise, the identity of the bolt, here the latch bolt 14, is checked and only if its identity is valid is the latch bolt considered to be disposed through the corresponding hole 12 b. Thus, the presence or absence of the latch bolt 14 in the second bolt hole 12b of the striking plate 10, which is detected by the second sensor device 11 and sent as sensor data to the controller 17, can be interpreted as whether the barrier 5 is open (when the latch bolt 14 is not present) or closed (when the latch bolt 14 is present).
A user output device 18 may also be provided connected to the controller 17. The user output device 18 may be any one or more of an LED (light emitting diode), a lamp, a buzzer, a sound device, a display, etc. The controller 17 is then configured to provide user feedback via the user output device 18. For example, the user feedback may be used to indicate any of the following: access is granted, access is denied, access is granted but not changed (e.g., if the barrier has been opened), etc. When the controller 17 is remotely controllable, user output may optionally be provided in parallel with the device performing remote control. For example, if the user remotely unlocks the door for the merchant, a successful unlock would produce a green LED indicating that the door is unlocked for the merchant and an indicator on the user interface of the remote control device.
With the solution proposed herein, it is extremely difficult for an attacker to tamper with the lock assembly by inserting a loose bolt or other metal piece into the hole of the strike plate to determine that a valid bolt is present.
FIG. 3 is a flow diagram illustrating an embodiment of a method for determining the identity of a peg. As described above, the method is performed in a lock assembly that includes a strike plate assembly and a bolt that can be displaced to enable movement through an aperture of the strike plate assembly. The method may be applied to either or both of the bolt being a locking bolt or a latch bolt.
In the transmit power signal step 40, the lock assembly transmits a wireless signal from one of the first and second communication modules to power the other. This may be based on inductive power transfer, for example.
It should be noted that the rest of the method can only be performed if the power signal is transmitted. In other words, only if a power signal is sent, the identity of the bolt can be obtained and verified in a subsequent step.
In one embodiment, the first communication module is powered by the second communication module. In this case, a separate power supply is provided to supply power to the second communication module provided in the plug. For example, the peg may contain a power source in the form of a battery or a wired or inductive connection to an external power supply. By requiring power to be provided in the bolt to cause the lock assembly to function, it is even more difficult for an attacker to tamper with the lock assembly by inserting the loose bolt into the hole of the strike plate to entice the system to consider the lock assembly to be in the locked state.
In one embodiment, the second communication module is powered by the first communication module. In this case, an external power supply device is provided to supply power to the first communication module.
In send identity step 42, the lock assembly sends the identity of the bolt through the second communication module of the bolt. The identity may be sent wirelessly.
In receive identity step 44, the lock assembly receives the identity of the bolt through the first communication module.
In optional conditional identity validation step 45, the lock assembly determines when the identity of the bolt is determined to be valid. When this is the case, the method proceeds to an optional consider peg fixed step 46. Otherwise, the method ends.
In an optional consider bolt fixed step 46, the lock assembly considers the bolt to be in a fixed state. This also indicates that the barrier is protected.
In an optional detect bolt absence step 48, the lock assembly detects when the bolt has been retracted. This can be detected by a proximity sensor in the lock device. Proximity sensors may be made more energy efficient than communication modules, whereby polling for presence using proximity sensors uses less energy or may occur more frequently than using communication modules. When the bolt is retracted without being expected, this may indicate that an intrusion is being made.
Fig. 4 is a schematic diagram showing components of the lock assembly of fig. 1 and 2. The processor 17 is provided using any combination of one or more of a suitable Central Processing Unit (CPU), multiprocessor, microcontroller, Digital Signal Processor (DSP), etc., capable of executing software instructions 67 stored in the memory 64, and thus the memory 64 may be a computer program product. Alternatively, the processor 17 may be implemented using an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), or the like. The processor 17 may be configured to perform the method described above with reference to fig. 3.
The memory 64 may be any combination of Random Access Memory (RAM) and/or Read Only Memory (ROM). The memory 64 also includes a persistent storage device, which may be, for example, any single one or combination of magnetic memory, optical memory, solid state memory, or even remotely mounted memory.
A data memory 66 is also provided for reading and/or storing data during execution of software instructions in the processor 17. The data storage 66 may be any combination of RAM and/or ROM.
The lock assembly 1 also includes an I/O interface 62 for communicating with external and/or internal entities. For example, the I/O interface 62 includes means for communicating internally with the sensor device 11 and between the first communication module 20a and the second communication module 20 b. The I/O interface 62 also includes an optional user output device 18 and a user credential interface 16.
Other components of the lock assembly 1 have been omitted so as not to obscure the concepts presented herein.
Fig. 5 shows an example of a computer program product 90 comprising computer readable means. On which a computer program 91 may be stored, which may cause a processor to perform a method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or DVD (digital versatile disc) or blu-ray disc. As mentioned above, a computer program product, such as the computer program product 64 of FIG. 4, may also be embodied in the memory of the device. Although the computer program 91 is here schematically shown as a track on the depicted optical disc, the computer program may be stored in any way suitable for a computer program product, such as a removable solid state memory, e.g. a Universal Serial Bus (USB) drive.
A list of embodiments enumerated in roman numerals is now given from another perspective.
i. A lock assembly, comprising:
a strike plate assembly including an aperture;
a first communication module; and
a bolt displaceable to enable movement through at least one of the apertures of the impingement plate assembly, the bolt including a second communication module;
wherein the first communication module is configured to receive an identity of the bolt by communicating with the second communication module.
The lock assembly of claim i, wherein the bolt is a locking bolt.
The lock assembly of claim i, wherein the bolt is a latch bolt.
The lock assembly as claimed in any one of the preceding claims, wherein the first and second communication modules are configured to wirelessly communicate with each other.
The lock assembly of claim iv, wherein a wireless signal from one of the first and second communication modules powers the other.
An assembly of any preceding claim, wherein the assembly is configured to consider the bolt to be in a secured state only when the identity of the bolt is determined to be valid.
The lock assembly as claimed in any one of the preceding claims, wherein the strike plate assembly further includes a sensor device for detecting the proximate presence of the bolt.
A method performed in a lock assembly, the lock assembly including a strike plate assembly and a bolt displaceable to enable movement through an aperture of the strike plate assembly, the method comprising the steps of:
sending, by a second communication module of the peg, an identity of the peg; and
the identity of the bolt is received by a first communication module.
The method of claim viii, wherein said peg is a locking peg.
The method of claim viii, wherein the bolt is a latch bolt.
A method according to any one of claims viii to x, further comprising the steps of:
sending a wireless signal from one of the first communication module and the second communication module to power the other.
A method according to any one of claims viii to xi, further comprising the steps of:
the bolt is considered to be in a fixed state only if the bolt's identity is determined to be valid.
The method of any one of claims viii to xii, further comprising the steps of:
when the bolt has been retracted is detected by a proximity sensor.
A computer program comprising computer program code which, when run on a lock assembly comprising a strike plate assembly and a bolt displaceable to enable movement through an aperture of the strike plate assembly, causes the lock assembly to:
sending, by a second communication module of the peg, an identity of the peg; and
the identity of the bolt is received by a first communication module.
xv. a computer program product comprising a computer program according to claim xiv and a computer readable means on which the computer program is stored.
Aspects of the present disclosure have been described above primarily with reference to some embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims. Thus, while various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

Claims (15)

1. A lock assembly (1) comprising:
an impingement plate assembly (10), the impingement plate assembly (10) including apertures (12a, 12 b);
a first communication module (20 a); and
a peg (13, 14), the peg (13, 14) being displaceable so as to be movable through at least one hole (12a, 12b) of the impingement plate assembly (10), the peg (13, 14) comprising a second communication module (20 b);
wherein the first communication module (20a) is configured to receive the identity of the peg (13, 14) by communicating with the second communication module (20b), and wherein a wireless signal from one of the first communication module (20a) and the second communication module (20b) powers the other.
2. The lock assembly (1) according to claim 1, wherein said bolt is a locking bolt (13).
3. The lock assembly (1) according to claim 1, wherein said bolt is a latch bolt (14).
4. The lock assembly (1) according to any one of the preceding claims, wherein said first communication module (20a) and said second communication module (20b) are configured to wirelessly communicate with each other.
5. The lock assembly according to any one of claims 1 to 4, wherein said first communication module is powered by said second communication module.
6. The lock assembly according to any one of claims 1 to 4, wherein said second communication module is powered by said first communication module.
7. The lock assembly (1) according to any one of the preceding claims, wherein the lock assembly (1) is configured to consider the bolt in the secured state only when the identity of the bolt is determined to be valid.
8. The lock assembly (1) according to any one of the preceding claims, wherein said strike plate assembly (10) further comprises a sensor device (11) for detecting the proximate presence of said bolt (13, 14).
9. A method performed in a lock assembly (1), the lock assembly (1) comprising a strike plate assembly (10) and a bolt (13, 14), the bolt (13, 14) being displaceable so as to be movable through a hole (12a, 12b) of the strike plate assembly (10), the method comprising the steps of:
sending (40) a wireless signal from one of the first communication module (20a) and the second communication module (20b) to power the other;
-sending (42) the identity of the bolt (13, 14) through a second communication module (20b) of the bolt (13, 14); and
receiving (44) an identity of the bolt (13, 14) by a first communication module (20 a).
10. The method according to claim 9, wherein the bolt is a locking bolt (13).
11. The method of claim 9, wherein the bolt is a latch bolt (14).
12. The method according to any one of claims 9 to 11, further comprising the step of:
-considering (46) the bolt (13, 14) in the secured state only if the bolt identity is determined to be valid.
13. The method according to any one of claims 9 to 12, further comprising the step of:
detecting (48) when the bolt (13, 14) has been retracted by a proximity sensor (11).
14. A computer program (67, 91) comprising computer program code which, when run on a lock assembly (1) comprising a strike plate assembly (10) and a bolt (13, 14), causes the lock assembly (1) to perform operations in which the bolt (13, 14) is displaceable to enable movement through an aperture (12a, 12b) of the strike plate assembly (10), the operations comprising:
a wireless signal transmitted from one of the first communication module and the second communication module to power the other;
-sending the identity of the bolt (13, 14) through a second communication module (20b) of the bolt (13, 14); and
receiving, by a first communication module (20a), an identity of the peg (13, 14).
15. A computer program product (64, 90), the computer program product (64, 90) comprising a computer program according to claim 14 and a computer readable means on which the computer program is stored.
CN202080044787.5A 2019-06-19 2020-06-16 Bolt identity Active CN114008282B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP191813302 2019-06-19
EP18013302 2019-06-19
PCT/EP2020/066633 WO2020254326A1 (en) 2019-06-19 2020-06-16 Bolt identity

Publications (2)

Publication Number Publication Date
CN114008282A true CN114008282A (en) 2022-02-01
CN114008282B CN114008282B (en) 2023-02-10

Family

ID=79920835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080044787.5A Active CN114008282B (en) 2019-06-19 2020-06-16 Bolt identity

Country Status (1)

Country Link
CN (1) CN114008282B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2698656A1 (en) * 1992-12-02 1994-06-03 Lewiner Jacques Improvements to the devices for detecting the engaged position of a bolt.
DE19633628A1 (en) * 1996-08-21 1998-02-26 Roto Frank Ag Readiness switching of burglar alarm system
EP1795676A2 (en) * 2005-11-28 2007-06-13 Pilz GmbH & CO. KG Safety switch for generating an enable signal according to the position of a movable security door
US20150330120A1 (en) * 2014-05-16 2015-11-19 Schlage Lock Company Llc Low friction locking deadbolt
US20180155959A1 (en) * 2016-12-02 2018-06-07 Hampton Products International Corporation Deadbolt latch assembly with latch sensor having wireless status indicator

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2698656A1 (en) * 1992-12-02 1994-06-03 Lewiner Jacques Improvements to the devices for detecting the engaged position of a bolt.
EP0600795A1 (en) * 1992-12-02 1994-06-08 Jacques Lewiner Improvements to endposition detecting devices for a bolt
DE19633628A1 (en) * 1996-08-21 1998-02-26 Roto Frank Ag Readiness switching of burglar alarm system
EP1795676A2 (en) * 2005-11-28 2007-06-13 Pilz GmbH & CO. KG Safety switch for generating an enable signal according to the position of a movable security door
US20150330120A1 (en) * 2014-05-16 2015-11-19 Schlage Lock Company Llc Low friction locking deadbolt
US20180155959A1 (en) * 2016-12-02 2018-06-07 Hampton Products International Corporation Deadbolt latch assembly with latch sensor having wireless status indicator

Also Published As

Publication number Publication date
CN114008282B (en) 2023-02-10

Similar Documents

Publication Publication Date Title
US8965287B2 (en) Battery powered passive keyless entry system for premise entry
EP2172608B1 (en) Method for identifying keys for controlling locks
EP2919202B1 (en) RFID powered lock device
WO2016049159A2 (en) Long range wireless credentials for entryway
EP3147869A1 (en) Determining access in a scenario of a plurality of locks
EP3987133B1 (en) Bolt identity
US20210390810A1 (en) Biometric enabled access control
EP3987134B1 (en) Magnet in bolt
CN114008282B (en) Bolt identity
KR101230369B1 (en) The door-lock apparatus available to prevent hacking and method for authenticating smart-keys using the same
EP3743577B1 (en) Striking plate assembly
JP5796337B2 (en) Entrance / exit management system
KR100728656B1 (en) Digital door lock including locking device separated from the controller and method thereof
JP6839503B2 (en) Key management device, key management method and key management system
JP6839502B2 (en) Key management device, key management method and key management system
KR100665351B1 (en) Digital Door Lock Apparatus Equipped with Temporary Certification Means and Certification Method thereof
KR100634567B1 (en) System for controlling opening/locking of door using mobile terminal and recording-medium storing controlling method
JP6125816B2 (en) Electric lock system
US20240005712A1 (en) Controlling access based on a machine-learning model
JP4560326B2 (en) Entrance / exit management device and entrance / exit management method
JP2013185347A (en) Electric lock system
JP2012062727A (en) Electric lock system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant