![]() System and method of duplication of elements of opening of locks (Machine-translation by Google Tran
专利摘要:
Method and system for duplicating locks opening elements comprising a plurality of devices for reading the opening elements and generating digital codes of said opening elements and means of communication with a remote server to send the generated digital code to the remote server; the remote server where the digital codes are stored; and at least one duplicating device of the opening element that is configured to receive digital codes from the remote server by means of communication with the remote server and to duplicate each opening element from the corresponding received digital code. (Machine-translation by Google Translate, not legally binding) 公开号:ES2611784A1 申请号:ES201531616 申请日:2015-11-10 公开日:2017-05-10 发明作者:Iban GARCÍA MADINAGOITIA 申请人:Jma Alejandro Altuna S L U;Jma Alejandro Altuna SLU; IPC主号:
专利说明:
5 10 fifteen twenty 25 30 System and method of duplicating elements for opening locks. OBJECT OF THE INVENTION The present invention relates to a novel system and method of duplicating locks opening elements, such as keys, transponders and remote controls, which is based on the generation of digital codes corresponding to the opening means that each opening element incorporates ( mechanical teeth, RF signals, security codes, etc ...) through reading devices and that are sent to a remote server (cloud) where they are stored. These digital codes are subsequently downloaded to duplicate devices to copy or duplicate the opening element. In this way a distributed system of duplicate of these keys, transponders and remote controls is created, being able to duplicate them at any time and without the need to have the original opening element. In addition, the present invention avoids the need for users (stores, hardware stores, etc.) to have a complete duplicate machine (which integrates the reading and duplicate media) at each of the points of sale they have, to offer the duplicate service to the final customer. Thus, the system and method described in this document allows the final cutting or engraving process of the opening element to be carried out in a single or few locations where expensive and complex duplication devices are available, while a multitude of users They can have simple and economical reading devices. In this way many users will be able to offer the duplicate service, having only the reading device and sending a digital code of the key, transponder or remote control to the cutting and engraving center, through a remote server, where the device is available duplicate. This invention greatly lowers the investment in addition to getting more performance to the duplicating machines that will be constantly duplicating keys, transponders and remote controls of different users. 5 10 fifteen twenty 25 30 35 At present, the operation of duplicate keys and other elements of opening locks such as transponders or remote controls, is carried out through independent machines that perform a first stage of reading the element to be copied, a subsequent stage of processing the information obtained in the reading stage and the subsequent duplication stage of the item in question. There is a great diversity of machines that perform this process, whose cost is generally high since they have optical recognition elements such as lasers, cameras, mechanical elements such as motors and cutting devices, electronic regulation elements, interfaces, protections, etc. The opening devices of locks have different degrees of security, being the technology that is associated with each of them that determines the security of the same. Thus, the serreta keys, point keys, gorja keys ..., which are usually used in the doors of the houses and that have a mechanized mechanical code in the key which enables the opening of the lock are perfectly known . There are other types of opening devices for locks, such as the keys used in the automotive field and the most secure housing keys that, in addition to the mechanical code, have a radio frequency (RF) transponder chip in the key head. , which emits a code when it is excited. Current technologies allow the reading of this code and the copying of these transponder chips. There are also in the state of the art devices for opening locks that in addition to the mechanical code and the transponder chip have a third element such as a frequency remote control, for the opening of car doors, garages, etc., and which are a different technology than conventional transponders. Current technologies allow you to read the emission code of the frequency remote control and copy it to a compatible transmitter. Currently when an end customer goes to a user (hardware store-duplicate keys) the copy of the opening device, that is the key, is made at the same time and by techniques that can take a variable time. This forces the user to have on one side all the machines necessary to perform this duplicate operation 5 10 fifteen twenty 25 30 35 (reading / copying machine) and on the other hand you also have to have stock of the blank opening elements that are compatible with the opening device to be duplicated. Generally to copy opening devices with high degrees of security, such as original keys to card code (cards with proof of ownership of the key), it is necessary to have duplicate machines that have a high economic cost. Also, when these stores have more than one point of sale in the same city or in different cities, they must have duplicate machines and a stock of all the key models at each point of sale. Thus the current duplication systems of the opening devices of locks are inefficient and expensive. DESCRIPTION OF THE INVENTION In order to solve the problems set forth above, this document describes a system and a method for duplicating opening elements of locks where digital codes of the opening means are generated (mechanical teeth, emission codes, RF codes, etc.) of the opening elements in reading devices. These digital codes are stored on remote servers from where they are accessible for copying or duplicating operations, remotely and at any time (not necessarily at the time the opening element is read), on duplicate devices. In addition, a new management of the digital codes stored in the remote server by the users of the system is planned. Thus, a first object of the invention is a system for duplicating locks opening elements comprising: - at least one device for reading opening means of the opening element comprising a processor configured to generate a digital code of the opening means and means of communicating with a remote server to send the generated digital code to the remote server; - the remote server where the digital codes are stored; Y - at least one device for duplicating the opening element that is configured to receive digital codes from the remote server by means of communication with the remote server and to duplicate each opening element from the corresponding digital code received. 5 10 fifteen twenty 25 30 35 Both reading devices and duplicate devices are conventional devices. The remote server used to store the digital codes can be a single server or several that together provide a cloud service on the Internet. The codes that are stored in them refer to the mechanical and electronic information that a house key, car key or any other opening element of a lock, whether mechanical or electrical or electronic, can carry / store. When stored in the cloud, the information is accessible so that the user can share it or can be accessed by other users or by the same but in a different location than the one that has been read. In a preferred embodiment of the invention, the opening elements of locks are selected from a key, a transponder and a remote control. However, any element designed for the opening of any type of lock and that therefore has mechanical or electronic mechanical opening means that can also be duplicated in conventional duplicating, copying or cloning machines to fall within the scope of The present invention. In another preferred embodiment of the invention, the digital code of the opening means generated in the reading device comprises a model of the opening means, to use an equal or compatible element in the duplicate operation, and an opening code of the opening means. The model of the opening means is selected from a model or reference of the key, a model or reference of the transponder and a model or reference of the remote control. In turn, the opening code of the opening means is selected from a digital code of the mechanical teeth of the key, a digital code of a transponder chip and a digital emission code of the remote control. In the case of key locks, its model and the opening code are usually defined in different ways. One of them is through reading machines equipped with one or more cameras that take pictures of the key. Through an analysis of the images, and by comparison with a database that has images of all existing models, the model in question is identified and a profile of the teeth is extracted. It can also be done with a mechanical probe which palpates the surface and takes values from the surface of the key, being able by comparison to identify the model of the key to be used. However, in most cases the identification of the model is done by the user seeing the brand of the lock or the key, the car model and year in which it is used ... and looking or comparing with images of 5 5 10 fifteen twenty 25 30 35 Catalogue. The reading method used by the machines is usually by electrical contact detecting different points, by laser barrier detecting the vertices of the key (detecting the teeth) or also taking a photo in which the vertices can be analyzed and the heights taken of the teeth. There are a plurality of keys (knitted keys, serreta, wrench keys, cylindrical) so that reading systems may differ according to the model. In the case of transponders, apart from the mechanical lock, the keys with a greater degree of security, usually incorporate a chip (transponder) inside the plastic head that emits a digital code when excited. These chips have an antenna that when receiving a wave of 125KHz or 134Khz usually begins to emit a code or message. This code issued is analyzed to know which is the model of the chip and the opening code that it transmits. Normally the header of the message includes the model and the rest of the message incorporates the personal digital code of each chip. This technology is used in car keys, identification of clothes, food ... In the case of remote controls, the reading is carried out in two phases: first, by means of a tuner or frequency meter, the emission frequency of this command is searched. Second, the emitted digital code is read as the case of the transponder but with the antenna tuned to the previously located frequency. Once that code is analyzed and it is verified that it is fixed or evolutionary, and together with the emission frequency that has been previously located, the necessary command model is established and the obtained opening code is stored. In another preferred embodiment of the invention, the remote server comprises a memory where the digital codes of the opening elements are stored, each digital code being associated with an identifier of the opening element. In this way, by having the identifier, you can access the digital code associated with it for downloading in duplicate devices. The identifier can be associated with the end customer, the user (a store, hardware store, etc.) or both. In another preferred embodiment of the invention, the reading devices of the opening elements comprise means for recognizing mechanical toothing of the key, capacitors for deciphering a code of the key, reading elements of a code of the transponder, reading antennas of the RF transponder and reading antennas of a remote control code. In another preferred embodiment of the invention, the system has external electronic devices, such as mobile phones, tablets, computers, etc., which have means of communication with the remote server and with the reading and duplicating devices, where the 6 5 10 fifteen twenty 25 30 35 External electronic devices are configured to receive the digital codes of the reading devices and send them to the remote server and to receive the digital codes from the remote server and send it to the duplicate devices. In another preferred embodiment of the invention, the communication means of the reading devices and the duplicating devices with the remote server and the communication means of the external electronic devices with the remote server and with the reading devices and the devices Duplicate are a means of internet connection. More preferably, this internet connection is selected from a WIFI connection, telephone data connection, wiring connection, and any combination of the above. In this way, the reading and duplicating devices could have connection means with the external electronic device, such as 3G, 4G, WIFI, Bluetooth connections, wiring, and in turn the external electronic devices will have wireless connection means with the remote server, such as 3G, 4G, WIFI connections, etc. In this way, the information collected on the reading device will be passed to the electronic device and from there, via the Internet, to the remote server. Similarly, the digital codes would be received by the electronic device from the remote server that would later be transferred to the duplicating device. In another preferred embodiment of the invention, each reading device comprises an encoder for encoding the generated digital codes and each duplicating device comprises a decoder for decoding the encoded digital codes received from the remote server. In another preferred embodiment of the invention, the external electronic devices comprise an internal memory that stores a list of models of opening elements to identify the open opening element. In this way, the external electronic devices generate the digital code by processing the information related to the model of the opening element and the opening code read and sending it directly to the remote server where it is stored. Preferably, it is envisioned that the system comprises a large number of reading devices and a reduced number of duplicating devices. Since the cost of duplicate devices is considerably higher than that of reading devices, it is achieved through the distributed system described in the present invention, a duplicate system much cheaper and more efficient than current duplicate systems in that the machines integrate 5 10 fifteen twenty 25 30 35 both the reading media and the duplicate media of the keys, transponders and / or remote controls. The reading devices used may be of a different nature and among them are: - key recognition devices and mechanical teeth: devices with vision cameras and an internal database capable of identifying the key model introduced in the device and capacitor to decipher the key code; - devices for reading the transponder digital code: usually an antenna that reads the transponder code by RF. - devices for reading the code of the control of the car key, garage, which also has an antenna for reading the security code of the remote control. A second object of the present invention is the method of duplicating locks opening elements, which makes use of the system described above. Said method comprises the following steps: - insert an opening element in the reading device; - generate a digital code corresponding to the opening means of the opening element by means of the processor of the reading device; - send the generated digital code to the remote server where it is stored; - download the digital code on the duplicate device from the remote server; and, -duplicate the opening element in the duplicate device from the digital code Discharged. In a preferred embodiment of the method, the sending of the digital code generated to the remote server and the downloading of the digital code in the duplicate device from the remote server is done through the external electronic devices. In another preferred embodiment of the method, an identifier of the opening element is generated in the processor of the reading device that is sent to the remote server together with the digital code of the opening means, the digital code associated with the identifier of the opening element being stored correspondent. In this way, by having the identifier, you can access the digital code associated with it for downloading in duplicate devices. It is also planned that access to digital codes can be made through searches on the server by date of creation of the digital code, customers, etc. 5 10 fifteen twenty 25 30 35 In another preferred embodiment of the method, the generated digital code is encoded in the reading device and decoded once downloaded in the duplicate device. This increases the security of the system since only authorized duplication devices will have the codecs to decode certain keys for greater security. In another preferred embodiment of the method, authorizations are assigned to users allowing access of said users to the digital codes stored in the remote server based on the assigned authorizations. Preferably, the assignment of authorizations to the users is provided, either as an administrator user, with full access to the information stored on the remote server, or as a guest user, with limited access to the information stored on the remote server. In addition, the object of the present invention is a computer-readable medium that stores a computer program which, when loaded on external electronic devices, configures external electronic devices to manage the method described above. Preferably, the computer program is an application that is installed on electronic devices (smartphones, tablets, laptops or personal computers) that is responsible for communicating with the remote server, reading devices and duplicators to exchange information related to: model of the key to be used, the mechanical gear code of the lelda key, the transponder model, the digital code of the transponder if it exists and also the code of the command and the model or type of the command if it is read. All these reading devices of a different nature will transmit to the application the code (either mechanical or electronic) referring to the element. So the application has all the necessary information to be able to duplicate or clone all this information in another element compatible with the money. Thus, the method and system object of the invention has the advantage that the user (store, hardware, ...) does not need to have machines that integrate both the reading media and duplicators and duplicate material (keys, remote controls and transponders blank) at each point of sale, but you can share the information acquired in the stores where you only have reading devices so that the store that has the duplicate machine of the keys, transponders or remote controls, can access that information and can perform duplication remotely. These duplicate keys could be sent later to the initial store where the reading was made or to any other point of sale or even to the final customer. The method and system object of the present invention will imply that the stores have to have devices capable of reading the aforementioned opening means such as the key model, mechanical code of the key, digital code of 9 5 10 fifteen twenty 25 30 35 transponder or the internal code of the remote control. But these devices have lower cost than the electronic cutting machines that are used for duplicating the opening elements. Therefore, the use of a remote server that allows the information acquired to be shared makes it possible for the user to provide the complete service in all their stores, without having to make large investments in each point of sale available. The present invention would also allow different geographically located users to access the same area of the cloud so that they can share the stored information and therefore the duplicate tasks to be performed. BRIEF DESCRIPTION OF THE FIGURES To complement the description that is being carried out and in order to help a better understanding of the characteristics of the invention, a set of drawings is attached as an integral part of said description, where with an illustrative and non-limiting nature, the next: Figure 1.- Shows a schematic view of the main elements that make up a particular realization of the system object of the present invention. Figures 2 and 3.- They show a particular embodiment of the organization of the information stored in the remote system server of the present invention. Figures 4 and 5.- They show flow charts of a particular embodiment of the method object of the present invention. DESCRIPTION OF VARIOUS EXAMPLES OF EMBODIMENT OF THE INVENTION Next, a description of several examples of realization of the invention is made, with an illustrative and non-limiting character, referring to the numbering adopted in the figures. Figure 1 shows a schematic view of a particular embodiment of the system object of the present invention. It also shows by arrows the information flows between the different elements of the system. Specifically, a remote server (cloud) (1) connected via internet (2) with electronic tablets (3) located at 2 points of sale (6) and 10 5 10 fifteen twenty 25 30 35 with another electronic tablet (5) located at a manufacturing point (7). Specifically, the two outlets (6) have 3 reading machines (8,9,10), a first key reading (8), a second reading the transponder codes (9) and a third for reading remote control codes (10). The manufacturing point (7) has 3 duplicating machines (11,12,13), a first for duplicating keys (11), a second for duplicating transponders (12) and a third for duplicating remote controls (13 ). However, the necessary technology for reading keys, transponders and remote controls could be integrated into a single machine and in the same way the technology for duplication could be integrated into a single machine. Optionally, both the points of sale and manufacturing could have machines for reading and / or duplicating interchangeably. The remote server (1) will have protection means and will be encrypted against unauthorized access. The internet connections (2) between the remote server (1) and the tablets (3,5) will be internet connections via WIFI, although it could be another type of technology depending on the type of electronic device that is used. These tablets (3,5) will have an application specifically designed to be able to communicate with the remote server (1) and the reading (8,9,10) and duplicate (11,12,13) machines. The connection means (2) of the application with the remote server (1) will be transparent for the application and will use different technologies such as, for example, transmission of telephone data, 3G, 4G, WIFI, Bluetooth and wired DSL network, cable .. The data connection used will be encrypted at all times so that the transmitted data is protected and illegible to third parties who may be analyzing the means of transmission of the application to the cloud (1). The tablet (5) will use the application to interact with the remote server (1) and the different machines or duplicate devices (11,12,13) of the hardware (7), which can be electronic key cutting machines, machines of duplication and donation of transponders, machines for copying of remote controls ... This application has integrated a database where different models of opening elements are stored, searches of these opening elements made previously, technical information of duplicate of each element of opening, opening item codes and also stores instructions for managing the opening items made and links to the user's end customers. Ace! the opening elements made can be assigned to the corresponding clients, so that in the future copies of the same opening elements can be made to the client without having to arrange 5 10 fifteen twenty 25 30 35 of them at that time (copy of the original opening element), since all the duplicate information of the new opening element is stored in this database. In turn, the tablets (3) of the outlets (6) have connection means (4) of the application with the different reading machines (8,9,10). The connection medium in this case can also be a Bluetooth wireless communication, WIFI or a wired transmission in different ways such as Ethernet, USB, RS-232 communication port, or a specific cable manufactured to communicate the application installed in a mobile device or personal computer using a port of this that is wired to an input port of the machine. Figure 2 shows a concrete realization of the remote server (1) where said remote server (1) is a structured database where the information that is stored is organized as follows: firstly the database memory will be divided in groups (14), which for example could correspond to hardware chains, where each group (14) will be in turn formed by all users (15) (stores, hardware, etc.) that belong to each chain of hardware differentiating among them by the username (user 1, user 2, ... user N) that is indicated in the registration phase of the same through the application. For example, "Group 1" could belong to a chain of ferretehas distributed throughout the geography of Spain where users of said "Group 1" are "ferreteha Madrid", "ferreteha Barcelona", "ferreteha Bilbao", etc. The first user to register through the application is the one who generates a new group and automatically becomes a group administrator user (52). The other users will be invited from the group. In addition, the administrator user can turn another guest user into an administrator user, this circumstance can originate if, for example, there is a guest user who has copy machines in his shop. Figure 3 shows a detailed embodiment of how the information is structured within each group (14). Specifically, a "Group 1" (14) is shown where the administrator user (52) has enabled 3 guest users (16,17,18). The guest users (16,17,18) can share the opening elements read in their establishment so that once the administrator user (52) is uploaded to the shared zone, he can access the pending duplicate requests and duplicate the opening elements in his establishment.Each guest user (16,17,18) is notified when the request for copy that he has uploaded has been read to his knowledge. 5 10 fifteen twenty 25 30 35 Each guest user (16,17,18) only sees the opening elements that he has shared (19,20,21) and does not see the opening elements of the other invited users, while the administrator user (52) can see all opening elements shared (19,20,21) by guest users (16,17,18). Shared opening element is understood as those server records that refer to the digital codes of the opening means of the opening elements. Likewise, a "request status" field is used to avoid making two copies of the same opening element informing the guest user that the requested opening element is being copied and makes if there are two admin users as soon as the request lelda cannot be read again by the other administrator. Each guest user (16,17,18) stores the data of the end customers (23) for which it makes the opening elements and also the history (22) of opening elements (data of the opening elements) that is made To each client. This part of the client database (23) and the history of opening elements (22) of each client is private of each guest user, the other users do not have access to said information, unless approved by the administrator. The administrator user (52) stores a list of enabled guest users (24) as well as a history of duplicate opening elements (26) and clients (25) (the administrator user can also act as a guest user in relation to make copies of opening elements). Likewise, the cloud has a backup copy of all the information so that in the future if it is necessary to change for the user of Smartphone, tablets or PC, it will be able to synchronize this information, since users use the same username and password to access previously stored information. In this way it is always possible to have copies of the original opening element, that is, instead of making the copy of the copy of the opening element, which in the long run makes said copy inaccurate and the opening element does not function, a copy of the original opening element is made by having the data saved. Another advantage is that in case of losing, for example, the car key if you are outside your community, going to a user who belongs to the group and with your personal data provide you with a copy of said key. Two examples of system realization and method object of the invention are described below. 5 10 fifteen twenty 25 30 35 In a first example of realization, the user is a manufacturer / distributor that has all the material for the duplication of opening elements in its warehouse or factory, including reading and duplicating machines and all kinds of keys, remote controls and transponders. Figure 4 shows the flow chart of the steps of the duplicate process of a key, command or transponder for this embodiment. In this case, the application (27) is installed on a mobile device or PC through which the manufacturer will create a group (28) on the server by assigning a name to the group and an access password. In addition, it will create the user ID (29) which, in this case also being the creator of the group, will automatically be created as administrator by also assigning a password as administrator user. Once the group has been created, you will create different guest users (30) with their corresponding access passwords. Optionally, each user will be assigned a card (31) with their own user data such as name, address, telephone, zip code, etc. These users are assigned authorizations so that they can have a category of guests or administrators. Depending on the authorizations assigned, users will have access to certain information stored in the cloud. Thus, the administrator user who created the group generates different guest users corresponding to the manufacturer's points of sale. Subsequently, the IDs of the invited users along with their corresponding access passwords are sent (32) to the different stores that correspond to the users. Thus, these invited users when installing the application (33) in their corresponding mobile devices or PCs, can access the group of the remote server each identifying with its corresponding user and password. In this way, the stores of the distributor that are invited users can read data of keys, controls or transponders (34) using simple low-cost reading machines to generate (35) the corresponding digital codes and upload them (36) to the cloud together with a Work order petition. The manufacturer is notified (37) from the server through the application that a work order has arrived. The manufacturer downloads the digital code (38) of the corresponding key, command or transponder and, since it has all the duplicate machinery, keys, controls and transponders, it duplicates (39) the key, command or transponder with the information previously stored by the guest user. Since the ID of the guest user is stored together with the digital code of the key, command or transponder on the remote server, the administrator knows to which store he has to send the key, command or transponder. Optionally it can also be stored together with each digital code of the keys, controls or transponders data 5 10 fifteen twenty 25 30 35 of the end customer, so that the administrator can send the key, command or transponder directly to the end customer's house. Since there may be several administrator users, the system has provided that when a digital code of a key, command or transponder shared by a guest user is downloaded, it is also recorded that the associated work order has already been processed by the administrator who has downloaded the code, so that the user who shared it has notification that their order is being processed, and so that the rest of the administrative users know that the work has already been done. Thanks to this system, the initial administrator also obtains information about the management of their stores, knowing that users are the ones who request the most copies. Information is also obtained on the most demanded keys, controls or transponders in order to control the stocks in their warehouses. In a second example of realization, the user is a hardware store. Figure 5 shows the flow chart of the steps of the duplicate process of a key, command or transponder for this embodiment. Here the hardware store has the reading and duplicating machines in the main store and the application installed (40) on a mobile device or PC that is located in the store itself. Thus, the owner of the hardware store generates a group (41) of the store in which it will be the administrator user (42) and additionally generates some guest users (43) (employees) with their respective access codes (44). The employees will install the application (45) on mobile devices (phones or tablets), in order to be able to use them in their external technical assistance trips (private homes, etc.). Normally when they have to make a repair of a door, garage or car, the hardware store or some shop worker moves to the customer's house. In this case, the worker will carry in his assistance vehicle a reading machine and the mobile with the application installed and since he is registered as a guest user, he will have enough tools in the client's house to read the key, command or transponder (46 ) that you need to duplicate, generate the corresponding digital code along with the work order (47) and share it in the group (48) created by the owner of the hardware store. In the hardware store, once the notification of pending work (49) has been received, they can access as an administrator user the digital code of the key, command or transponder (50) that the worker has remotely read and duplicate the key, command or transponder (51). In this way you can send the copy of the key, command or transponder to the customer, without having to return to the store with the original key, command or transponder to generate the duplicate. 5 In any of the examples described above, it is intended that invited users can send digital codes of keys, transponders and remote controls to the remote server and that they can also view the history of stored codes corresponding to the group to which they have access. On the other hand, administrator users may also view digital codes stored in groups related to all establishments of a single chain or owner, in addition to having the functions of managing duplicate / engraving tasks.
权利要求:
Claims (15) [1] 5 10 fifteen twenty 25 30 35 1. Duplicate system for opening elements of locks, characterized in that it comprises: - at least one device for reading opening means of the opening element comprising a processor configured to generate a digital code of the opening means and means of communicating with a remote server to send the generated digital code to the remote server; - the remote server where the digital codes are stored; Y - at least one device for duplicating the opening element that is configured to receive digital codes from the remote server by means of communication with the remote server and to duplicate each opening element from the corresponding digital code received. [2] 2. Duplicate system of opening elements of locks, according to claim 1, wherein the opening elements of locks are selected from a key, a transponder and a remote control. [3] 3. Duplicate system of opening elements of locks, according to claim 1, wherein the digital code of the opening means generated in the reading device comprises a model of the opening element and an opening code of the opening element. [4] 4. Duplicate system of opening elements of locks, according to claims 2 and 3, wherein the opening code of the opening element is selected from a mechanical toothed code of the key, an RF signal encoded from a transponder chip and a broadcast code of the remote control. [5] 5. Duplicate system of opening elements of locks, according to claim 1, wherein the remote server comprises a memory where the digital codes of the opening elements are stored, each digital code being associated with an identifier of the opening element. [6] 6. Duplicate system of opening elements of locks, according to claim 4, wherein the reading devices of the opening elements comprise means for recognizing the mechanical teeth of the key, capacitors for deciphering a code of the key, elements of 5 10 fifteen twenty 25 30 35 reading of the encoded RF signal of the transponder, reading antennas of the RF transponder and reading antennas of the remote control emission code. [7] 7. - Duplicate system of opening elements of locks, according to any one of the preceding claims, comprising external electronic devices that have means of communication with the remote server and with the reading and duplicating devices, where the external electronic devices They are configured to receive the digital codes of the reading devices and send them to the remote server and to receive the digital codes from the remote server and send it to the duplicate devices. [8] 8. Duplicate system of opening elements of locks, according to claim 7, wherein the means of communication of external electronic devices with the remote server are means of connection to the Internet. [9] 9. Duplicate system for opening elements of locks, according to claim 7, wherein the communication means of the electronic devices with the reading devices and the duplicating devices are selected from wireless internet connection means and wired media. [10] 10. Duplicate system of opening elements of locks, according to any one of the preceding claims, wherein the external electronic devices comprise an internal memory that stores a list of models of opening elements to identify the open opening element. [11] 11. Duplicate method of opening elements of locks, which makes use of the system described in any one of claims 1 to 10, wherein the method comprises: - insert an opening element in the reading device; - generate a digital code corresponding to the opening means of the opening element by means of the processor of the reading device; - send the generated digital code to the remote server where it is stored; - download the digital code on the duplicate device from the remote server; Y, - duplicate the opening element in the duplicate device. [12] 12. Duplicate method of opening elements of locks, according to claim 11, wherein the sending of the digital code generated to the remote server and the download of the digital code in the duplicate device, is done through the external electronic devices. [13] 13. - Duplicate method of opening elements of locks, according to claim 11, where an identifier of the opening element is generated in the processor of the reading device that is sent to the remote server together with the digital code of the opening element, storing the digital code associated with the identifier of the opening element 5 corresponding [14] 14. - Duplicate method of opening elements of locks, according to claim 11, wherein the method assigns authorizations to some users allowing user access to the digital codes stored in the remote server according to the assigned authorizations. 10 [15] 15. - Computer-readable medium that stores a computer program that, when loaded on external electronic devices, configures external electronic devices to manage the method described in any one of claims 11 to 14.
类似技术:
公开号 | 公开日 | 专利标题 US11170594B1|2021-11-09|Access management and reporting technology EP3228107B1|2021-03-24|Access control system with virtual card data CN104468179B|2019-04-05|The method and control device executed by control device ES2869159T3|2021-10-25|Procedure and system to enable remote check-in and coordinate access control US20150063164A1|2015-03-05|Provisioning of Electronic Devices US20140002236A1|2014-01-02|Door Lock, System and Method for Remotely Controlled Access US10498538B2|2019-12-03|Time-bound secure access WO2018213090A1|2018-11-22|Universal access control device US9503902B1|2016-11-22|Proximity-based system that secures linked IP enabled devices US20160241551A1|2016-08-18|System and a method for validating an identification token CN105379409A|2016-03-02|EHF secure communication device CN105684483A|2016-06-15|Registry apparatus, agent device, application providing apparatus and corresponding methods US11256222B2|2022-02-22|Assistance for the causing of actions US10013833B2|2018-07-03|Transponder key replication ES2611784B1|2018-03-05|System and method of duplicating locks opening elements US20170249816A1|2017-08-31|System and method for proving physical presence KR101360784B1|2014-02-12|Method for authenticating information written in RFID tag and RFID access device configured to conduct the same method RU2701056C2|2019-09-24|Method and device for selecting wireless reader action, used for output data received from wireless identification device ES2837359T3|2021-06-30|Mobile device with access rights management EP2770663A1|2014-08-27|Encryption Key-Based Product Authentication System and Method DK3145761T3|2018-10-29|IMPROVED SYSTEM FOR IDENTIFICATION OF A VEHICLE Sadler et al.2020|Radio-Frequency Identification | Multi-Reader/Integrated Sensor Architecture | Publisher Software Documentation ES2678418B1|2019-05-22|Delivery control system and delivery control procedure through the same US20210295624A1|2021-09-23|Wireless access control using an electromagnet ES2597254A1|2017-01-17|Control system for vehicles that include an on-board diagnostic connection |
同族专利:
公开号 | 公开日 ES2611784B1|2018-03-05| EP3375751A1|2018-09-19| EP3375751A4|2018-12-05| WO2017081344A1|2017-05-18|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 ES2236973T3|1999-01-28|2005-07-16|International Business Machines Corporation|METHOD AND CONTROL SYSTEM OF ELECTRONIC ACCESS.| ES2351187T3|2002-05-20|2011-02-01|Universal Electronics, Inc.|SYSTEM AND METHOD FOR AUTOMATICALLY CONFIGURING A UNIVERSAL REMOTE.| ES2423679T3|2005-07-19|2013-09-23|Baimos Technologies Gmbh|Identification and / or closure system for the identification and / or unlocking of a technical system and procedure for its operation| ES2522916A2|2013-05-16|2014-11-19|José ÁLVAREZ RODRÍGUEZ|Wireless universal remote control receiver for vehicles, home automation and industry through mobile devices | ES2535209A1|2015-01-15|2015-05-06|José Carlos CURIEL FRANCO|Method and access control system in automatic opening devices through a universal remote control | US9963908B2|2004-09-10|2018-05-08|Hy-Ko Products Company|Data key and method of using same| ITPN20070040A1|2007-05-29|2008-11-30|Bianchi 1770 S P A|"METHOD FOR THE DUPLICATION OF KEYS WITH ELECTRONIC CODE"| US10013833B2|2013-03-15|2018-07-03|RB Distribution, Inc.|Transponder key replication|WO2022018067A1|2020-07-22|2022-01-27|Germani Giacomo|Method and system for controlling access in radio-controlled opening devices|
法律状态:
2018-03-05| FG2A| Definitive protection|Ref document number: 2611784 Country of ref document: ES Kind code of ref document: B1 Effective date: 20180305 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 ES201531616A|ES2611784B1|2015-11-10|2015-11-10|System and method of duplicating locks opening elements|ES201531616A| ES2611784B1|2015-11-10|2015-11-10|System and method of duplicating locks opening elements| EP16863717.1A| EP3375751A4|2015-11-10|2016-11-08|System and method for duplicating lock-opening elements| PCT/ES2016/070793| WO2017081344A1|2015-11-10|2016-11-08|System and method for duplicating lock-opening elements| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|