US 9,811,960 B2
Method and system for the configuration of small locking systems
Ludger Voss, Munich (DE)
Assigned to SIMONSVOSS TECHNOLOGIES GMBH, Unterfohring (DE)
Appl. No. 14/429,898
Filed by SimonsVoss Technologies GmbH, Unterfohring (DE)
PCT Filed Sep. 20, 2013, PCT No. PCT/EP2013/069645
§ 371(c)(1), (2) Date Mar. 20, 2015,
PCT Pub. No. WO2014/044832, PCT Pub. Date Mar. 27, 2014.
Claims priority of application No. 12185551 (EP), filed on Sep. 21, 2012.
Prior Publication US 2015/0235497 A1, Aug. 20, 2015
Int. Cl. G05B 19/00 (2006.01); G07C 9/00 (2006.01)
CPC G07C 9/00309 (2013.01) [G07C 2009/00769 (2013.01); G07C 2009/00865 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A method for the configuration and administration of a locking system comprising at least one electronic locking and at least one identification medium for operating the locking, wherein the method comprises the following steps:
a) providing a smartphone with an administration software for the administration and configuration of the at least one locking and the at least one identification medium wherein the smartphone may communicate with the locking and the identification medium via a wireless communication link;
b) allocating access rights of the identification medium to the locking via the administration software of the smartphone and locally storing said allocation of access rights in the smartphone, wherein the allocation of access rights from identification media to corresponding lockings may be visualized and configured by means of a locking-identification-media-matrix on the display of the smartphone;
c) reading out the identification data which are specific for the locking/identification medium and transmitting said data as well as the access rights from step b) to a cloud,
d) generating programming data, preferably encoded programming data, and/or key data in the cloud by means of a server in the cloud on the basis of said transmitted allocations;
e) receiving the programming data or the encoded programming data and/or key data from the cloud using the smartphone; and
f) transmitting the key data from the smartphone to the at least one identification medium and/or transmitting the programming data from the smartphone to the locking.