SE545352C2 - Electronic lock configured to receive power from a mobile phone - Google Patents
Electronic lock configured to receive power from a mobile phoneInfo
- Publication number
- SE545352C2 SE545352C2 SE1951396A SE1951396A SE545352C2 SE 545352 C2 SE545352 C2 SE 545352C2 SE 1951396 A SE1951396 A SE 1951396A SE 1951396 A SE1951396 A SE 1951396A SE 545352 C2 SE545352 C2 SE 545352C2
- Authority
- SE
- Sweden
- Prior art keywords
- electronic lock
- barrier
- connector
- mobile phone
- lock
- Prior art date
Links
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B47/0001—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
- E05B47/0012—Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with rotary electromotors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/0057—Feeding
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/0057—Feeding
- E05B2047/0063—Energy transfer from key to lock, e.g. for emergency opening
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2015—Redundant power supplies
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00761—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00841—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Telephone Function (AREA)
Abstract
It is provided an electronic lock (1) for controlling access to a physical space (16) secured by a barrier (15). The electronic lock (1) comprises: a processor (60); a connector (20) configured to receive power from a connected mobile phone (2), to thereby power the electronic lock (1); and a memory (64) storing instructions (67) that, when executed by the processor, cause the electronic lock (1) to: communicate with a credential to evaluate whether access to the physical space is to be granted.
Description
ELECTRONIC LOCK CONFIGURED TO RECEIVE POWER FROM A MOBILE PHONE TECHNICAL FIELD id="p-1" id="p-1"
id="p-1"
[0001] The present disclosure relates to the field of electronic locks and in particular to an electronic lock configured to receive power from a mobile phone.
BACKGROUND id="p-2" id="p-2"
id="p-2"
[0002] Locks and keys are evolving from the traditional pure mechanical locks. These days, electronic locks are becoming increasingly common. For electronic locks, no mechanical key profile is needed for authentication of a user. The electronic locks can be opened using an electronic key stored on a dedicated carrier (fob, card, etc.) or in a smartphone. The electronic key and electronic lock can e.g. communicate over a wireless interface. Such electronic locks provide a number of benefits, including improved flexibility in management of access rights, audit trails, key management, etc. id="p-3" id="p-3"
id="p-3"
[0003] However, unlike mechanical locks, electronic locks require a power source. Electronic locks can be powered over from a mains power supply, but this implies large requirements on the installation, in terms of cost, time, installer skill and physical appearance. Alternatively, electronic locks can be battery powered, but batteries only hold a limited amount of power and run out of power after a certain period of time, which requires timely battery replacement in order to ensure continuous operation of the electronic lock. Energy harvesting solutions have also been presented, where electrical energy is obtained by converting mechanical energy (e. g. from physical movement of door, handle or physical key) to electric energy and storing the electric energy in the electronic lock for the next usage. However, energy harvesting solutions might not be reliable enough, especially for electronic locks that are only occasionally used.
SUMMARY id="p-4" id="p-4"
id="p-4"
[0004] One object is to improve how power is supplied to electronic locks. id="p-5" id="p-5"
id="p-5"
[0005] The invention is defined in the independent claims. Optional embodiments are defined in the dependent claims. id="p-6" id="p-6"
id="p-6"
[0006] Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/ an/ the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
BRIEF DESCRIPTION OF THE DRAWINGS id="p-7" id="p-7"
id="p-7"
[0007] Aspects and embodiments are now described, by way of example, with refer- ence to the accompanying drawings, in which: id="p-8" id="p-8"
id="p-8"
[0008] Fig 1 is a schematic diagram showing an environment in which embodiments presented herein can be applied; id="p-9" id="p-9"
id="p-9"
[0009] Fig 2 is a schematic drawing illustrating details in the vicinity of the barrier actuator of Fig 1, provided on the accessible side of the barrier, according to one embodiment; id="p-10" id="p-10"
id="p-10"
[0010] Fig 3 is a schematic drawing illustrating an inside part of the electronic lock of Fig 1, provided on the restricted side of the barrier 15, according to one embodiment; id="p-11" id="p-11"
id="p-11"
[0011] Fig 4 is a schematic diagram illustrating components of the electronic lockof Fig 1; and id="p-12" id="p-12"
id="p-12"
[0012] Fig 5 is a schematic drawing illustrating an embodiment of a dedicated key device that can be used for interacting with the electronic lock of Fig DETAILED DESCRIPTION id="p-13" id="p-13"
id="p-13"
[0013] The aspects of the present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. These aspects may, however, be embodied inmany different forms and should not be construed as limiting; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and to fully convey the scope of all aspects of invention to those skilled in the art. Like numbers refer to like elements throughout the description. id="p-14" id="p-14"
id="p-14"
[0014] Fig 1 is a schematic diagram showing an environment in which embodiments presented herein can be applied. Access to a physical space 16 is restricted by a physical barrier 15 which is selectively unlockable. The physical barrier 15 stands between the restricted physical space 16 and an accessible physical space 14. Note that the accessible physical space 14 can be a restricted physical space in itself, but in relation to this physical barrier 15, the accessible physical space 14 is accessible. The accessible physical space 14 is also here referred to as "the outside" and the restricted physical space 16 is also here referred to as "the inside". These terms are to be construed in relation to the physical barrier 15 between these two physical spaces 14, 16. The barrier 15 can be a door (including car door), gate, hatch, cabinet door, drawer, window, etc. It is to be noted that while Fig 1 is depicted in the context of the restricted physical space 16 being a building, the restricted physical space 16 can be any restricted physical space secured by an electronic lock, such as a vehicle, a cabinet, drawer, etc. id="p-15" id="p-15"
id="p-15"
[0015] In order to control access to the physical space 16, by selectively unlocking the barrier 15, an electronic lock 1 is provided. id="p-16" id="p-16"
id="p-16"
[0016] A barrier actuator 5a, e.g. in the form of a handle, knob, etc., is provided to allow a person to open the barrier 15 when the electronic lock 1 is in an unlocked state. id="p-17" id="p-17"
id="p-17"
[0017] The electronic lock 1 can be provided on the inside of the barrier 15 (as shown) or in the structure 17 surrounding the barrier 15 (not shown). Alternatively, the electronic lock 1 can be provided in the barrier 15 itself (not shown). The electronic lock 1 is controllable to be in a locked state or in an unlocked state, based on communication with a credential for evaluating whether access to the physical space is to be granted. id="p-18" id="p-18"
id="p-18"
[0018] When the electronic lock 1 is in an unlocked state, the barrier 15 can be opened and when the electronic lock 1 is in a locked state, the barrier 15 cannot beopened. In this way, access to a restricted physical space 16 is controlled by the electronic lock id="p-19" id="p-19"
id="p-19"
[0019] According to embodiments presented herein, the electronic lock comprises a connector which is configured to receive power from a connected mobile phone 2, to thereby power the electronic lock 1. The mobile phone 2 is any mobile phone comprising a port to which a cable 4 can be connected to supply power to the electronic lock 1. For instance, the mobile phone 2 can be a smartphone. In this way, the electronic lock 1 can be powered by the mobile phone id="p-20" id="p-20"
id="p-20"
[0020] In one embodiment, the connector of the electronic lock 1 is also used for the communication with the mobile phone 2. In other words, the connector is configured to enable communication between the electronic lock 1 and the connected mobile phone 2. The mobile phone 2 is then the credential with which the electronic lock 1 communicates to evaluate access. In this embodiment, the electronic lock 1 does not need any other power source and can be powered solely by connecting a mobile phone (via the cable 4) to the connector of the electronic lock 1. In other words, the connector is here the only power path for the electronic lock. Furthermore, this embodiment provides an intuitive an unambiguous way to express intent to open the electronic lock 1. For instance, consider a case where a user has access to a number of electronic locks provided to different restricted physical spaces from a single corridor. Several electronic locks may be in range for a credential if only wireless communication is used. But, as is the case of this embodiment, when communication occurs over the cable 4, it is unambiguous indicated which one of the several electronic locks that the user would like to unlock. In other words, the electronic lock is then configured to only start access control when the cable 4 is connected to the connector. id="p-21" id="p-21"
id="p-21"
[0021] In one embodiment, the electronic lock 1 is configured to perform a hard reset when a mobile phone connects to the connector. A hard reset can thus be triggered from the outside, since the connector is provided on the outside. This can be particularly useful when the electronic lock 1 controls access to a restricted physical space 16 where no person is normally present, e.g. a storage space or even the inside of a locked cabinet.[0022] In one embodiment, the electronic lock 1 is configured to receive software upgrades from the connected mobile phone 2 through the connector 20. Communication over a wired interface and the connector is typically faster and more reliable (less susceptible to varying or poor radio conditions) than communication over a wireless interface. This allows the software upgrade to be performed in a fast and reliable way. id="p-23" id="p-23"
id="p-23"
[0023] Fig 2 is a schematic drawing illustrating details in the vicinity of the barrier actuator 5a of Fig 1, provided on the accessible side of the barrier 15, according to one embodiment. id="p-24" id="p-24"
id="p-24"
[0024] The barrier actuator 5a is here depicted as a handle, but can be any suitable barrier actuator. As known in the art, a protective plate 6 can be provided by the barrier 15. Furthermore, there is here an intermediary section 22 configured to be provided between the barrier 15 and the barrier actuator 5a on the accessible side of the barrier 15. The intermediary section 22 forms part of the electronic lock 1 and the intermediary section 22 houses the connector 20. As explained above, a cable 4 can be connected between the connector 20 and a mobile phone to transfer power from the mobile phone to the electronic lock which is used to (at least part of the time) supply power to the electronic lock. id="p-25" id="p-25"
id="p-25"
[0025] The intermediate section 22 can have the same shape (perpendicular to the barrier 15) as the protective plate 6 to make it difficult for an attacker to remove the intermediate section. id="p-26" id="p-26"
id="p-26"
[0026] The connector 20 can be of any suitable type that allows it to receive power from the mobile phone. For instance, the connector can be of a type USB(Universal Serial Bus)-C, USB-A or lightning. In one embodiment, one or more magnets (not shown) are provided in at least one of the connector 20 and the cable 4 to be connected with the connector, to simplify connection and disconnection of the cable 4 in the COIIIICCÉOT. id="p-27" id="p-27"
id="p-27"
[0027] Cabling 24 is connected between the connector 20 and the rest of the electronic lock (not shown) to allow power to flow from the connector 20 to the rest of the electronic lock. This cabling 24 is internal to the electronic lock and is not exposed. For instance, the cabling can be provided through an existing lock case or otherwise through the barrier id="p-28" id="p-28"
id="p-28"
[0028] Fig 3 is a schematic drawing illustrating an inside part 25 of the electronic lock of Fig 1, provided on the restricted side of the barrier 15, according to one embodiment. 8.The inside part 25 of the electronic lock 1 comprising all of the electronic lock 1 except the intermediary section 22 (see Fig 2), the connector 20 (see Fig 2) and cabling 24 to the connector 20. The inside part 25 is configured to be provided on the restricted side 16 of the barrier id="p-29" id="p-29"
id="p-29"
[0029] An inside barrier actuator 5b is provided, here depicted as a handle, but can be any suitable barrier actuator. In this embodiment, the inside part 25 is configured to be provided between the barrier 15 and the inside barrier actuator 15b, on the restricted side of the barrier id="p-30" id="p-30"
id="p-30"
[0030] A thumb turn 7 can be provided which allows a user to mechanically unlock and/ or lock the electronic lock by turning the thumb turn id="p-31" id="p-31"
id="p-31"
[0031] Optionally, the electronic lock 1 is configured to be retrofitted to an existing mechanical lock. The inside part 25 then comprises a motor which, by interacting with the mechanics of the mechanical lock, controls a lock state of the connected mechanical lock. The motor can control a state of a locking bolt of the mechanical lock, which requires a significant amount of energy. Since the energy is received from the connected mobile phone, this energy is sufficient to power the motor. id="p-32" id="p-32"
id="p-32"
[0032] Fig 4 is a schematic diagram illustrating components of the electronic lock 1 of Fig 1. A processor 60 is provided using any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller, digital signal processor (DSP), etc., capable of executing software instructions 67 stored in a memory 64, which can thus be a computer program product. The processor 60 could alternatively be implemented using an application specific integrated circuit (ASIC), field programmable gate array (FPGA), etc.[0033] The memory 64 can be any combination of random-access memory (RAM) and/ or read-only memory (ROM). The memory 64 also comprises persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid-state memory or even remotely mounted memory. id="p-34" id="p-34"
id="p-34"
[0034] A data memory 66 is also provided for reading and/ or storing data during execution of software instructions in the processor 60. The data memory 66 can be any combination of RAM and/ or ROM. id="p-35" id="p-35"
id="p-35"
[0035] The connector 20, as explained above, is configured to receive power from a mobile phone. id="p-36" id="p-36"
id="p-36"
[0036] The electronic lock 1 further comprises an I/ O module 62 for communicating with external and/ or internal entities, such as with a credential. The communication with the credential can occur over a wireless interface, e.g. using Bluetooth Low Energy (BLE), Bluetooth, ZigBee, or any of the IEEE 802.11x standards (also known as WiFi), etc. Alternatively or additionally, the communication with the credential can occur over a wired interface via the connector id="p-37" id="p-37"
id="p-37"
[0037] Other components of the electronic lock 1 are omitted in order not to obscure the concepts presented herein. id="p-38" id="p-38"
id="p-38"
[0038] Fig 5 is a schematic drawing illustrating an embodiment of a dedicated key device 30 that can be used for interacting with the electronic lock 1 of Fig id="p-39" id="p-39"
id="p-39"
[0039] In an illustratory non-claimed embodiment, the key device 30 comprises one or more batteries 31 and a user interface 32a, 32b. The one or more batteries 31 can be primary cell batteries, which can be conveniently replaced at need. Alternatively, the one or more batteries are secondary cell batteries which can be charged when the key device 30 is not in use. The key device does not need to perform any other functions than interacting with the electronic lock and the key device does not necessarily have the same strict physical size restrictions as a mobile phone. This provides more freedom on dimensioning the size, and thus capacity, of the one more batteries.[0040] The user interface 32a, 32b can be used to indicate a desire to unlock and lock a connected electronic lock. In one embodiment, the user interface comprises only two push buttons, a first (e.g. green) push button 32a for unlocking a connected electronic lock and a second (e.g. red) push button 32b for locking a connected electronic lock. The key device 30 contains a memory for storing credentials for unlocking a connected electronic lock, and an interface for connecting with the electronic lock, via a cable 4. The key device 30 further comprises circuitry (e.g. processor, etc.) for authenticating itself when communicating with the electronic lock. id="p-41" id="p-41"
id="p-41"
[0041] The key device 30 operates the same way as described above for the mobile phone. By providing the dedicated key device 30, an intuitive and simple user interface can be used for unlocking and locking electronic locks. From the electronic lock perspective, the interface with the key device 30 and the mobile phone can be identical. id="p-42" id="p-42"
id="p-42"
[0042] The aspects of the present disclosure have mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims. Thus, while various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.
Claims (8)
1. An electronic lock (1) for controlling access to a physical space (16) secured by a barrier (15), the electronic lock (1) comprising: a processor (6o); a connector (20) configured to receive power from a connected mobile phone (2), to thereby power the electronic lock (1), wherein the connector (20) is the only power path for the electronic lock (1); and a memory (64) storing instructions (67) that, when executed by the processor, cause the electronic lock (1) to: communicate with a credential to evaluate whether access to the physical space is to be granted; wherein the electronic lock (1) is configured to perform a hard reset when the mobile phone (2) connects to the connector (20).
2. The electronic lock (1) according to claim 1, wherein the connector (20) is configured to enable communication between the electronic lock (1) and the connected mobile phone (2).
3. The electronic lock (1) according to claim 2, wherein the electronic lock (1) is configured to only perform access control when communication with the connected mobile phone (2) occurs over the connector (20).
4. The electronic lock (1) according to claim 2 or 3, wherein the electronic lock (1) is configured to receive software upgrades from the connected mobile phone (2) through the connector (20).
5. The electronic lock (1) according to any one of the preceding claims, further comprising an intermediary section (22) configured to be provided between the barrier (15) and an outside barrier actuator (5a) on an accessible side of the barrier (15), wherein the intermediary section (22) houses the connector (20).
6. The electronic lock (1) according to claim 5, further comprising an inside part (25) comprising all of the electronic lock (1) except the intermediary section (22), the connector (20) and cabling (24) to the connector (20), wherein the inside part (25) is configured to be provided on a restricted side of the barrier (15). 1O
7. The electronic lock (1) according to claim 6, wherein the inside part (25) is configured to be provided between the barrier (15) and an inside barrier actuator (5b) on the restricted side of the barrier (15).
8. The electronic lock (1) according to any one of the preceding claims, further comprising a motor configured to control a lock state of a connected mechanical lock.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1951396A SE545352C2 (en) | 2019-12-04 | 2019-12-04 | Electronic lock configured to receive power from a mobile phone |
PCT/EP2020/084514 WO2021110861A1 (en) | 2019-12-04 | 2020-12-03 | Electronic lock configured to receive power from a mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1951396A SE545352C2 (en) | 2019-12-04 | 2019-12-04 | Electronic lock configured to receive power from a mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
SE1951396A1 SE1951396A1 (en) | 2021-06-05 |
SE545352C2 true SE545352C2 (en) | 2023-07-18 |
Family
ID=73726823
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE1951396A SE545352C2 (en) | 2019-12-04 | 2019-12-04 | Electronic lock configured to receive power from a mobile phone |
Country Status (2)
Country | Link |
---|---|
SE (1) | SE545352C2 (en) |
WO (1) | WO2021110861A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
MX2024007408A (en) * | 2021-12-20 | 2024-07-29 | Werner Co | Jobsite box with keyless entry. |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013170292A1 (en) * | 2012-05-14 | 2013-11-21 | Burchat Clinton Graeme | Mobile device powered lock |
CN104318644A (en) * | 2014-09-03 | 2015-01-28 | 马文超 | Method for achieving cipher lock, cipher lock formed by the method, and annular lock |
US20180096549A1 (en) * | 2016-09-30 | 2018-04-05 | K-Jump Health Co., Ltd. | Lock system, electronic lock, and portable device with certification function and pairing method for the same |
US20180179786A1 (en) * | 2013-03-15 | 2018-06-28 | August Home, Inc. | Door lock system coupled to an image capture device |
US20180260208A1 (en) * | 2017-03-08 | 2018-09-13 | Jao Ching Lin | System of an Electronic Lock for Updating a Firmware of the Electronic Lock |
WO2019068021A1 (en) * | 2017-09-28 | 2019-04-04 | Gate Labs Inc. | Access systems and methods for use |
CN209134129U (en) * | 2019-01-04 | 2019-07-19 | 深圳市欧瑞博科技有限公司 | A kind of hard rebooting device and intelligent door lock of intelligent door lock |
CA3042788A1 (en) * | 2018-05-11 | 2019-11-11 | Abus August Bremicker Sohne Kg | Portable lock |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2295070T3 (en) * | 1999-12-08 | 2008-04-16 | Winfield Locks, Inc., Doing Business As Computerized Security Systems | ELECTRONIC LOCK. |
US9704316B2 (en) * | 2013-09-10 | 2017-07-11 | Gregory Paul Kirkjan | Contactless electronic access control system |
-
2019
- 2019-12-04 SE SE1951396A patent/SE545352C2/en unknown
-
2020
- 2020-12-03 WO PCT/EP2020/084514 patent/WO2021110861A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013170292A1 (en) * | 2012-05-14 | 2013-11-21 | Burchat Clinton Graeme | Mobile device powered lock |
US20180179786A1 (en) * | 2013-03-15 | 2018-06-28 | August Home, Inc. | Door lock system coupled to an image capture device |
CN104318644A (en) * | 2014-09-03 | 2015-01-28 | 马文超 | Method for achieving cipher lock, cipher lock formed by the method, and annular lock |
US20180096549A1 (en) * | 2016-09-30 | 2018-04-05 | K-Jump Health Co., Ltd. | Lock system, electronic lock, and portable device with certification function and pairing method for the same |
US20180260208A1 (en) * | 2017-03-08 | 2018-09-13 | Jao Ching Lin | System of an Electronic Lock for Updating a Firmware of the Electronic Lock |
WO2019068021A1 (en) * | 2017-09-28 | 2019-04-04 | Gate Labs Inc. | Access systems and methods for use |
CA3042788A1 (en) * | 2018-05-11 | 2019-11-11 | Abus August Bremicker Sohne Kg | Portable lock |
CN209134129U (en) * | 2019-01-04 | 2019-07-19 | 深圳市欧瑞博科技有限公司 | A kind of hard rebooting device and intelligent door lock of intelligent door lock |
Also Published As
Publication number | Publication date |
---|---|
SE1951396A1 (en) | 2021-06-05 |
WO2021110861A1 (en) | 2021-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2015367766B2 (en) | Authentication of a user for access to a physical space | |
CN105393285B (en) | Electronic lock with selectable power supply | |
JP6935965B1 (en) | Key system | |
CN106780912B (en) | Intelligent door lock and control method thereof | |
WO2016202780A1 (en) | Credential cache | |
CN104879039A (en) | Intelligent door and control method thereof | |
SE545352C2 (en) | Electronic lock configured to receive power from a mobile phone | |
EP3987133B1 (en) | Bolt identity | |
KR102291627B1 (en) | Smart door locks for doors in shared spaces | |
CN109219682B (en) | Electronic lock system and electronic lock device | |
KR20140006513A (en) | Door lock system using visible light communication | |
US11657663B2 (en) | Protection device for being provided inside a key fob and corresponding key control system | |
SE2030270A1 (en) | System, lock device and key device based on magnet and magnetically controllable switch | |
CA3159471A1 (en) | Smart door lock | |
SE2250109A1 (en) | Controlling power state of a lock assembly | |
WO2019197491A1 (en) | Managing administration privileges of an electronic lock | |
KR102546283B1 (en) | Apparatus for storing electronic key | |
SE2151168A1 (en) | Access control device | |
CN219840490U (en) | closing device | |
EP4466686A1 (en) | Proximity communication triggered wireless powered lock | |
SE2250740A1 (en) | Electronic lock comprising a boost converter for selectively increasing a voltage | |
KR101997636B1 (en) | Control method for locking device | |
KR101645631B1 (en) | Record management system for electronic locking apparatus | |
KR20210053254A (en) | system and server for Managing Electronic Keys |