1. Field of the Invention
The present application relates to a lock control method, and more particularly, a lock control method using multiple channels for controlling a lock.
2. Description of the Prior Art
According to the prior art, a user operates a remote controller to lock or unlock an anti-theft lock such as a garage lock. When unlocking a lock, a user sends an unlock control signal from a remote controller to the lock to perform an unlock operation such as opening a rolling door. The garage lock of the prior art is always power supplied by a socket and allows the door to be opened when being unlocked. According to the method of the prior art, the said lock/unlock control signal is sent with a single channel.
The lock described above is insecure. When operating a remote controller to send a control signal to lock or unlock, a thief can steal the adopted frequency by a frequency scanning method, and then use the stolen frequency to send a signal for unlocking the door. Hence, the lock of the prior art is easily cracked, and crimes of this sort are quite common. It is necessary to develop a lock control method to improve the anti-theft capability of the locks.
An embodiment of the present invention discloses a lock control method. The lock control method includes a remote controller sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the remote controller sending a set of control signals sequentially to the access control terminal via a set of second channels by using the telecommunication technology; the access control terminal receiving the set of control signals via the set of second channels; and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule; wherein the first channel is different from the set of second channels.
Another embodiment of the present application discloses a lock control method. The lock control method includes a remote controller selecting a first channel by a first channel selector according to time so as to send an activate signal via the first channel by using a telecommunication technology; an access control terminal selecting the first channel by a second channel selector according to time so as to receive the activate signal via the first channel; the access control terminal activating an authorization process when receiving the activate signal via the first channel; the remote controller selecting a set of second channels by the first channel selector according to time so as to send a set of control signals sequentially to the access control terminal via the set of second channel; the access control terminal selecting the set of second channels by the second channel selector according to time so as to receive the set of control signals sequentially via the set of second channels; and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule.
An additional embodiment of the present application discloses a lock control method. The lock control method includes a remote controller sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the access control terminal sending a rolling code key to the remote controller via a second channel; the remote controller inputting the rolling code key in a rolling code generator so as to generate a rolling code by the rolling code generator; the remote controller sending a control signal including the rolling code to the access control terminal via a third channel by using the telecommunication technology; the access control terminal receiving the control signal via the third channel by using the telecommunication technology; and the access control terminal unlocking a switch and/or a lock when the control signal and the rolling code are verified by the authorization process to be consistent with a predetermined rule.
An additional embodiment of the present application discloses a lock control method. The lock control method includes a remote control module sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the access control terminal sending a rolling code key to a remote controller of the remote control module via a second channel by using the telecommunication technology; the remote controller inputting the rolling code key in a rolling code generator of the remote control module so as to generate a rolling code by the rolling code generator; a signal transmitter of the remote control module sending a control signal including the rolling code to the access control terminal via a third channel by using the telecommunication technology; the access control terminal receiving the control signal via the third channel by using the telecommunication technology; and the access control terminal unlocking a switch and/or a lock when the control signal and the rolling code are verified by the authorization process to be consistent with a predetermined rule.
These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
Step 202: the remote controller 102 sends an activate signal 1091 via an activate channel (i.e. a first channel);
Step 204: the access control terminal 104 activates the authorization process when receiving the activate signal 1091 via the activate channel;
Step 206: the remote controller 102 sends a set of control signals 1092 sequentially to the access control terminal 104 via a set of control channels (i.e. second channels);
Step 208: the access control terminal 104 receives the set of control signals 1092 via the set of control channels;
Step 210: the authorization process verifies if the set of control signals 1092 are consistent with a predetermined rule? If yes, go to step 220; if no, go to step 240;
Step 220: the access control terminal 104 unlocks a switch and/or a lock; end; and
Step 240: the access control terminal 104 does not unlock the switch and/or the lock.
According to the lock control method 200, the set of control channels is different from the activate channel. For example, the activate channel may be a channel of 433 megahertz (MHz) frequency while the control channel may be a channel of 868 MHz frequency. Hence, even if a thief hides behind a user's house and uses a frequency scan equipment to recognize that two channels of 433 Mhz and 868 Mhz are adopted around this area, the thief cannot know that the two channels are used in a same lock system because a lock system of the prior art only uses one channel of single frequency. Besides, the set of control channels may further be of one or more frequencies. When the set of control channels are of multiple frequencies, the adopted frequencies may be different from one another. For another example, if the set of control channels includes three control channels for sending a control signal A, a control signal B and a control signal C separately, the frequencies of the three control channels may be 433 MHz, 868 Mhz and 916 MHz separately, and the said activate channel may be with 315 MHz frequency (for sending the activate signal 1091 shown in
Referring to
According to the embodiment described above, the access control terminal 104 may be unlocked only when the control signals A, B and C are correct, and (the frequencies of) the channels for the control signals A, B and C are correct. In this way, even if a thief uses a frequency scanner to get several channels and the corresponding frequencies, it is still difficult to know the correct sequence and the sent control signals of those channels. Hence, the lock control method 200 may lead to an anti-theft effect by using multiple channels with different frequencies.
Step 402: the remote controller 302 selects an activate channel (i.e. a first channel) by the first channel selector 3026 according to time so as to send an activate signal 3091 via the activate channel by using a telecommunication technology;
Step 404: the access control terminal 304 selects the activate channel by the second channel selector 3062 according to time so as to receive the activate signal 3091 via the activate channel;
Step 406: the access control terminal 304 activates an authorization process when receiving the activate signal 3091 via the activate channel;
Step 408: the remote controller 302 selects a set of control channels (i.e. a set of second channels) by the first channel selector 3026 according to time so as to send a set of control signals 3092 sequentially to the access control terminal 304 via the set of control channels;
Step 410: the access control terminal 304 selects the set of control channels by the second channel selector 3062 according to time so as to receive the set of control signals 3092 sequentially via the set of control channels;
Step 412: The authorization process verifies if the set of control signals 3092 are consistent with a predetermined rule? If yes, go to step 414; if no, go to step 416;
Step 414: A switch and/or a door of the access control terminal 304 is unlocked; end; and
Step 416: The switch and/or the door of the access control terminal 304 keeps being locked.
Comparing the lock control method 400 with the said lock control method 300, according to the lock control method 400, the activate channel also differs from the set of the control channels in frequency as the lock control method 300, that is to say, multiple frequencies are also adopted. According to the method 400, the frequency of the activate channel is further selected according to time by the first channel selector 3026 for sending the activate signal 3091 in step 402, and the frequency of the activate channel is selected according to time by the second channel selector 3062 for receiving the activate signal 3091 in step 404. Hence, even if a thief uses a frequency scanner to crack and know the adopted channels, because the adopted channels vary according to time, the cracked channels determined by the thief become invalid after a predetermined period. Similarly, the first channel selector 3026 of the remote controller 302 selects a set of control channels according to time for sending the set of control signals 3092 in step 408, and the second channel selector 3062 of the access control terminal 304 selects the same set of control channels for receiving the set of control signals 3092 in step 410. The used activate channel and the control channel(s) may vary depending on the time at which a user operates the lock system. For example, when a user leaves for office at 7:55 A.M. and comes back home at 8:20 P.M., the activate channel and the control channel(s) selected in the morning may differs from what is selected in the evening in frequency and channel combinations. Hence, the lock system and lock control method may have a good anti-theft effect. The channels and corresponding frequencies may be shown as the following table.
Hence, the frequencies of the selected activate channel and control channel(s) may vary by time so that the anti-theft effect is improved.
In order for the channels selected by the first channel selector 3026 (of the remote controller 302) to match the channels selected by the second channel selector 3062 (of the access control terminal 304) so as to transmit and receive signals correctly, the first channel selector 3026 and the second channel selector 3062 need to synchronize to one another for the clocks of the two selectors to be synchronous. The remote controller 302 and the access control terminal 304 may sense one another to synchronize via a near-field-communication (NFC) or Bluetooth way. The remote controller 302 and the access control terminal 304 may be embedded radio clocks/watches to be automatically synchronized by time-code signals transmitted by a radio station connected to a time standard such as anatomic clock so that the first and second channel selectors 3026 and 3062 may be synchronized with one another. According to an embodiment of the present application, the tolerance between times measured by the remote controller 302 and the access control terminal 304 may be a predetermined value (e.g. plus-minus 3 seconds) for the channels selected by the first and second channel selectors to match one another without false error so as to transmit/receive the active/control signals correctly.
According to another embodiment of the present application, the channels selected by the first and the second channel selectors may be not limited to radio channels with operating frequencies. The selected channels may be of multiple communication technologies. For example, the selected activate channel may be a UHF radio channel at a first time period and an internet channel accessed by instant massages (IM) at a second time period so as to adopt multiple channels for better security. Furthermore, according to another embodiment of the present application, if using different accounts to send/receive instant massages for transmitting/receiving signals via an internet between the remote controller and the access control terminal (e.g. a garage door terminal), this may be regarded as using different channels (i.e. multiple channels) to transmit/receive signals.
Step 602: the remote controller 502 sends the activate signal 5091 via an activate channel (first channel) by using a telecommunication technology;
Step 604: the access control terminal 504 activates an authorization process when receiving the activate signal 5091 via the activate channel;
Step 606: the access control terminal 504 sends the rolling code key 5099 to the remote controller 502 via a first control channel (a second channel);
Step 608: the remote controller 502 inputs the rolling code key 5099 in the rolling code generator 5026 so as to generate the rolling code 5094 by the rolling code generator 5026;
Step 610: the remote controller 502 sends the control signal 5092 including the rolling code 5094 to the access control terminal 504 via a second control channel (a third channel) by using the telecommunication technology;
Step 612: the access control terminal 504 receives the control signal 5092 via the second control channel by using the telecommunication technology;
Step 614: the authorization process verifies if the control signal 5092 and the rolling code 5094 are consistent with a predetermined rule? If yes, go to step 616; if no, go to step 618;
Step 616: the access control terminal 504 unlocks a switch and/or a lock when the control signal 5092 and the rolling code 5094 are verified by the authorization process to be consistent with a predetermined rule; end; and
Step 618: the access control terminal 504 does not unlock the switch and/or the lock when the control signal 5092 and the rolling code 5094 are verified by the authorization process to be not consistent with the predetermined rule.
In the lock control method 500, the activate channel for sending the activate signal 5091, the first channel for sending the rolling code key 5099 and the second control channel for sending the control signal 5092 may differ from one another. In steps 606 and 608, the access control terminal 504 sends the rolling code key 5099 to the remote controller 502 for the rolling code generator 5026 to generate the rolling code 5094. According to an embodiment of the present application, the rolling code generator 5026 may include a mathematical function and/or a decode table used for generate the rolling code 5094 according to the rolling code key 5099. The rolling code 5094 is a non-fixed secret code used to increase the difficulty of cracking the lock system. The said rolling code key 5099 may be a seed parameter for generating the non-fixed secret code (i.e. the rolling code 5094).
Multiple algorithms or means may be used to generate the rolling code 5094 according to the rolling code key 5099. One of them is shown in the following table.
According to this embodiment, the rolling code 5094 is generated by filling the rolling code key 5099 into blanks of a table used to generate the rolling code 5094. When the access control terminal 504 (e.g. a door terminal) sends the rolling code key 5099 (e.g. shown in the above table), the authorization process has set a verification code (e.g. shown in the above table) corresponding to the rolling code key 5099 as the predetermined rule for verifying the received control signal. Hence, when a thief just uses a frequency scanner to know the used channels without knowing the mechanism of generating the rolling code 5094 by using the rolling code key 5099 and the rolling code generator 5026, it is difficult to crack the lock system. The table shown above is merely an example for describing the generation and verification of the rolling code 5094 by using the rolling code key 5099, other algorisms and means (e.g. mathematical functions) may be used to generate the rolling code 5094 with the rolling code key 5099 according to another embodiment of the present application.
Step 802: The remote control module 702 sends the activate signal 7091 via an activate channel (a first channel) by using a telecommunication technology;
Step 804: the access control terminal 704 activates an authorization process when receiving the activate signal 7091 via the activate channel;
Step 806: the access control terminal 704 sends a rolling code key 7099 to the remote controller 7021 of the remote control module 702 via a first control channel (a second channel) by using the telecommunication technology;
Step 808: the remote controller 7021 inputs the rolling code key 7099 in the rolling code generator 7026 of the remote control module 702 so as to generate the rolling code 7094 by the rolling code generator 7026;
Step 810: the signal transmitter 7024 of the remote control module 702 sends the control signal 7092 including the rolling code 7092 to the access control terminal 704 via a second control channel (a third channel) by using the telecommunication technology;
Step 812: the access control terminal 704 receives the control signal 7092 via the second control channel by using the telecommunication technology;
Step 814: the signal process unit 706 verifies if the control signal 7092 and the rolling code carried by the control signal 7092 are consistent with a predetermined rule? If yes, go to step 816; if no, go to step 818;
Step 816: the access control unit 804 unlocks a switch and/or a lock; end; and
Step 818: the access control unit 804 does not unlock the switch and/or the lock.
According to the fourth embodiment of the present application shown in
According to an embodiment of the present application, when the remote controller 7021 is a smart phone, a user may download a mobile application (aka app) provided by a vendor of the lock system for using the lock system and the lock control method shown in
According to the described embodiments of the present application, the activate channel and a set of control channels different from the activate channel (i.e. multiple channels) may be adopted for better anti-theft effects. The said activate channel and the set of control channels may be fixed or vary by time. A non-fixed rolling code may be carried by the control signal for increasing the difficulty of cracking the lock system. According to the third and fourth embodiments, the rolling code may be generated further according to the rolling code key sent from the access control terminal to further increase the burden of cracking the lock system.
The said rolling code key may be generated by time of operating when the remote controller or the remote control module is well synchronized with the access control terminal. Taking the following tables for example, each rolling code is generated according to a corresponding rolling code key, and the rolling code varies with time of generation. For example, the rolling code generated at 9:36 A.M. is different from the rolling code generated at 8:14 P.M. That is to say, the rolling code is generated according to time and the rolling code key, so it is more difficult to crack the lock system.
According to the first to fourth embodiments described above, the access control terminal activating the authorization process when receiving the activate signal via the activate channel may be the access control terminal being turned on and activating the authorization process when receiving the activate signal. In other words, according to an embodiment of the present application, the electrical power supplying the signal process unit of the access control terminal may not be turned on before receiving the activate signal, and the lock system may not be unlocked even receiving correct control signals if not receiving the activate signal. Hence, the security is improved.
In
In summary, the lock control method disclosed according to embodiments of the present application may increase the difficulty of cracking an anti-theft lock system by using multiple channels and the rolling codes, and the adopted multiple channels and rolling codes may be selected or generated by time so as to vary by time rather than staying fixed. The rolling code may be generated according to the rolling key for preventing a thief to duplicate a fake rolling code generator. Therefore, the lock system and the lock control method disclosed according to the present application can improve the security of the lock system greatly.
Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
103121758 A | Jun 2014 | TW | national |
Number | Name | Date | Kind |
---|---|---|---|
5926106 | Beran | Jul 1999 | A |
6225889 | Furuta | May 2001 | B1 |
6801134 | Juzswik | Oct 2004 | B1 |
7050587 | Berberich | May 2006 | B1 |
20050204167 | Conlin | Sep 2005 | A1 |
20070287418 | Reddy | Dec 2007 | A1 |
20090096576 | Oman | Apr 2009 | A1 |
20090210101 | Hawkins | Aug 2009 | A1 |
20130237189 | Nishidai | Sep 2013 | A1 |
20140176301 | Fernandez Banares | Jun 2014 | A1 |
Number | Date | Country |
---|---|---|
202422247 | Sep 2012 | CN |
202694430 | Jan 2013 | CN |
0 502 566 | Sep 1992 | EP |
S6171797 | Apr 1986 | JP |
H05287947 | Nov 1993 | JP |
H07226979 | Aug 1995 | JP |
2002235470 | Aug 2002 | JP |
2002295892 | Oct 2002 | JP |
201041411 | Feb 2010 | JP |
200300028 | May 2003 | TW |
I322847 | Apr 2010 | TW |
M416945 | Nov 2011 | TW |
M429746 | May 2012 | TW |
M448543 | Mar 2013 | TW |
2007128319 | Nov 2007 | WO |
Number | Date | Country | |
---|---|---|---|
20150371467 A1 | Dec 2015 | US |