The present invention relates to a lock/unlock method in conjunction with near field wireless transmission device which is applicable to a lock toolset in conjunction with a near field wireless transmission device.
The lock is one of the items in close contact with people in daily lives. Conventional mechanical lock structures develop from typical single spring lock toward multi-faced and multi-rowed configurations. However, defects in such mechanical locks are still obvious, which are vulnerable to external force, and also keys thereof may be lost, missed or even maliciously duplicated, thus inevitably leading to deep concerns in applications. To resolve such issues existing in mechanical locks, inventors have made researches in order to improve lock securities, thus leading to the emergence of electric locks.
As the electric lock has a huge password capacity and is workable in combination with mechanical locks to enhance security, the advantageous feature thereof that there is no need to carry a key for electric lock. In modern society, people may have to carry a big bunch of keys along with them, which can be very cumbersome. Hence, through the conjunctive operation of electric lock and wireless induction device, people need to simply memorize a password string or apply fingerprint identification, rather than grasping massive but non-exchangeable keys to try to open a lock. This further eliminates the key mislaying and illicit duplication problems.
Although the electric lock may bring many benefits to people's daily lives, collateral flaws do occur. For example, the electric locks of this type need to be powered all the time. It means that they should be plugged into a mains socket or provided with an internal battery, so that they are enabled to continuously transmit signals and the sensor/receiver device on user's hand can receive the signal and send back a release signal to unlock. However, while the approach of electrical connection to a mains socket can be only applied to immobile devices, it is impractical for portable products, such as a bicycle, a luggage case and so on. Besides, in the case of installing internal batteries inside the electric lock, users may still need to pay heed to residual power amount of the battery during application. This is because once the battery power depletes, the electric locks of this type may not operate normally and the user can only wait for maintenance personnel to help out. The originally expected convenience of the electric lock may be largely reduced due to such concerns. As a result, for portable devices such as a bicycle or a luggage case, it is required to ensure that the security lock cannot be easily opened while the anti-theft mechanism cannot be ungraded arbitrarily due to the limited available space or other resources. When a bicycle rider gets off and departs, it is very typical to lock it up to protect against thieves. However, a combination lock may be unlocked through multiple tryouts, thus providing poorer anti-theft ability. A key lock may increase the risk of key loss or mislaying for the rider. Moreover, for thieves having professional purloin skills, the conventional key locks may not effectively impede their criminal actions unless using a sufficiently exquisite and sophisticated key lock.
To resolve the aforementioned power amount issue, some vendors have considered supplying electric power to the electric lock upon inserting the key into the keyhole, thereby attempting to temporarily eliminate this power insufficiency problem. Unfortunately, although this approach of supplying electric power to the electric lock upon inserting the key into the keyhole sounds handy, it can be risky as well. A thief can utilize the open source hardware, e.g., Arduino, to unlock. Arduino is a kind of open source single chip microcomputer, which can be programmed to perform complicated actions by means of simple programming language. Since there is at least one signal line for writing, memorizing and reading the stored code in an electric lock of this type, the thief can easily crack the security of the electric lock by connecting Arduino to the signal line of the electric lock through a conductive line, thereby reading the stored code from the electric lock and sending it back to unlock.
As for the locking and unlocking operation using middle-ranged electro-magnetic signals, seeing that the remote controller emits signals in every direction, malicious persons may hold a set of sensor/receiver devices to illegally receive the transmitted signal upon the user pressing down the remote controller to unlock and then follow or wait for a chance to steal. As this kind of malicious recording on remote controller signals happen frequently, the user may concern about this issue.
As such, the present invention provides a lock/unlock method in conjunction with near field wireless transmission device, which allows to omit the power connection hole on the electric lock by placing the power supply device into the near field wireless transmission device to prevent thieves from performing electric violent unlocking, and also protects user's passwords from being maliciously recorded by means of the operation distance limitation due to short-ranged wireless transmissions, thereby securing user's personal belongings from being stolen. Therefore, by virtue of the techniques disclosed herein, the invention provides improved protection for portable devices, such as a bicycle or a luggage case, under the circumstances that they are unable to connect to mains power.
In one aspect provided herein is a lock/unlock method in conjunction with near field wireless transmission device, in which a user can unlock by means of a near field wireless transmission device, e.g., a mobile phone or a tablet computer enabling communication function, and through the feature that the mobile phone or tablet computer enabling communication function sends communication signals all the time in order to maintain connection to a base station, the user needs only to place the mobile phone or tablet computer enabling communication function in proximity to a bicycle or a luggage case thereby having it unlocked. Moreover, it is also possible to input a piece of code for deactivating an electric lock through handwriting on a touch panel of the mobile phone or tablet computer enabling communication function thereby allowing an additional protection for the portable device.
In another aspect provided herein is a lock/unlock method in conjunction with near field wireless transmission device, in which the near field wireless transmission device performs power recharging to the lock toolset so as to prevent electric violent unlocking of thieves thus enhancing the security of the portable device.
In yet another aspect provided herein is a lock/unlock method in conjunction with near field wireless transmission device, in which a modification code can be rewritten on a touch panel of the near field wireless transmission device to facilitate the user's convenience thereby increasing the application flexibility of the lock toolset.
In still another aspect provided herein is a lock/unlock method in conjunction with near field wireless transmission device, in which an electric lock can be locked/unlocked via proximal wireless transmissions thereby significantly reducing the risks of illicit password recording in order to protect user's personal belongings.
According to the aspects described above, the present invention provides a lock/unlock method in conjunction with a near field wireless transmission device, which is applicable to a lock toolset utilized conjunctively with the near field wireless transmission device, wherein the near field wireless transmission device includes at least a transmitter and a processor for driving the transmitter to continuously send out a predetermined wireless activation signal, and wherein the lock toolset comprises a controller, at least one memory responsible for recording an authentication code, at least one receiver for receiving said wireless activation signal when the transmitter approaches, and an anti-theft lock driven to be opened by the controller, the lock/unlock method comprising the steps of: a) receiving the predetermined wireless activation signal by means of the receiver and converting the predetermined wireless activation signal into an electric signal for output; b) receiving the electric signal by means of the controller and verifying the electric signal with the authentication code recorded in the memory; and c) instructing the anti-theft lock to unlock when the controller confirms that a predetermined condition is satisfied.
The present invention discloses a lock/unlock method in conjunction with near field wireless transmission device which allows to protect user's personal belongings by way of locking/unlocking the electric lock with close-ranged wireless transmissions, and also, using the distance limitation for power recharging the lock toolset by means of a near field wireless transmission device, prevents user's password from being maliciously recorded and blocks electric violent unlocking of thieves. In addition, when a user takes a mobile phone or a tablet computer enabling communication function, for example, as the near field wireless transmission device, the user may habitually retain the power for operations rather than depleting the power thereof. As a result, through the techniques of the present invention, users can follow their existing habits without deliberately considering whether the electric lock still has sufficient power amount for operations thereby facilitating user's convenience.
The aforementioned and other technical contents, aspects and effects in relation with the present invention can be clearly appreciated through the detailed descriptions concerning the preferred embodiments of the present invention in conjunction with the appended drawings; moreover, in each embodiment, the same components will be denoted with similar numbers.
The electric lock disclosed herein can be applied on a portable device, which is exemplified herein as a bicycle. Referring to
With regard to the first preferred embodiment of the invention, refer now conjunctively to
By virtue of the structural arrangement described above, the rider can use a carried mobile phone to lock or unlock his/her bicycle. Moreover, although an electro-magnetic valve is exemplified in the present embodiment, those skilled in the art can readily appreciate that the similar function can be achieved by using motors, piezo-transistors (e.g., SiO2, PZT and CdS) or the like.
Through the descriptions provided above, several features of the present invention can be seen. Here, the method of using near field wireless transmission technology (e.g., RFID, NFC) for locking/unlocking a lock toolset can effectively block out illicit signal recording through interceptions performed by malicious people, whereby the user's personal goods can be protected. In addition, the near field wireless transmission device needs to continuously transmit signals, so as to keep in contact with the base station. Since the user of the near field wireless transmission device would habitually and spontaneously pay attention to the residual electric power in the near field wireless transmission device, it is not necessary to deliberately notice the electric power in the lock toolset. The electric power can be outputted to activate the controller in the lock toolset when the user is trying to release the lock, so that the controller can perform the verification and instruct the anti-theft lock to unlock. Therefore, while the lock toolset installed on the portable device is not connected to a mains socket, the portable device can still acquire sufficient drive power by way of the embodiment disclosed herein and can be protected by a better anti-theft means.
Now refer to
Referring further to
Next, referring to
In the case where the previously configured release code 122′ is to be modified, the user needs to use a default program for modifying the release code in the APP corresponding to the lock toolset 1′ to perform the modification. When the lock toolset 1′ was unlocked by the user's mobile phone 2′, the identity of the mobile phone 2′ was verified beforehand by the lock toolset 1′. Hence, the user can input a graph by himself/herself on the touch panel 22′ of the mobile phone 2′ to act as a modification code 123′. Then the processor (not shown) in the mobile phone 2′ drives the transmitter (not shown) to send out a modification signal (not shown) to the lock toolset 1′, such that the lock toolset 1′ receives the modification signal through the receiver 13′ and passes it to the controller 11′. Accordingly, the memory 12′ is instructed to record the modification code 123′ which is in turn used as a new release code 122′, and the previous release code 122′ is deleted or over-written. The memory 12′ will record the new release code 122′ for later application in releasing the anti-theft lock 15′.
Of course, the modification code allowable for spontaneous write-in and modification as described above may also exist along with the aforementioned release code formed by the internal data of the mobile phone, and any one of them can be selected to act as the unlock mechanism or, alternatively, it is required to provide both of them in accordance with user's demand.
By virtue of the aforesaid code confirmation/modification steps, the user can use a carried mobile phone to input a release code on the touch panel of the mobile phone and the processor in the mobile phone can drive the transmitter to convert the release code into a release signal and output the same to the lock toolset, so that when the controller in the lock toolset installed on the luggage case confirms the correctness of the release code, the controller instructs the anti-theft lock to release. Therefore, in the case where the user owns an object of high security, the method disclosed herein is able to provide better protection for the luggage case. Certainly, those skilled in the art can readily appreciate that the code confirmation/modification steps described herein can be accomplished by, using a predetermined application (APP) on the mobile phone. When the near field wireless transmission device is remote from the lock toolset, the user can directly input the old code and schedule to replace the old code with a new one. When next time the near field wireless transmission device gets close to the lock toolset, it can automatically unlock using the old code and then execute the code replace procedure, so that the user can schedule the code change operation on his/her own mobile phone anytime without any restriction.
Those skilled in the art can surely understand that the lock toolset 1″ can include a power storage device 14″ according to the third preferred embodiment shown in
However, even with above-said various mechanisms, when the user is away from the bicycle, e.g., going to a restroom, leaving the bicycle or luggage case outdoors, the user may still worry about that thieves could possibly use a tool such as a lighter, hydraulic cutter, chain saw etc. to forcibly sabotage the lock toolset. Hence, as shown in
Of course, the alarm device is by no means limited to generate speaker sound. Other approaches such as vibration or indicator light blinking or the like can be applied as well, without affecting the implementation of the embodiment. In addition, the interference condition may also be a temperature fluctuation, or a breakout of electric circuits embedded and wound in the lock toolset, or even a combination of the above-said three sensor approaches.
The present invention utilizes near field wireless transmission in conjunction with the near field wireless transmission device to provide near field wireless transmissions for RFID, NFC. Since the mobile phone must be connected to the base station all the time, and the electro-magnetic signals emitted based on such connection can be applied as a predetermined wireless activation signal consisting of information, i.e., mobile phone serial number and SIM card serial number and so on, the lock toolset installed on the portable device can easily and directly determine whether the anti-theft lock should be released. On the other hand, the user can input a release code on the touch panel of a mobile phone, so that the opportunity of illicitly recording the electro-magnetic wave signals by thieves can be also eliminated through the near field wireless transmission technology, thereby improving the security of the lock toolset. Besides, the user can further input a modification code on the touch panel of the mobile phone in accordance as per personal preference, thus modifying the release code programmed in the memory of the lock toolset and providing the lock toolset with high application flexibility. Moreover, portable devices like a bicycle or luggage case cannot be easily connected to a mains socket. It is preferably that the power storage device of the lock toolset receives electric power via a mobile phone or a tablet computer having communication function, so as to activate the controller of the lock toolset. Since the electric power will not run out because people habitually pay attention to the levels of residual power amounts in their mobile phones or tablet computers. Additionally, the USB connection used herein includes only two power pins, and does not include two signals pins. This can effectively prevent the thief from easily applying electric violent unlocking. In this way, the techniques of the present invention allows the user to maintain their existing application habits without having to consider whether the electric lock has sufficient operation electric power thus saving user's efforts and no need to worry about the portable device to be stolen by electric violence means. Furthermore, in case the thief does intend to forcibly destroy the lock toolset, the sensor installed inside the lock toolset can output a sensor signal to the controller, thus further emitting an emergency signal to notify the user that someone is currently sabotaging the lock toolset, so the user can rapidly respond and the theft action may fail thereby improving the protectiveness of the present invention and relieving the user's psychological burden.
It should be noticed that, however, the illustrations set forth as above simply describe the preferred embodiments of the present invention which are not to be construed as restrictions for the scope of the present invention; contrarily, all effectively equivalent changes and modifications conveniently made in accordance with the claims and specifications disclosed in the present invention are deemed to be encompassed by the scope of the present invention delineated in the following claims.
Number | Date | Country | Kind |
---|---|---|---|
102147579 | Dec 2013 | TW | national |