Method for unlocking a lock using real-time wireless power supply

Information

  • Patent Grant
  • 12008851
  • Patent Number
    12,008,851
  • Date Filed
    Friday, June 30, 2023
    a year ago
  • Date Issued
    Tuesday, June 11, 2024
    5 months ago
  • Inventors
  • Examiners
    • Pendleton; Dionne
    Agents
    • Chen; Ying-Ting
Abstract
A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.
Description
BACKGROUND OF THE INVENTION

The present invention relates to a method for unlocking a lock using real-time wireless power supply and, more particularly, to a powerless lock that can be wirelessly supplied with power required for operation through an electronic key comprised of a smart mobile device or the like.


With the development of technology, conventional mechanical locks have been evolved into electronic locks of electromechanical integration type. Operation of a portion of the electronic locks replies on power and generally requires a detachable battery for suppling power for an unlocking authentication identification procedure, a procedure of inputting unlocking authentication information, and operation of a motor or an electromagnetic valve. The electronic locks of this type encounters problems in use. For example, the electronic locks cannot operate when the detachable battery runs out of power. Furthermore, the electronic locks with power could still be decrypted, even though the possibility is not high.


BRIEF SUMMARY OF THE INVENTION

To solve the above problems, in an aspect, the present invention provides a method for unlocking a lock using real-time wireless power supply, comprising:

    • remaining an offline state between an electronic key and a lock when the electronic key is not used to execute an authentication identification procedure;
    • executing the authentication identification procedure using the electronic key, wherein the electronic key and the lock remain in the offline state when authentication identification is identified as being unsuccessful by the electronic key;
    • identifying whether a distance between the electronic key and the lock are in a communication range when the authentication identification is identified as being successful by the electronic key, wherein the electronic key and the lock remain in the offline state when the distance between the electronic key and the lock exceeds the communication range;
    • wirelessly supplying power from the electronic key to the lock when the distance between the electronic key and the lock is in the communication range and when the authentication identification is identified as being successful by the electronic key, permitting the lock to use the wirelessly supplied power to operate;
    • outputting an unlocking command from the electronic key to the lock during or after wireless power supply from the electronic key to the lock;
    • unlocking the lock with the power wirelessly suppled from the electronic key when the lock receives the unlocking command from the electronic key;
    • identifying whether a pre-set period of time has expired after the lock is unlocked or after the electronic key outputs the unlocking command, wherein the electronic key keeps wirelessly supplying power to the lock when the pre-set period of time has not expired;
    • locking the lock using the power wirelessly supplied from the electronic key to the lock when the pre-set period of time has expired; and
    • cutting off wireless power supply from the electronic key to the lock after the lock is locked.


Thus, the lock used in the method for unlocking a lock using real-time wireless power supply of each of the first and second embodiments according to the present invention is not provided with a power source, such that operation of the lock requires wireless power supply which is carried out after pairing. Thus, it is difficult to decrypt the lock. Furthermore, a repeatedly rechargeable electronic key can be used to wirelessly supply power, such that it is not necessary to worry about power shortage of the lock.


In an example, the method further comprises detecting whether the lock is operated by an external force after the lock is unlocked. The electronic key keeps wirelessly supplying power to the lock when it is detected that no external force is applied to the lock. When it is detected that the external force is applied to operate the lock, the lock uses the power wirelessly suppled from the electronic key to proceed with locking of the lock, and the wirelessly power supply is then cut off.


In an example, the method further comprises using the lock to increase a voltage of the power wirelessly supplied from the electronic key to enable operation of the lock.


In an example, the pre-set period of time is in a range of 5-30 seconds.


In an example, the unlocking command is outputted after the lock is enabled to operate after the wireless power supply from the electronic key.


In an example, countdown of the pre-set period of time begins from a moment the lock is unlocked.


In another example, countdown of the pre-set period of time begins from a moment the electronic key outputs the unlocking command.


In an example, the authentication identification includes inputting a real-time authentication identification information into the electronic key. The authentication identification is identified as being successful when the real-time authentication identification information is identified as being correct. The authentication identification is identified as being unsuccessful when the real-time authentication identification information is identified as being incorrect.


In an example, inputting the real-time authentication identification information includes inputting a fingerprint or a face image of a holder of the electronic key.


In an example, the electronic key is comprised of a repeatedly rechargeable smart mobile device.


In a second aspect, a method for unlocking a lock using real-time wireless power supply comprises:

    • remaining an offline state between an electronic key and a lock when the electronic key is not used to execute an authentication identification procedure;
    • identifying whether a distance between the electronic key and the lock are in a communication range while undergoing the authentication identification procedure, wherein the electronic key and the lock remain in the offline state when the distance between the electronic key and the lock exceeds the communication range;
    • wirelessly supplying power from the electronic key to the lock when the distance between the electronic key and the lock is in the communication range while undergoing the authentication identification, wherein the electronic key does not output an unlocking command when the authentication identification procedure is identified as being unsuccessful by the electronic key;
    • outputting an unlocking command from the electronic key to the lock when the authentication identification by the electronic key is identified as being successful;
    • unlocking the lock with the power wirelessly suppled from the electronic key when the lock receives the unlocking command from the electronic key;
    • identifying whether a pre-set period of time has expired after the lock is unlocked or after the electronic key outputs the unlocking command, wherein the electronic key keeps wirelessly supplying power to the lock when the pre-set period of time has not expired;
    • locking the lock using the power wirelessly supplied from the electronic key to the lock when the pre-set period of time has expired; and
    • cutting off wireless power supply from the electronic key to the lock after the lock is locked.


Thus, wireless power supply to the lock is carried out when the holder of the electronic key proceeds with the authentication identification. Thus, the lock has sufficient time to respond to the wireless power supply to permit subsequent execution of the unlocking command after successful authentication identification.


In an example, the method further comprises detecting whether the lock is operated by an external force after the lock is unlocked. The electronic key keeps wirelessly supplying power to the lock when it is detected that no external force is applied to the lock. When it is detected that the external force is applied to operate the lock, the lock uses the power wirelessly suppled from the electronic key to proceed with locking of the lock, and the wirelessly power supply is then cut off.


In an example, the method further comprises using the lock to increase a voltage of the power wirelessly supplied from the electronic key to enable operation of the lock.


In an example, the pre-set period of time is in a range of 5-30 seconds.


In an example, countdown of the pre-set period of time begins from the moment the lock is unlocked.


In another example, countdown of the pre-set period of time begins from the moment the electronic key outputs the unlocking command.


In an example, the authentication identification includes inputting a real-time authentication identification information into the electronic key. The authentication identification is identified as being successful when the real-time authentication identification information is identified as being correct. The authentication identification is identified as being unsuccessful when the real-time authentication identification information is identified as being incorrect.


In an example, inputting the real-time authentication identification information includes inputting a fingerprint or a face image of a holder of the electronic key.


In an example, the electronic key is comprised of a repeatedly rechargeable smart mobile device.


The present invention will become clearer in light of the following detailed description of illustrative embodiments of this invention described in connection with the drawings.





DESCRIPTION OF THE DRAWINGS


FIG. 1 is a flowchart illustrating a method for unlocking a lock using real-time wireless power supply of a first embodiment according to the present invention.



FIG. 2 is a flowchart illustrating a method for unlocking a lock using real-time wireless power supply of a second embodiment according to the present invention.





DETAILED DESCRIPTION OF THE INVENTION

The present invention relates to a method for unlocking a lock using real-time wireless power supply. FIG. 1 shows a method for unlocking a lock using real-time wireless power supply of a first embodiment according to the present invention. The method of the first embodiment includes identifying whether to execute an authentication identification procedure or not (S211). When an electronic key is not used to execute the authentication identification procedure, the electronic key and a paired lock (hereinafter referred to as “the lock”) are in an offline state (S213). Specifically, the electronic key is paired with a lock of electronic type in advance. The electronic key can be, but not limited to, a smart mobile device (such as a smart phone, a smart watch, etc.) which can be repeatedly recharged and on which a control APP is installed. Alternatively, the electronic key can be a repeatedly rechargeable, portable electronic key developed by a manufacture of the lock. Pairing of the electronic key and the lock can be achieved by logging the lock in a system of the electronic key. Pairing of the electronic key and the lock can be accomplished by many well-known techniques and is not the issue to be solved by the present invention, such that detailed description of the matching is not set forth herein to avoid redundancy.


In step S215, it is identified whether the authentication identification is successful. When the authentication identification fails, the electronic key and the lock remain in the offline state (step S213). The authentication identification procedure can be, but not limited to, cooperation of the control APP installed in the smart mobile device with a lens or a fingerprint pick-up device of the smart mobile device. For example, the control APP installed on the smart mobile phone is executed and requests a holder of the smart mobile device to input a real-time face image (a real-time authentication identification information) through the lens of the smart mobile device. The smart mobile device identifies whether the real-time face image is correct. For example, the real-time face image is compared with an authenticated face image that has been authenticated by the smart mobile device. When the real-time face image does not match with the authenticated face image, the electronic key and the lock remain offline. Namely, there is no connection (including wireless charging) between the electronic key and the lock.


When the authentication identification executed by the electronic key is successful, it is identified whether the electronic key and the lock are in a communication range (S217). When the distance between the electronic key and the lock exceeds the communication range, the electronic key and the lock remain offline (S213). Namely, no matter the authentication identification of the electronic key is successful or not, the electronic key and the lock remain offline as long as the distance between the electronic key and the lock is not in the communication range. Note that the communication range is not intended to restrict the maximum communication range. For example, the communication range is not limited to the wireless power supply range. Assume the maximum distance permitting wireless power supply is 3 meters, the communication range can be set as 2 meters. Given this setting, when the distance between the electronic key and the lock is in a range between 2-3 meters, the distance between the electronic key and the lock will still be considered as exceeding the communication range.


Alternatively, the communication range can be the same as the maximum operation range of wireless power supply. In this case, the distance between the electronic key and the lock must be within the wireless power supply range, because the lock is a powerless lock, which is a lock without a built-in battery or a lock supplied with power by wired connection. In a case that the distance between the electronic key and the lock exceeds the wireless power supply range, the electronic key cannot wirelessly supply power to the lock, such that the lock cannot operate. In a case that the maximum operation range for wireless power supply can be set as the communication range, the communication range (such as within the powerless power supply range) can be different due to different techniques adopted. For example, the wireless charging range of a wireless charging technique of electromagnetic induction type meeting the requirements of wireless charging is smaller (such as the distance between the receiver and the transmitter is less than 30 mm), whereas the wireless power supply range of other techniques (such as the WattUp proposed by Energous Corporation and Cota proposed by Ossia Corporation) can be larger (generally larger than 1 meter). It can be appreciated that the wireless power supply techniques used in the present invention are not limited in this regard.


When the distance between the electronic key and the lock is in the communication range and the authentication identification is successful, the electronic key undergoes wireless power supply to the lock, such that the lock can use the power supplied wirelessly (S231). Specifically, since the lock is powerless, the authentication identification is carried out by the electronic key. For example, in a case that an authenticated face image is compared with a real-time face image inputted through the electronic key, the electronic key wirelessly supplies power to the lock when the real-time face image matches with the authenticated face image and when the distance between the electronic key and the lock is within the wireless power supply range.


In step S235, when the electronic key wirelessly supplies power to the lock, the lock increases the voltage of the power supplied wirelessly, which is required for operation of the lock. Specifically, the lock can include a circuit board for control purposes and a motor for locking and unlocking the lock. The voltage and electric current required for operating the motor may not directly come from the wireless power supply. For example, given the power of the wireless power supply is smaller than 5 w, the voltage and electric current may not be sufficient to drive the motor. Nevertheless, when the power of the wireless power supply is higher (such as 10-15 w), the voltage and electric current are sufficient to directly drive the motor. Note that since the lock per se is powerless, the voltage increasing procedure is carried out after the lock receives the power supplied wirelessly. Specifically, the lock includes a corresponding circuit that operates to increase the voltage of the power supplied wirelessly and that adjusts the electric current to a magnitude suitable for operation of the motor.


In step S233, during or after wireless power supply from the electronic key to the lock, the electronic key outputs an unlocking command to the lock. For example, after the lock receives power from the electronic key through wireless power supply, the lock can receive and handle the unlocking command from the electronic key. Note that the wireless power supply (step S231) and outputting the unlocking command (step S233) can proceed simultaneously. For example, while the electronic key undergoes the wireless power supply, the unlocking command is outputted and lasts for a short period of time (such as 2 seconds) to wait for response of the lock to acquire the power required for operation of the lock. Nevertheless, the procedures can be carried out at different times. For example, an unlocking command is transmitted to the lock after a period of time (such as 0.5 seconds), starting from beginning of the wireless power supply to the lock from the electronic key, has lapsed.


The lock receiving the unlocking command from the electronic key proceeds with an unlocking operation using the power wirelessly supplied from the electronic key (S237). Specifically, when the lock receives the unlocking command from the electronic key, the motor of the lock uses the power wirelessly supplied from the electronic key to drive the mechanism inside the lock, thereby achieving the unlocking operation.


After unlocking the lock, it is detected whether the lock is operated by an external force (S239). When no external force is applied to operate the lock, the electronic lock remains the wireless power supply (S251). On the other hand, when it is detected that the lock is operated by an external force, the lock uses the power wirelessly supplied from the electronic key (S255) to proceed with a locking operation, and the wireless power supply is then cut off (step S257).


In an example, the lock is a door lock installed on a door and is paired with the electronic key. When it is intended to unlock the door lock, it is detected whether the door is opened or a handle for opening the door is rotated. In an embodiment, a first micro switch is mounted in the door lock. When the first micro switch in the door lock is not activated, it is identified that no external force is applied to operate the door lock. In this case, the electronic key continues the wireless power supply (S251), such that the door lock remains in an operable state or an unlocked state and has power to detect whether the handle of the door lock is operated. When the handle of the door lock is operated and the first micro switch is activated, the door lock uses the wirelessly supplied power to drive the motor to thereby return the door lock to the locked state. After door lock is locked, a second micro switch can be used for detection. The second micro switch is activated when the door lock is locked. In this case, the door lock transmits a signal (demanding cutting off of the wireless power supply) to the electronic key, such that the electronic key cuts off the wireless power supply (S257).


A pre-set period of time is set and is counted down from the moment the lock is unlocked or the electronic key outputs the unlocking command. In step S253, it is identified whether the pre-set period of time has expired. The electronic key continues the wireless power supply procedure when the pre-set period of time has not expired (S251).


Namely, in a case that a holder of the electronic key does not operate the lock at all or does not operate the lock immediately, actual use of the lock will be inconvenient if the wireless power supply procedure is not maintained for a period of time. For example, if the wireless power supply is cut off before the lock is operated, the motor of the lock cannot be driven to achieve the locking operation due to lack of electricity.


When the lock is not operated, continuous wireless supply to the lock by the electronic key is a waste of the power of the electronic key whereas the lock remains in the unlocked state, which jeopardizes the safety. Thus, after the lock is unlocked, the wireless power supply must be maintained for a specific period of time to assure that the lock has sufficient power to set back to the locked state. In an example, the pre-set period of time is set to a value in a range of 5-30 seconds. For example, when the pre-set period of time is 10 seconds, a countdown of 10 seconds begins immediately after the lock is unlocked. Thus, the electronic key still wirelessly supplies power to the lock for 10 seconds.


Note that the starting time of the countdown of the pre-set period of time can be varied. For example, the countdown begins when the unlocking command is outputted by the electronic key, or when unlocking of the lock is completed.


In step S255, when the pre-set period of time has expired, the lock uses the power wirelessly supplied from the electronic key to proceed with the locking operation. Namely, when the lock is operated or the countdown of the pre-set period of time finishes, the lock will return to the unlocked state. This assures the lock is normally in the locked state to avoid the holder of the electronic key from being unaware of wireless power supply to the lock (which keeps the lock in the unlocked state).


After the lock is locked, the communication between the electronic key and the lock is cut off, and the wireless power supply is stopped (S257). Namely, no matter the lock is locked by an external force or completion of the countdown of the pre-set period of time, the lock will use the wireless supplied power to send a signal (for terminating the wireless power supply) to the electronic key, such that the electronic key cuts off the wireless power supply (S257). Thus, the electronic key cuts off the wireless power supply to the lock, such that the lock becomes a powerless state and is, thus, difficult to decrypt.


In addition to the first embodiment shown in FIG. 1, other variants of the method according to the present invention are still possible. FIG. 2 shows a method for unlocking a lock using real-time wireless power supply of a second embodiment of the present invention. Specifically, this method includes identifying whether to execute an authentication identification procedure or not (S211). When an electronic key is not used to execute the authentication identification procedure, the electronic key and a paired lock remain offline (S213). Specifically, the electronic key is paired with a lock of electronic type in advance. The electronic key can be, but not limited to, a smart mobile device which can be repeatedly recharged and on which a control APP is installed. Alternatively, the electronic key can be a repeatedly rechargeable, portable electronic key developed by a manufacture of the lock. Pairing of the electronic key and the lock can be achieved by logging the lock in a system of the electronic key. Pairing of the electronic key and the lock can be accomplished by many well-known techniques and is not the issue to be solved by the present invention, such that detailed description of the matching is not set forth herein to avoid redundancy.


When the authentication identification executed by the electronic key is successful, it is identified whether the electronic key and the lock are in the communication range (S218). When the distance between the electronic key and the lock exceeds the communication range, the electronic key does not wirelessly supply power to the lock (S220). Namely, no matter the authentication identification of the electronic key is successful or not, the electronic key and the lock remain offline as long as the distance between the electronic key and the lock exceeds the communication range. Note that the communication range is not intended to restrict the maximum communication range. For example, the communication range is not limited to the wireless power supply range. Assume the maximum distance permitting wireless power supply is 3 meters, the communication range can be set as 2 meters. Given this setting, when the distance between the electronic key and the lock is in a range between 2-3 meters, the distance between the electronic key and the lock will still be considered as exceeding the communication range.


Alternatively, the communication range can be the same as the maximum operation range of wireless power supply. In this case, the distance between the electronic key and the lock must be within the wireless power supply range, because the lock is a powerless lock, which is a lock without a built-in battery or a lock supplied with power by wired connection. In a case that the distance between the electronic key and the lock exceeds the wireless power supply range, the electronic key cannot wirelessly supply power to the lock, such that the lock cannot operate. In a case that the maximum operation range for wireless power supply can be set as the communication range, the communication range (such as within the powerless power supply range) can be different due to different techniques adopted. For example, the wireless charging range of a wireless charging technique of electromagnetic induction type meeting the requirements of wireless charging is smaller (such as the distance between the receiver and the transmitter is less than 30 mm), whereas the wireless power supply range of other techniques (such as the WattUp proposed by Energous Corporation and Cota proposed by Ossia Corporation) can be larger (generally lager than 1 meter). It can be appreciated that the wireless power supply techniques used in the present invention are not limited in this regard.


Paring of the electronic key and the lock includes, but not limited to, conventional pairing techniques, such as Bluetooth pairing technique, Wi-Fi pairing technique, etc. For example, information of the lock is logged into the electronic key, such that the lock is paired with the electronic key. In another example, the lock is provided with a hardware identification number which is registered into the electronic key to achieve successful pairing.


When the distance between the electronic key and the lock is in the communication range and the authentication identification is successful, the electronic key undergoes wireless power supply to the lock, such that the lock can use the power supplied wirelessly (S231). Specifically, to avoid unnecessary consumption of electricity of the electronic key, the electronic key wirelessly supplies power to the lock only when the holder holding the electronic key intends to proceed with the authentication identification. Note that in this procedure, regardless of the result of the authentication identification, the electronic key proceeds with wireless wire supply to the lock even though the inputting of the authentication identification information is still undergoing (which is different from the first embodiment). This is advantageous in providing the lock with sufficient response time to use the power supplied wirelessly. Thus, the lock enters a state receiving the wireless power supply, which is helpful in reliably receiving other signals or commands from the electronic key.


In step S235, when the electronic key wirelessly supplies power to the lock, the lock increases the voltage of the power supplied wirelessly, which is required for operation of the lock. The response time of the lock in the wireless power supply procedure (S231) can be the time required for the voltage-increasing step (S235). Specifically, the lock can include a circuit board for control purposes and a motor for locking and unlocking the lock. The voltage and electric current required for operating the motor may not directly come from the wireless power supply. For example, given the power of the wireless power supply is smaller than 5 w, the voltage and electric current may not be sufficient to drive the motor. Nevertheless, when the power of the wireless power supply is higher (such as 10-15 w), the voltage and electric current are sufficient to directly drive the motor. Note that since the lock per se is powerless, the voltage increasing procedure is carried out after the lock receives the power supplied wirelessly. Specifically, the lock includes a corresponding circuit that operates to increase the voltage of the power supplied wirelessly and that adjusts the electric current to a magnitude suitable for operation of the motor.


In step S215, it is identified whether the authentication identification is successful. When the authentication identification fails, the electronic key does not output the unlocking command to the lock (step S216). The authentication identification procedure can be, but not limited to, cooperation of the control APP installed in the smart mobile device with a lens or a fingerprint pick-up device of the smart mobile device. For example, the control APP installed on the smart mobile phone is executed and requests a holder of the smart mobile device to input a real-time face image through the lens of the smart mobile device. The smart mobile device identifies whether the real-time face image is correct. For example, the real-time face image is compared with an authenticated face image that has been authenticated by the smart mobile device. When the real-time face image does not match with the authenticated face image, the electronic key does not output the unlocking command to the lock (step S216).


In step S233, when the authentication identification by the electronic key is successful, the electronic key outputs the unlocking command to the lock. Specifically, after the lock receives power wirelessly supplied from the electronic key, the power can receive and handle the unlocking command from the electronic key.


The lock receiving the unlocking command from the electronic key proceeds with an unlocking operation by using the power wirelessly supplied from the electronic key (S237). Specifically, when the lock receives the unlocking command from the electronic key, the motor of the lock uses the power wirelessly supplied from the electronic key to drive the mechanism inside the lock, thereby achieving the unlocking operation.


The steps of opening operation (S239), keeping wireless power supply (S251), identification of expiration of the pre-set period of time (S253), locking operation (S255), and cutting off wireless power supply (S257) in the method of the second embodiment illustrated by the flowchart of FIG. 2 are the same as those of the first embodiment described with reference to FIG. 1. Thus, detailed descriptions are not set forth to avoid redundancy.


The lock used in the method for unlocking a lock using real-time wireless power supply of each of the first and second embodiments according to the present invention is not provided with a power source, such that operation of the lock requires wireless power supply which is carried out after pairing. Thus, it is difficult to decrypt the lock.


The lock used in the method for unlocking a lock using real-time wireless power supply of each of the first and second embodiments according to the present invention is not provided with a power source, a repeatedly rechargeable electronic key can be used to wirelessly supply power. Thus, it is not necessary to worry about power shortage of the lock.


In the method for unlocking a lock using real-time wireless power supply of the second embodiment according to the present invention, wireless power supply to the lock is carried out when the holder of the electronic key proceeds with the authentication identification. Thus, the lock has sufficient time to respond to the wireless power supply to permit subsequent execution of the unlocking command after successful authentication identification.


Now that the basic teachings of the present invention have been explained, many extensions and variations will be obvious to one having ordinary skill in the art. For example, the method of each of the first and second embodiments does not have to include the voltage increasing step S235. For example, when the wireless power supply from the electronic key to the lock has a higher power (such as 10-15 w) sufficient to drive the motor, it is not necessary to increase the voltage of the power wirelessly supplied to the lock.


Thus since the invention disclosed herein may be embodied in other specific forms without departing from the spirit or general characteristics thereof, some of which forms have been indicated, the embodiments described herein are to be considered in all respects illustrative and not restrictive. The scope of the invention is to be indicated by the appended claims, rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are intended to be embraced therein.

Claims
  • 1. A method for unlocking a lock using real-time wireless power supply, comprising: remaining an offline state between an electronic key and a lock when the electronic key is not used to execute an authentication identification procedure;executing the authentication identification procedure using the electronic key, wherein the electronic key and the lock remain in the offline state when authentication identification is identified as being unsuccessful by the electronic key;identifying whether a distance between the electronic key and the lock are in a communication range when the authentication identification is identified as being successful by the electronic key, wherein the electronic key and the lock remain in the offline state when the distance between the electronic key and the lock exceeds the communication range;wirelessly supplying power from the electronic key to the lock when the distance between the electronic key and the lock is in the communication range and when the authentication identification is identified as being successful by the electronic key, permitting the lock to use the wirelessly supplied power to operate;outputting an unlocking command from the electronic key to the lock during or after wireless power supply from the electronic key to the lock;unlocking the lock with the power wirelessly suppled from the electronic key when the lock receives the unlocking command from the electronic key;identifying whether a pre-set period of time has expired after the lock is unlocked or after the electronic key outputs the unlocking command, wherein the electronic key keeps wirelessly supplying power to the lock when the pre-set period of time has not expired;locking the lock using the power wirelessly supplied from the electronic key to the lock when the pre-set period of time has expired; andcutting off wireless power supply from the electronic key to the lock after the lock is locked.
  • 2. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, further comprising detecting whether the lock is operated by an external force after the lock is unlocked, wherein the electronic key keeps wirelessly supplying power to the lock when it is detected that no external force is applied to the lock, and wherein when it is detected that the external force is applied to operate the lock, the lock uses the power wirelessly suppled from the electronic key to proceed with locking of the lock, and the wirelessly power supply is then cut off.
  • 3. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, further comprising using the lock to increase a voltage of the power wirelessly supplied from the electronic key to enable operation of the lock.
  • 4. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, wherein the pre-set period of time is in a range of 5-30 seconds.
  • 5. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, wherein the unlocking command is outputted after the lock is enabled to operate after the wireless power supply from the electronic key.
  • 6. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, wherein countdown of the pre-set period of time begins from a moment the lock is unlocked.
  • 7. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, wherein countdown of the pre-set period of time begins from a moment the electronic key outputs the unlocking command.
  • 8. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, wherein the authentication identification includes inputting a real-time authentication identification information into the electronic key, wherein the authentication identification is identified as being successful when the real-time authentication identification information is identified as being correct, and wherein the authentication identification is identified as being unsuccessful when the real-time authentication identification information is identified as being incorrect.
  • 9. The method for unlocking the lock using real-time wireless power supply as claimed in claim 8, wherein inputting the real-time authentication identification information includes inputting a fingerprint or a face image of a holder of the electronic key.
  • 10. The method for unlocking the lock using real-time wireless power supply as claimed in claim 1, wherein the electronic key is comprised of a repeatedly rechargeable smart mobile device.
Priority Claims (1)
Number Date Country Kind
110121313 Jun 2021 TW national
CROSS REFERENCE TO RELATED APPLICATION

This is a divisional application of U.S. patent application Ser. No. 17/350,108 filed Jun. 17, 2021, now U.S. Pat. No. 11,756,355, the entire contents of which are incorporated herein by reference.

US Referenced Citations (157)
Number Name Date Kind
1643932 Teich Sep 1927 A
1687009 Drexler et al. Oct 1928 A
4102005 Schnarr et al. Jul 1978 A
4348835 Jones et al. Sep 1982 A
4419787 Lieberman Dec 1983 A
4867496 Thomas Sep 1989 A
5782509 Uyeda Jul 1998 A
6177771 Kinzer et al. Jan 2001 B1
6454324 Lewis et al. Sep 2002 B1
6634140 Sellman Oct 2003 B1
6745603 Shaw Jun 2004 B1
6786006 Kowalczyk et al. Sep 2004 B2
6891479 Eccleston May 2005 B1
7051403 Homberg May 2006 B2
7061197 Mullet et al. Jun 2006 B1
7068179 Snell et al. Jun 2006 B2
7143547 Liles, Jr. Dec 2006 B2
7234201 Brown et al. Jun 2007 B2
7282883 Mullet et al. Oct 2007 B2
7296380 Backman Nov 2007 B2
7316096 Houser et al. Jan 2008 B2
7418800 Sellman Sep 2008 B1
7484333 Houser et al. Feb 2009 B2
7555867 Liles, Jr. Jul 2009 B2
7717155 Mullet May 2010 B2
7774984 Hsu Aug 2010 B2
7966771 Bienek Jun 2011 B2
8109038 Houser et al. Feb 2012 B2
8169169 Hass et al. May 2012 B2
8248005 Romer Aug 2012 B2
8359790 Shin Jan 2013 B2
8382008 Ricciardi et al. Feb 2013 B1
8390219 Houser Mar 2013 B2
8393054 Bienek Mar 2013 B2
8407937 Houser Apr 2013 B2
8415902 Burris et al. Apr 2013 B2
8434268 Nixon May 2013 B2
8499495 Houser et al. Aug 2013 B2
8547046 Burris et al. Oct 2013 B2
8601744 Wildforster et al. Dec 2013 B2
8695277 Romer et al. Apr 2014 B2
8826598 Ranaudo et al. Sep 2014 B2
8875344 Salutzki et al. Nov 2014 B2
8904710 Romer et al. Dec 2014 B2
8963683 Romer Feb 2015 B2
9003630 Hufen Apr 2015 B2
9045927 Hoffberg Jun 2015 B1
9097051 Hellwig Aug 2015 B2
9115526 Houser et al. Aug 2015 B2
9121217 Hoffberg Sep 2015 B1
9163446 Houser et al. Oct 2015 B2
9181744 Salutzki et al. Nov 2015 B2
9187942 Wildforster Nov 2015 B2
9297194 Bienek et al. Mar 2016 B2
9506284 Braverman et al. Nov 2016 B2
9514583 Zasowski et al. Dec 2016 B2
9631412 Hellwig et al. Apr 2017 B2
9683378 Houser et al. Jun 2017 B2
9695620 Zasowski et al. Jul 2017 B2
9830932 Gunderson et al. Nov 2017 B1
9869117 Houser et al. Jan 2018 B2
9886831 Svoboda et al. Feb 2018 B1
9995076 Hoffberg Jun 2018 B1
10006236 Hellwig et al. Jun 2018 B2
10024094 Bell et al. Jul 2018 B2
10030425 Zasowski et al. Jul 2018 B2
10030426 Langenberg Jul 2018 B2
10077591 Hass Sep 2018 B2
10180023 Zasowski et al. Jan 2019 B2
10208520 Long et al. Feb 2019 B2
10236801 Dye et al. Mar 2019 B2
10253540 Bell et al. Apr 2019 B2
10273736 Hucker Apr 2019 B2
10280670 Roberts May 2019 B2
10280678 Rendon, Jr. et al. May 2019 B1
10304272 Kvinge et al. May 2019 B2
10316568 Langenberg et al. Jun 2019 B2
10344502 McKibben et al. Jul 2019 B2
10415301 Kuan Sep 2019 B2
10458151 Shen Oct 2019 B1
10472873 Ladha et al. Nov 2019 B2
10559151 Kvinge et al. Feb 2020 B2
10648208 Eickhoff May 2020 B2
10704310 Barbon et al. Jul 2020 B1
10704313 Houser et al. Jul 2020 B2
10724288 Baumgarte Jul 2020 B2
10844644 Langenberg et al. Nov 2020 B2
10968677 Hass Apr 2021 B2
11002055 Eickhoff et al. May 2021 B2
11124997 Eickhoff Sep 2021 B2
11250655 Shen Feb 2022 B2
11312207 Sanders Apr 2022 B1
11417200 Hass et al. Aug 2022 B2
11542727 Hsu Jan 2023 B2
11544979 Shen Jan 2023 B1
11661782 Eickhoff et al. May 2023 B2
11756355 Shen Sep 2023 B2
20030127869 Herron et al. Jul 2003 A1
20050154612 Smith et al. Jul 2005 A1
20060244271 Hass Nov 2006 A1
20060261675 Unno Nov 2006 A1
20070256362 Hansen Nov 2007 A1
20100107495 Bourgeois et al. May 2010 A1
20100315229 Shin Dec 2010 A1
20110302841 Ye et al. Dec 2011 A1
20120159852 Houser et al. Jun 2012 A1
20120190325 Abu-Hakima et al. Jul 2012 A1
20130009785 Finn et al. Jan 2013 A1
20130216438 Hill et al. Aug 2013 A1
20130308778 Fosmark et al. Nov 2013 A1
20130346333 Hassler et al. Dec 2013 A1
20140255252 Stratman et al. Sep 2014 A1
20140282934 Miasnik et al. Sep 2014 A1
20140325911 Hass Nov 2014 A1
20150070166 Boyden et al. Mar 2015 A1
20150113876 Burris et al. Apr 2015 A1
20150194033 Esposito et al. Jul 2015 A1
20150211278 Moyer et al. Jul 2015 A1
20150262438 Zasowski et al. Sep 2015 A1
20150339913 Lyman et al. Nov 2015 A1
20160220716 Childress et al. Aug 2016 A1
20160312514 Leonard et al. Oct 2016 A1
20160348415 Baumgarte Dec 2016 A1
20170275912 Murphy Sep 2017 A1
20170275921 Murphy et al. Sep 2017 A1
20170328100 Eickhoff Nov 2017 A1
20180334841 Langenberg et al. Nov 2018 A1
20190043289 Cahill Feb 2019 A1
20190043296 Baumgarte et al. Feb 2019 A1
20190145138 Eickhoff May 2019 A1
20190153764 Baumgarte May 2019 A1
20190203503 Chang Jul 2019 A1
20190264486 Toloday et al. Aug 2019 A1
20190319557 Dye et al. Oct 2019 A1
20190338576 Wang Nov 2019 A1
20190345738 McKibben et al. Nov 2019 A1
20190376316 Hsu Dec 2019 A1
20190376317 Hsu Dec 2019 A1
20190383080 Barbon et al. Dec 2019 A1
20200037142 Lofton Jan 2020 A1
20200190885 Coleman Jun 2020 A1
20200256108 Shetty et al. Aug 2020 A1
20200327758 Ma et al. Oct 2020 A1
20200372743 Miller et al. Nov 2020 A1
20210011443 Mcnamara et al. Jan 2021 A1
20210012598 Giebat et al. Jan 2021 A1
20210023248 Townsend et al. Jan 2021 A1
20210056791 Shen Feb 2021 A1
20210123287 Miller et al. Apr 2021 A1
20210134096 Pukari May 2021 A1
20210192876 Tikkanen Jun 2021 A1
20210217260 Chen Jul 2021 A1
20210252179 Grinstead et al. Aug 2021 A1
20210308311 Stewart et al. Oct 2021 A1
20220148393 Shen et al. May 2022 A1
20220307316 Soderqvist Sep 2022 A1
20230104006 Tien Apr 2023 A1
Foreign Referenced Citations (12)
Number Date Country
2014339759 May 2018 AU
0107151 May 1984 EP
1788169 May 2007 EP
3550528 Sep 2019 EP
3805490 Apr 2021 EP
2572027 Sep 2019 GB
20210019168 Feb 2021 KR
20210033154 Mar 2021 KR
8800633 Jan 1988 WO
2021007588 Jan 2021 WO
2021050616 Mar 2021 WO
2021214134 Oct 2021 WO
Related Publications (1)
Number Date Country
20230343157 A1 Oct 2023 US
Divisions (1)
Number Date Country
Parent 17350108 Jun 2021 US
Child 18345316 US