The subject matter herein generally relates to locks and keys, and more particularly to a smart key for unlocking a plurality of electronic and mechanical locks.
Generally, each lock requires a designated key to be opened. An electronic lock may require an electronic key, and a mechanical lock may require a mechanical key.
Implementations of the present technology will now be described, by way of example only, with reference to the attached figures.
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures and components have not been described in detail so as not to obscure the related relevant feature being described. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features. The description is not to be considered as limiting the scope of the embodiments described herein.
Several definitions that apply throughout this disclosure will now be presented.
The term “coupled” is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections. The connection can be such that the objects are permanently connected or releasably connected. The term “comprising” means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in a so-described combination, group, series and the like.
In general, the word “module” as used hereinafter refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language such as Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware such as in an erasable-programmable read-only memory (EPROM). It will be appreciated that the modules may comprise connected logic units, such as gates and flip-flops, and may comprise programmable units, such as programmable gate arrays or processors. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of computer-readable medium or other computer storage device.
The processing unit 30 can include a plurality of modules for unlocking the locks. The plurality of modules can include a first obtaining module 31, a determining module 32, a second obtaining module 33, and a key generating module 34. The modules 31-34 can include one or more software programs in the form of computerized codes stored in the storage unit 20. The computerized codes include instructions executed by the processing unit 30 to provide functions for the modules 31-34.
The first obtaining module 31 can obtain the user information and the lock information from the obtaining unit 10.
The determining module 32 can determine whether the user information matches the predetermined user information. If the user information matches the predetermined user information, then the user is an authorized user of the smart key 100. If the user information does not match the predetermined user information, then the user is not an authorized user of the smart key 100. The user information can be a fingerprint of the user, a picture of a face of the user, or a username and password of the user, for example. When the user information is a fingerprint, then the input terminal of the obtaining module 31 can be a fingerprint scanner. When the user information is a picture of the face of the user, then the input terminal can be a camera. When the user information is a username and password, then the input terminal can be a keypad.
The second obtaining module 33 can obtain the predetermined lock information from the storage unit 20 according to the lock information. The lock information can be a picture of the lock, a geographic location of the lock, or a preset serial code of the lock, for example. When the lock information is a picture of the lock, then the input terminal can be a camera. When the lock information is a geographic location of the lock, then the input terminal can be a global positioning system. When the lock information is a preset serial code, the input terminal can be a keypad. The second obtaining module 33 can further obtain corresponding key information from the predetermined lock information.
The key generating module 34 can generate a matching key according to the key information. When the lock is an electronic lock, then the key generating module 34 can generate an electronic matching key according to the key information. When the lock is a mechanical lock, then the key generating module 34 can generate a mechanical matching key according to the key information. The electronic matching key can be an unlock instruction transmitted to the lock through the communication unit 40. Thus, the smart key 100 can be used to unlock a plurality of different electronic locks.
Referring to
At block 301, user information of a user of a smart key can be obtained from an input terminal of the smart key. The user information can include a fingerprint of the user, a picture of a face of the user, or a username and password of the user, for example. When the user information is a fingerprint, then the input terminal can be a fingerprint scanner. When the user information is a picture of the face of the user, then the input terminal can be a camera. When the user information is a username and password, then the input terminal can be a keypad.
At block 302, the smart key can determine whether the user is an authorized user of the smart key by comparing the user information to predetermined user information stored in the smart key. When the user information matches the predetermined user information, block 303 is implemented. When the user information does not match the user information, the method ends.
At block 303, the smart key can obtain lock information from the lock. The lock information can be a picture of the lock, a geographic location of the lock, or a preset serial code of the lock, for example. When the lock information is a picture of the lock, then the input terminal can be a camera. When the lock information is a geographic location of the lock, then the input terminal can be a global positioning system. When the lock information is a preset serial code, then the input terminal can be a keypad.
At block 304, the smart key can obtain corresponding key information according to the lock information. In detail, the lock information is matched to predetermined lock information stored in the smart key, and the corresponding key information is obtained from the predetermined lock information.
At block 305, the smart key can generate a matching key according to the key information to unlock the lock. When the lock is an electronic lock, the smart key can generate an electronic matching key. The electronic matching key can be an unlock instruction transmitted to the electronic lock through BLUETOOTH®, NFC®, or infrared, for example. When the lock is a mechanical lock, the smart key can generate a mechanical matching key by extending or retracting a key shaft and a plurality of key teeth of the smart key to predetermined lengths according to the key information.
The embodiments shown and described above are only examples. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, including in matters of shape, size and arrangement of the parts within the principles of the present disclosure up to, and including, the full extent established by the broad general meaning of the terms used in the claims.
Number | Date | Country | Kind |
---|---|---|---|
103140139 A | Nov 2014 | TW | national |
Number | Name | Date | Kind |
---|---|---|---|
20020140542 | Prokoski et al. | Oct 2002 | A1 |
Number | Date | Country |
---|---|---|
200909653 | Mar 2009 | TW |
M375107 | Mar 2010 | TW |
Number | Date | Country | |
---|---|---|---|
20160140787 A1 | May 2016 | US |