Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AN ELECTRONIC SMART KEY, SYSTEM AND METHOD FOR CONTROLLING AND OPERATING A LOCK
Document Type and Number:
WIPO Patent Application WO/2014/132211
Kind Code:
A1
Abstract:
This invention relates to a system (10) and method (100) for controlling and operating a lock (18, 300). The invention extends to an electronic smart key (16) for controlling the lock (18, 300). The lock (18) can be used to secure a consignment of examination papers or other confidential information, for example. The lock (18, 300) is a passive component which is inductively powered by the portable smart key (16) when the key (16) is brought into close proximity to the lock (18). In order to unlock the lock (18, 300), pre-defined lock operating criteria, which have been preloaded to the smart key (16), have to be satisfied. The criteria specify geographic and time parameters within which the smart key (16) can be used to unlock the lock (18, 300). Outside of these parameters, the smart key (16) will not unlock the lock (18, 300).

Inventors:
OLIVIER JOHAN (ZA)
LOURENS CORNELIUS PETRUS (ZA)
SCOTT ANDREW ERNEST (ZA)
Application Number:
PCT/IB2014/059292
Publication Date:
September 04, 2014
Filing Date:
February 27, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SMART LOCKING LOGIC PTY LTD (ZA)
International Classes:
G07C9/00
Foreign References:
US20030179073A12003-09-25
US20070176738A12007-08-02
US20010015691A12001-08-23
US20110082882A12011-04-07
US20080297346A12008-12-04
Other References:
None
Attorney, Agent or Firm:
DAVIES, James, Hasely et al. (PO Box 1014, 0001 Pretoria, ZA)
Download PDF:
Claims:
CLAIMS:

1 . An electronic smart key for controlling and operating a lock based on pre-defined lock operating criteria, the key including: a first connection interface which is operable to link the key with a computing device; a second wireless connection interface which is operable to couple the key with a lock wirelessly, the key being operable to power the lock wirelessly; a control module which is in communication with the first connection interface and the second connection interface; and a geographic positioning module which is operable to measure positional information regarding a geographical location of the key and to communicate such information to the control module, wherein the key is operable to receive pre-defined lock operating criteria from the computing device via the first connection interface, and to control operation of the lock wirelessly based on the pre-defined lock operating criteria and the positional information provided by the geographic positioning module and to actuate the lock wirelessly in response to compliance with the pre-defined lock operating criteria.

2. The smart key as claimed in claim 1 , in which: the pre-defined lock operating criteria include a permitted operating region, and the control module is operable to actuate the lock in response to the measured geographic location of the key being within the permitted operating region.

3. A smart key as claimed in claim 1 or claim 2, which includes a timing module which is operable to determine a current date/time and to communicate the current date/time information to the control module.

4. The smart key as claimed in claim 3, in which: the pre-defined lock operating criteria include a permitted operating date/time, and the control module is operable to actuate the lock in response to the current date/time being within the permitted operating date/time.

5. A smart key as claimed in any of the preceding claims, in which: the pre-defined lock operating criteria include a permitted lock identifier; and the control module is operable to actuate the lock in response to the permitted lock identifier matching an actual lock identifier of the lock.

6. A smart key as claimed in any of the preceding claims, wherein the second wireless connection interface is configured to couple with the lock inductively, the lock being an electronically operated lock.

7. A smart key as claimed in claim 6, wherein the second wireless connection interface is a Radio Frequency (RF) interface.

8. A smart key as claimed in any of the preceding claims, in which the first connection interface is a cellular communication interface which is operable to communicate with the computing device via a mobile communication network, the key including a Subscriber Identification Module (SIM) in order to identify and authenticate the key on the mobile network.

9. A smart key as claimed in claim 8, which includes a data logging module which is operable to log details of all communication taking place between the key and the lock, for the purpose of forwarding such information to the computing device via the first wireless connection interface.

10. A smart key as claimed in claim 9, which includes an encryption/decryption module for the purposes of securing communications between the key and the lock and/or the key and the computing device.

1 1 . A method of controlling and operating a lock with a smart key, the method including: coupling the key wirelessly with an electronic lock via a second connection interface; measuring actual criteria of the key or lock; determining whether or not the actual criteria comply with pre-defined lock operating criteria which have been received by the key from a computing device via a first connection interface; and communicating a control signal to actuate the lock, in response to compliance with the pre-defined lock operating criteria, via the second connection interface in order to control the lock.

12. A method as claimed in claim 1 1 , which includes prior steps of: linking the electronic smart key with the computing device via the first connection interface; and downloading, via the connection interface, the pre-defined lock operating criteria from the computing device to the smart key.

13. A method as claimed in claim 12, wherein the pre-defined lock operating criteria include a permitted operating date/time, the step of determining whether or not the actual criteria comply with the pre-defined lock operating criteria including matching a current date/time with the permitted operating date/time.

14. A method as claimed in claim 12 or claim 13, wherein the pre-defined lock operating criteria include a permitted operating region, the step of determining whether or not the actual criteria comply with the pre-defined lock operating criteria including comparing the measured geographic location with the permitted operating region.

15. A method as claimed in any of claims 1 1 to 14 inclusive, in which the smart key is configured to power the lock wirelessly by way of inductive coupling.

16. A method as claimed in any of claims 1 1 to 15 inclusive, which includes reading via the second connection interface an actual lock identifier from the lock and communicating this to a control module of the key.

17. A method as claimed in claim 1 6, which includes encrypting/decrypting information communicated between the computing device and the key and/or between the key and the lock.

18. A method as claimed in claim 1 7, which includes recording and communicating logging information from the key to the computing device via the first connection interface, the logging information including one or more of: date/time of a communication; identifier of the lock involved; identifier of a container within which the lock is housed; identifier of the key involved in the communication; lock operating criteria; control instructions received by the lock including attempts to unlock the lock; or geographical location information of the key.

19. A method as claimed in any of claims 1 1 to 18 inclusive, in which the key is an electronic smart key as claimed in any of claims 1 to 10 inclusive.

20. An electronic lock which includes: a passive circuit arrangement which is configured wirelessly to couple with an electronic smart key and wirelessly to be powered by the key; and a lock mechanism which is displaceable between an open position and a locked position in response to a control signal received from the key.

21 . A lock as claimed in claim 20, wherein the circuit arrangement includes: a wireless communication module which is operable wirelessly to couple to the electronic key; and a processor which is connected to the wireless communication module and wherein the lock mechanism includes: a locking member; and an actuator which is in communication with the processor and which is configured to actuate the locking member, the lock including an enclosure configured to encapsulate the lock mechanism and the circuit arrangement.

22. A lock as claimed in claim 21 , wherein the processor is configured to communicate the position of the lock mechanism and/or a unique identifier associated with the lock to the key via the communication module.

23. A lock as claimed in any one of claims 20 to 22 inclusive, which includes an encryption/decryption module operable to encrypt/decrypt instructions received from and sent to the key.

24. A lock as claimed in any of claims 20 to 23, which is a standalone lock intended for connection to a discrete container.

25. A lock as claimed in any of claims 20 to 23, which is integrated into a container.

26. A system for controlling and operating a lock, the system including: an electronic smart key as claimed in any of claims 1 to 10 inclusive; and at least one electronic lock as claimed in any of claims 20 to 25 inclusive, the smart key being configured wirelessly to couple with and to control the lock.

27. A system as claimed in claim 26, which includes a computing device which is operable to link to the key via the first connection interface of the key, thereby to transmit pre-defined lock operating criteria to the key.

Description:
An electronic smart key, system and method for controlling and

operating a lock

FIELD OF INVENTION

This invention relates generally to locks and specifically to a device, system and method of controlling and operating a lock, and to the lock itself.

BACKGROUND OF INVENTION

The Applicant has noted that in certain instances there exists a need for, e.g. a supervisory body, remotely to manage access to packages or goods in transit to various destinations. An example of such a scenario is where a central examination body distributes examination papers to a number of spaced apart examination venues. Ordinarily, it is a very difficult task for the examination body to manage handling of the respective examination packs to ensure that all venues only open the examination packs at a specific time and that after an examination has been conducted, answer sheets are timeously collected and returned back to the central body. Unregulated handling of examination material may result in leaking of examination papers before a scheduled examination takes place or tampering with examination packs or other irregularities relating to the manner in which examinations are conducted, for example, the unauthorised granting of extra time.

The Applicant desires a device, system and method which address or at least alleviate the above problems. SUMMARY OF INVENTION

In accordance with a first aspect of the invention, there is provided an electronic smart key for controlling and operating a lock based on pre-defined lock operating criteria, the key including: a first connection interface which is operable to link the key with a computing device; a second wireless connection interface which is operable to couple the key with a lock wirelessly, the key being operable to power the lock wirelessly; a control module which is in communication with the first connection interface and the second connection interface; and a geographic positioning module which is operable to measure positional information regarding a geographical location of the key and to communicate such information to the control module, wherein the key is operable to receive pre-defined lock operating criteria from the computing device via the first connection interface, and to control operation of the lock wirelessly based on the pre-defined lock operating criteria and the positional information provided by the geographic positioning module and to actuate the lock wirelessly in response to compliance with the pre-defined lock operating criteria.

The pre-defined lock operating criteria may include a permitted operating region, and the control module may be operable to actuate the lock in response to the measured geographic location of the key being within the permitted operating region.

The smart key may include a timing module which is operable to determine a current date/time and to communicate the current date/time information to the control module. The pre-defined lock operating criteria may include a permitted operating date/time, and the control module may be operable to actuate the lock in response to the current date/time being within the permitted operating date/time.

The pre-defined lock operating criteria may include a permitted lock identifier; and the control module may be operable to actuate the lock in response to the permitted lock identifier matching an actual lock identifier of the lock.

The lock operating criteria may dictate that only a specific key, or range of keys, can open a specific lock, or range of locks. In other words, each lock may be assigned a password or unique code without which the lock cannot be actuated. A smart key would therefore only be able to actuate the lock if the lock's password or unique code had been assigned to or preloaded onto the smart key.

The geographic positioning module may be in the form of a Global Positioning System (GPS) module. The GPS module may be a conventional satellite based GPS receiver module.

The second wireless connection interface may be configured to couple with the lock inductively, the lock being an electronically operated lock. The second wireless connection interface may be a Radio Frequency (RF) interface.

The second connection interface may include an antenna. The antenna may be an RF antenna. The key may be operable to interrogate conventional RFID tags and read from the RFID tags, for example using the second, wireless connection interface. Instead, or in addition, the second connection interface may be in the form a conventional communication medium, such as Bluetooth or Wi-Fi. The first connection interface may be a cellular communication interface which is operable to communicate with the computing device via a mobile communication network, the key including a Subscriber Identification Module (SIM) in order to identify and authenticate the key on the mobile network.

The smart key may include a data logging module which is operable to log details of all communication taking place between the key and the lock, for the purpose of forwarding such information to the computing device via the first wireless connection interface.

The smart key may include an encryption/decryption module for the purposes of securing communications between the key and the lock and/or the key and the computing device.

The control module may be one or more microprocessors, controllers, digital signal processors (DSP's) or any other suitable computing device, resource, hardware, software or embedded logic.

The invention extends to a method of controlling and operating a lock with a smart key, the method including: coupling the key wirelessly with an electronic lock via a second connection interface; measuring actual criteria of the key or lock; determining whether or not the actual criteria comply with pre-defined lock operating criteria which have been received by the key from a computing device via a first connection interface; and communicating a control signal to actuate the lock, in response to compliance with the pre-defined lock operating criteria, via the second connection interface in order to control the lock. The method may include the prior steps of: linking the electronic smart key with a computing device; and downloading, via a connection interface, pre-defined lock operating criteria from the computing device to the smart key.

The method may further include a prior step of defining, using a client terminal connected to the computing device via a communication network, lock operating criteria and storing such lock operating criteria on the computing device.

The pre-defined lock operating criteria may include a permitted operating date/time, the step of determining whether or not the actual criteria comply with the pre-defined lock operating criteria including matching a current date/time with the permitted operating date/time.

The pre-defined lock operating criteria may include a permitted operating region, the step of determining whether or not the actual criteria comply with the pre-defined lock operating criteria including comparing the measured geographic location with the permitted operating region.

The smart key may be configured to power the lock wirelessly by way of inductive coupling.

The method may include reading via the second connection interface an actual lock identifier from the lock and communicating this to a control module of the key. The method may further include encrypting/decrypting information communicated between the computing device and the key and/or between the key and the lock.

The method may include recording and communicating logging information from the key to the computing device via the first connection interface, the logging information including one or more of: date/time of a communication; identifier of the lock involved; identifier of a container within which the lock is housed; identifier of the key involved in the communication; lock operating criteria; control instructions received by the lock including attempts to unlock the lock; or geographical location information of the key.

The key may be an electronic smart key as described above.

The invention extends to an electronic lock which includes: a passive circuit arrangement which is configured wirelessly to couple with an electronic smart key and wirelessly to be powered by the key; and a lock mechanism which is displaceable between an open position and a locked position in response to a control signal received from the key.

The circuit arrangement may include: a wireless communication module which is operable wirelessly to couple to the electronic key; and a processor which is connected to the wireless communication module and wherein the lock mechanism includes: a locking member; and an actuator which is in communication with the processor and which is configured to actuate the locking member, the lock including an enclosure configured to encapsulate the lock mechanism and the circuit arrangement.

The processor may be configured to communicate the position of the lock mechanism and/or a unique identifier associated with the lock to the key via the communication module.

The lock may include an encryption/decryption module operable to encrypt/decrypt instructions received from and sent to the key.

The lock may be a standalone lock intended for connection to a discrete container. Alternatively, the lock may be integrated into a container. The lock may be receivable or integrated within a container, the lock being configured to lock a closure member of the container preventing access to the container while the lock itself is contained within the container. The lock may be contained within a container which includes an RFID tag serving as a means of identification, the key being configured to interrogate the RFID tag of the container.

In accordance with a further embodiment of the invention, there is provided a system for controlling and operating a lock, the system including: an electronic smart key as described above; and at least one electronic lock as described above, the smart key being configured wirelessly to couple with and to control the lock. The system may include a computing device which is operable to link to the key via the first connection interface of the key, thereby to transmit predefined lock operating criteria to the key.

The computing device may be in the form of a web server which is coupled to the first connection interface of the key via a wireless communication network such as a GSM network. The system may further include a client terminal which is configured to access the web server via a network interface.

BRIEF DESCRIPTION OF DRAWINGS

The invention will now be further described, by way of example, with reference to the accompanying drawings:

In the drawings:

Figure 1 shows a schematic view of a system for controlling and operating a lock, in accordance with the invention;

Figure 2 shows a flow diagram of a method of controlling and operating a lock in accordance with the invention;

Figure 3 illustrates a three-dimensional exploded view of an electronic lock in accordance with the invention;

Figure 4 shows a three-dimensional view of the electronic lock of Figure 3 in an assembled condition;

Figure 5 shows a three-dimensional view of an electronic smart key in accordance with the invention; and

Figure 6 shows a three-dimensional view of a container locked with the lock of Figure 4 unlockable with the key of Figure 5. DETAILED DESCRIPTION OF AN EXAMPLE EMBODIMENT

The following description of the invention is provided as an enabling teaching of the invention. Those skilled in the relevant art will recognise that many changes can be made to the embodiment described, while still attaining the beneficial results of the present invention. It will also be apparent that some of the desired benefits of the present invention can be attained by selecting some of the features of the present invention without utilising other features. Accordingly, those skilled in the art will recognise that modifications and adaptations to the present invention are possible and can even be desirable in certain circumstances, and are a part of the present invention. Thus, the following description is provided as illustrative of the principles of the present invention and not a limitation thereof.

In Figure 1 , numeral 10 refers generally to a system for controlling and operating a lock in accordance with the invention. In broad terms, the system 10 includes: a computing device in the form of a web server 12 which includes a database for storage of information; a client terminal 14 which is operable to communicate with the web server 12 via a communication network 15; a portable device, in accordance with the invention, in the form of an electronic smart key 16 which is configured to link with the web server 12 via a first connection interface, which in this example embodiment is in the form of a mobile telecommunications interface; and an encapsulated lock 18, in accordance with the invention.

Accordingly, the key 16 includes a cellular communication module 17 which includes an RF (Radio Frequency) radio to enable communication with the web server 12 via the mobile telecommunications network 20. The key 16 further includes a second connection interface in the form of a RF communication module 19 which is configured to couple inductively with the lock 18, such that the key 16 serves to power the lock 18 when the key 16 is brought in close proximity to the lock 18. The lock 18 is therefore a passive element which does not have a dedicated power source such as a battery or mains power connection.

The key 16, on the other hand, is an active element which is powered, for example by a rechargeable battery 22. The key 16 further includes a control module in the form of a central processing unit (CPU) 24 which is electrically connected to the battery 22, the cellular communication module 17 and the RF communication module 19.

In order to identify and authenticate the key 16 on the mobile telecommunications network 20, it includes a SIM 23. The key 16 further includes a positioning module in the form of a Global Positioning System (GPS) module 25 which has an antenna through which communication with satellites is enabled in order to determine a geographical location of the key 16. The RF communication module 19 has RFID capabilities, in other words, it is operable to interrogate conventional RFID tags and read from the RFID tags. The GPS module 25 may also serve as a timing module (because GPS signals transmitted by satellites usually include time/date information). Instead, the key 16 may include a separate, discrete timing module (not illustrated).

The lock 18 may be a standalone lock, like a padlock, intended for connection to a discrete container. Instead, the lock 18 may be integrated into a container or closure member. The lock 18 includes: a wireless transceiver 27 which is operable to couple to and communicate with the RF communication module 19 of the key 16; an inductive coupler 29 which is operable inductively to couple to, and hence to be powered by, the RF communication module 19 of the key 16, the coupler 29 in turn providing power to circuitry of the lock 18; a locking mechanism 32 which comprises a locking member 33 and an actuator 34 which is operable to actuate the locking member 33; a processor 30 which is electrically connected to the coupler 29, the wireless transceiver 27 and the locking mechanism 32; and an enclosure 39 configured to encapsulate all the above components of the lock 18.

The wireless transceiver 27 and the inductive coupler 29 may be discrete components (as illustrated) or an integrated component.

The enclosure 39 is of a polymeric material and is air tight and water tight.

The lock 18 further includes an identifier 35 which may be in the form of a conventional RFID tag or a unique number which is programmed to the processor 30 of the lock 18 upon manufacturing. Finally, the lock 18 includes a decryption/encryption module 37.1 which serves to preserve the security of communications between the lock 18 and the key 16.

Accordingly, the key 16 also has a decryption/encryption module 37.2. As information logging is performed in order to keep track of all transactions and communications between the key 16 and one or more locks 18, the key 16 includes a data storage module 38. All logging information is stored by the storage module 38 and communicated or reported to the web server 12 via the mobile telecommunications network 20.

A different embodiment of an electronic lock in accordance with the invention is illustrated in figures 3 and 4 wherein the lock is generally indicated by numeral 300. The lock 300 includes a housing 302 which comprises top, middle and bottom pieces 301 , 303, 305, a passive, inductively powered circuit arrangement 304 and a shackle or lock member 306. The lock 300 further includes an RFID tag 307 and a pair of tamper indicating seals 310. The seals 310 are transversely arranged on either side, externally of the housing 302 such that each seal 310 is in contact with all three pieces 301 , 303, 305 of the housing 302. The lock 300 further includes a visual indicator (not shown) which serves to indicate the position of the shackle 306, for e.g. a red dot indicates that the lock is open and a green dot indicates that the lock is closed.

Furthermore, the housing 302 defines a circular cylindrical opening 312 (see figure 4) which extends transversely through the lock 300 and which is configured to receive an antenna of the key 16. In order to inductively power and actuate the lock 300 the antenna of the key 16 (see figure 5) is brought in close proximity to the housing 302 and positioned in the opening 312 defined by the housing 302.

As an example, the lock 18, 300 can be used to lock a portable container 40 transporting a consignment of goods, access to which needs to be managed or regulated. The lock 18 is configured to lock the container 40 from within such that the lock 18 itself is housed within the container 40, denying access to the lock 18 when the container is closed. The container 40 also includes a RFID tag 42 which may be read by the RF communication module 19 for the purposes of identification.

The invention will now be further described in use. Referring to Figure 2, in which reference numeral 100 generally indicates a method of controlling and operating a lock, in accordance with the invention. A consignment of goods to be transported is placed within the container 40 and the container 40 is locked using the lock 18. Alternatively, the lock 300 may also be used to secure the container 40 from the outside. The container 40 is then transported to a designated location. During transportation, access to the consignment of goods is denied by virtue of the lock 18 being closed. Once the container 40 reaches its desired destination a lock operator needs to gain access to the container 40 in which the lock 18 has been installed to retrieve the goods from the container 40. Prior to attempting to unlock the lock 18 using the electronic smart key 16, a manager or supervisor accesses the web server 12 via a client terminal 14 and defines, at block 102, lock operating criteria and stores the lock operating criteria on the web server 12. In practical terms, the lock operating criteria specifies a specific date and time frame, as well as a geographical location, within which access to a specific lock 18, 300 will be granted using a specific electronic smart key 16. Outside of the pre-defined time frame and specified geographical location, any attempt to unlock the lock 18, 300 will not succeed. The smart key 16 is however configured to log all attempts to unlock a lock 18, 300 and to report such attempts to a supervisory body.

Once the lock operating criteria have been set, the electronic smart key 16 is paired or wirelessly coupled, at block 104, to the web server 12 across the mobile telecommunications network 20 using the cellular communication module 17 of the key 16. Owing to the fact that cellular networks provide widespread mobile network coverage, gaining access to the web server 12 via the mobile network should not pose a problem. Once a connection has been established the lock operating criteria is downloaded, at block 106, to the key 16.

A current geographical location of the key 16 is obtained, at block 108, through the use of the GPS module 25. At the appointed time and location, the lock operator wirelessly couples, at block 1 10, the smart key 16 to the lock 18, 300 to be unlocked (refer to Figure 6). The smart key 16 is configured inductively to power the lock 18, 300 when it is brought into close proximity to the lock 18, 300. At this point the smart key 16 interrogates or reads the unique identifier 35, 307 of the lock 18, 300 and that of an RFID tag 42 of the container 40 to which the lock 18, 300 has been installed.

Once all of the above information has been collected by the smart key 16, the key 16 matches, at block 1 12, using the CPU 24, the date, time and measured positional information associated with the particular lock 18, 300 in question, with the lock operating criteria stored on the key 16. Provided the measured information matches the lock operating criteria, a control signal is communicated, at block 1 14, wirelessly, using a wireless communication standard such as Bluetooth or Wi-Fi, or the energising signal itself, to the lock 18, 300 in response to which the processor 30 of the lock 18, 300 actuates the locking member 33, 306. If there is no match, no control signal is sent to the lock 18, 300 and no access is granted.

There are a number of different applications for which the device, system and method of controlling and operating a lock 18, 300 in accordance with the invention, will be useful. For example, in the conduction of elections, examinations or in the transport and handling of confidential information such as forensic evidence or dockets, any containers used to transport ballots, examination papers or confidential information may be secured using the lock 18, 300 in accordance with the invention and in this way access to the contents of the containers can be managed effectively using one or more electronic smart keys 16. In this manner, the end user or supervisory body is provided with some form of assurance that the consignment was not compromised in any way in the form of a transaction log or history report of all activity involving the lock and the smart key.

In addition to consignments intended for a single end destination, the device, method and system in accordance with the invention can be used to manage consignments intended for one or more remote locations, for e.g. round trip consignments.

Furthermore, all transactions between the smart keys and locks are recorded in "near real time" and transferred to the web server, which, besides providing a transaction history report, verifying that consignments were only accessed as per the required schedule, also provides real time alarming if containers are not locked at the end of given access periods, or if attempts are made to open a container at geographic locations which have not been pre-defined or authorised. As with all central management systems, the system also has a host of other generic capabilities such as report generation, fault logs, alarm logs etcetera.