Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
REMOTE LOCK UNLOCKING
Document Type and Number:
WIPO Patent Application WO/2019/243316
Kind Code:
A1
Abstract:
It is provided a method for requesting remote unlocking of an electronic lock controlling access to a physical space. The method is performed in a user device and comprises steps of: sending a control message to an access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and sending an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock.

Inventors:
STRÖMBERG STEFAN (SE)
SINGH SONA (SE)
Application Number:
PCT/EP2019/065996
Publication Date:
December 26, 2019
Filing Date:
June 18, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ASSA ABLOY AB (SE)
International Classes:
G07C9/00
Foreign References:
EP3300033A12018-03-28
EP2919202A12015-09-16
CN107545619A2018-01-05
US20120157079A12012-06-21
Attorney, Agent or Firm:
KRANSELL & WENNBORG KB (SE)
Download PDF:
Claims:
CLAIMS

1. A method for requesting remote unlocking of an electronic lock (10) controlling access to a physical space (15), the method being performed in a user device (20) and comprising steps of:

- sending a control message to an access controller (30), the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and

- sending an unlock message to the access controller (30) comprising the user authentication information, in order to unlock the electronic lock (15).

2. The method according to claim 1, wherein the alert signal is transmitted from the lock.

3. The method according to claim 2, wherein the alert signal is a sound signal.

4. The method according to claim 2, wherein the alert signal is a light signal.

5. The method according to any of the preceding claims, further comprising the step of:

- acquiring a lock identifier from the vicinity of the electronic lock (10); wherein the unlock message further comprises the lock identifier.

6. The method according to claim 5, wherein the lock identifier is broadcast from the electronic lock.

7. The method according to claim 6, wherein the lock identifier is broadcast using a Bluetooth beacon.

8. The method according to claim 5, wherein the lock identifier is acquired from an optical, machine-readable code.

9. The method according to claim 8, wherein the lock identifier is acquired from a two-dimensional bar code.

10. The method according to claim 5, wherein the lock identifier is a digital image.

11. A user device (20) for requesting remote unlocking of a physical space (15) controlled by an electronic lock (10), the user device (20) comprising: - a processor; and

- a memory storing instructions that, when executed by the processor cause the user device (20) to:

- send a control message to the access controller (30), the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and

- send an unlock message to the access controller (30) comprising the user authentication information, in order to unlock the electronic lock (15).

12. A computer program for requesting remote unlocking of a physical space (15) controlled by an electronic lock (10), the computer program comprising computer program code which, when run on an user device (20), causes the user device (20) to:

- send a control message to the access controller (30), the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and - send an unlock message to the access controller (30) comprising the user authentication information, in order to unlock the electronic lock (15).

13. A computer program product comprising a computer according to claim 12 and a computer readable means on which the computer program is stored.

Description:
REMOTE LOCK UNLOCKING TECHNICAL FIELD

The invention relates to a method, user device, computer program and computer program product for requesting remote unlocking of an electronic lock.

BACKGROUND

With online shopping steadily increasing, deliveries of physical goods are also increasing. Consumers want fast and cheap delivery and the delivery companies want efficiency and safety for their deliveries. Consumers want to save time and they do not want to wait at their homes for a delivery. Traditional solutions, e.g. to leave a key or a code which would enable an access to a consumer's home for an undefined amount of time in uncontrolled conditions, are not acceptable. Considering that the value of goods is also increasing, a delivery to an open area, e.g. garden or a corridor is not satisfactory either.

Moreover, various leasing or renting solutions utilizing peer-to-peer property rental are getting more popular. Users or companies want to allow other users to use their real estate, vehicles and other closed physical spaces for a limited amount of time, but they still have high demands for the security. Although they grant access to e.g. one of their rooms or storages, it is not acceptable if the space is unlocked while the person supposed to use it is not there or if a neighbouring space is opened instead.

Current security solutions for deliveries and rental rely on delegating an access to another user, but a delivery person or any other user authorised to unlock a lock may execute their rights from any location, which can cause problems if the delivery person unlocks a lock they are not going to use immediately or if they have no or insufficient information about the position of a lock. For example, GPS information could be insufficient if the user is not aware of the altitude information, and by mistake opens a room at the wrong floor.

Another available solution relies on a physical space owner to unlock their lock exactly when a delivery person comes to their physical space, which is not acceptable, because the owner always has to be available even if they are able to open their lock remotely.

SUMMARY

It is an objective to improve security and both consumer and deliverer convenience.

According to a first aspect, it is provided a method for requesting remote unlocking of an electronic lock controlling access to a physical space. The method is performed in a user device and comprises steps of: sending a control message to an access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and sending an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock.

The alert signal may be transmitted from the lock. The alert signal may be a sound signal. The alert signal may be a light signal.

The method may further comprise the step of: acquiring a lock identifier from the vicinity of the electronic lock. In such a case, the unlock message further comprises the lock identifier.

The lock identifier may be broadcast from the electronic lock.

The lock identifier may be broadcast using a Bluetooth beacon.

The lock identifier may be acquired from an optical, machine readable code. The lock identifier may be acquired from a two dimensional bar code.

The lock identifier may be a digital image. According to a second aspect, it is provided a user device for requesting remote unlocking of a physical space controlled by an electronic lock. The user device comprises: a processor; and a memory storing instructions that, when executed by the processor cause the user device to: send a control message to the access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and send an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock.

According to a third aspect, it is provided a computer program for requesting remote unlocking of a physical space controlled by an electronic lock. The computer program comprises computer program code which, when run on an user device, causes the user device to: send a control message to the access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and send an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock.

According to a fourth aspect, it is provided a computer program product comprising a computer according to claim the third aspect and a computer readable means on which the computer program is stored.

Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the element, apparatus, component, means, step, etc." are to be interpreted openly as referring to at least one instance of the element, apparatus, component, means, step, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated. BRIEF DESCRIPTION OF THE DRAWINGS

The invention is now described, by way of example, with reference to the accompanying drawings, in which:

Fig l is a sequence diagram illustrating a use case illustrating embodiments presented herein;

Fig 2 is a flow chart illustrating a method for requesting remote unlocking of a physical space;

Fig 3. illustrates various two examples of a lock identifier and an alert signal;

Fig 4 is a schematic diagram illustrating components of the user device of Fig 1; and

Fig 5 shows one example of a computer program product 90 comprising computer readable means.

DETAILED DESCRIPTION

The invention will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout the description.

Fig 1 is a sequence diagram illustrating a use case illustrating embodiments presented herein. A user device 20 belongs to a user 25, who e.g. can be a delivery company employee. The user device 20 is any suitable device with capability of processing and communication. For instance, the user device 20 can be implemented as a wearable device, a mobile phone, a smart phone or a tablet/laptop computer with wireless connectivity. When the user arrives at a space to which the user is to access, the user needs to identify the correct electronic lock 10 (hereinafter also referred to simply as‘the lock’).

The user controls 50 the user device 20 to transmit a control message 51 to access controller 30 to trigger an alert by the appropriate lock 10. The control message 50 comprises user authentication information. The user

authentication information allows the access controller 30 to authorise the user device 20, as known in the art per se. The control message 51 causes the access controller 30 to send an alert message 52 to the electronic lock 10.

The user authorisation information is a piece of data used by the user device 20 to gain access to the closed physical space. Physical space can be a house, an apartment, a room, a vehicle, a storage or any other closed physical space.

The user authorisation information is specific the particular user device and cannot be used by any other user device to gain access. It may optionally comprise information about a validity time window, defining when the user device is permitted to unlock the electronic lock 10. The user device 20 can be preconfigured to store the user authorisation information or the user device 20 can be authorised by a home owner directly or via the access controller 30.

It is to be noted that the functionality described herein being performed by the access controller 30 can form part of a server, gateway or data access layer. A gateway is a network node equipped for interfacing with another network that uses different communication protocols, e.g. to provide network (e.g. Internet) access for the electronic lock and optionally other devices in the premises of the electronic lock 10.

In order to use the access delegation to access the physical space, the deliverer (i.e. user 25) should be in the vicinity 15 of the electronic lock.

Once the lock 10 receives the alert message 52, the lock 10 emits an alert signal 53 which the user 25 can experience. For instance, the alert signal 53 can be presented to the user 25 as a short sound or light signal from the lock io or an external device in the vicinity 15 of the lock, connected to the lock. In one embodiment, vicinity 15 can be defined as within five metres of the lock 10. In any case, the vicinity 15 is sufficiently small so that the alert signal is distinguishable from alert signals of any other lock.

By triggering the alert signal 53, the user 25 receives a confirmation that the user is in the correct location. Since the alert signal 53 is emitted from the vicinity 15 of lock 10, it is confirmed to the user that the user is in the correct location to unlock the lock. Hence, after receiving an unlock user input 56 (e.g. in an application, also known as app, executing in the user device 20) from the user 25, the user device 20 can send an unlock message 57 to the access controller 30. The unlock message 57 comprises the user

authentication identification to the access controller 30. The access controller 30 then transmits a corresponding unlock command 58 to the electronic lock 10 to be unlocked.

In one embodiment, in order for the user to prove his/her presence at the appropriate location, the user device 20 acquires 54 lock identifier which is provided in the physical space 15 or its surroundings. The lock identifier is only locally provided, whereby the user needs to be close to the electronic lock to obtain the lock identifier. The lock identifier can be acquired in a signal 55 from the lock 10 or from user input 54, where the user obtains the lock identifier.

The lock identifier can be in the lock, on the lock or on a distance short enough to be able to distinguish between more than one lock on e.g.

neighbouring hotel room doors or apartment doors. For instance, the lock identifier can be provided within 1 metre, or 30 cm of the lock.

The lock identifier may be broadcast to the user device 20 e.g. using a

Bluetooth low energy beacon or any other short-range transmitter. The lock identifier may also be optically presented to the user device 20 as a barcode, e.g. a QR code. In one embodiment, the lock identifier may be an image or a video of the electronic lock 10 or physical space 15 or its surroundings, acquired by the user device 20. In this embodiment, the user can use the camera of the user device 20 to capture the image or video. Using image processing, the captured image or video can be compared with stored images for that location, whereby it can be determined whether the user is at the location of the lock or not.

The user device 20 sends an unlock message 57 to the access controller 30. The unlock message comprises user authorisation information together with the acquired lock identifier. After it is verified that the user is indeed in proximity to the electronic lock 10, the access controller 30 can then send an unlock message to the electronic lock to be opened.

Fig 2 is a flow chart illustrating a method for requesting remote unlocking of a physical space. The method corresponds to the actions performed by the user device in Fig 1 and described above. The method is performed in the user device of Fig 1.

In a send control message step 40, the user device sends a control message to an access controller. The control message comprises user authentication information. The control message causes the access controller to trigger the electronic lock to emit an alert signal. The alert signal can be transmitted from the lock. The alert signal can be a sound signal and/or a light signal, allowing the user to be alerted of the location of the electronic lock.

In an optional receive lock identifier step 42 the user device acquires a lock identifier from the vicinity of the electronic lock.

The lock identifier can be broadcast from the electronic lock. For instance, the lock identifier can be broadcast using a Bluetooth beacon. Alternatively, the lock identifier can be acquired from an optical, machine readable code provided by the electronic lock. Alternatively, the lock identifier is acquired from a two dimensional bar code. Alternatively, the lock identifier can be based on a digital image of a camera of the user device as described above. In a send unlock message step 44, the user device sends an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock. When step 42 is performed, the unlock message also comprises the lock identifier.

Fig 3. illustrates various two examples of a lock identifier and an alert signal from a lock 10. On the right-hand side of Fig 3, the uppermost example illustrates a lock identifier 11a in the form of an optical, machine readable code, in this example a QR (Quick response) code. The middle example illustrates a lock identifier 11b in the form of a Bluetooth beacon. The lowermost example illustrates an alert signal 53 emitted by the lock, in this example in the form of an audible signal.

Fig 4 is a schematic diagram illustrating components of the user device 20 of Fig 1. A processor 60 is provided using any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller, digital signal processor (DSP), etc., capable of executing software instructions 67 stored in a memory 64, which can thus be a computer program product. The processor 60 could alternatively be implemented using an application specific integrated circuit (ASIC), field programmable gate array (FPGA), etc. The processor 60 can be configured to execute the method described with reference to Fig 2 and Fig 3 above.

The memory 64 can be any combination of random-access memory (RAM) and/or read-only memory (ROM). The memory 64 also comprises persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid-state memory or even remotely mounted memory.

A data memory 66 is also provided for reading and/or storing data during execution of software instructions in the processor 60. The data memory 66 can be any combination of RAM and/or ROM.

The user device 20 further comprises an I/O interface 62 for communicating with external and/or internal entities. Other components of the user device 20 are omitted in order not to obscure the concepts presented herein.

Fig 5 shows one example of a computer program product 90 comprising computer readable means. On this computer readable means, a computer program 91 can be stored, which computer program can cause a processor to execute a method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. As explained above, the computer program product could also be embodied in a memory of a device, such as the computer program product 64 of Fig 4.

While the computer program 91 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product, such as a removable solid-state memory, e.g. a Universal Serial Bus (USB) drive. The invention has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.