Method for remotely unlocking a lock

11270536 · 2022-03-08

Assignee

Inventors

Cpc classification

International classification

Abstract

It is provided a method for requesting remote unlocking of an electronic lock controlling access to a physical space. The method is performed in a user device and comprises steps of: sending a control message to an access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the electronic lock to emit an alert signal; and sending an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock.

Claims

1. A method for requesting remote unlocking of an electronic lock controlling access to a physical space, the method being performed in a user device and comprising: receiving user input to transmit a control message to an access controller to trigger an alert signal by a specific electronic lock, wherein the access controller is located remotely from the specific electronic lock; sending the control message to the access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the specific electronic lock to emit the alert signal, wherein the alert signal is a light signal; and sending an unlock message to the access controller comprising the user authentication information after receiving an unlock user input from the user to unlock the specific electronic lock, in order to unlock the specific electronic lock.

2. The method according to claim 1, wherein the alert signal is transmitted from the lock.

3. The method according to claim 1, further comprising: acquiring a lock identifier from the vicinity of the electronic lock; wherein the unlock message further comprises the lock identifier.

4. The method according to claim 3, wherein the lock identifier is broadcast from the electronic lock.

5. The method according to claim 4, wherein the lock identifier is broadcast using a Bluetooth beacon.

6. The method according to claim 3, wherein the lock identifier is acquired from an optical, machine-readable code.

7. The method according to claim 6, wherein the lock identifier is acquired from a two-dimensional bar code.

8. The method according to claim 3, wherein the lock identifier is a digital image.

9. A user device for requesting remote unlocking of a physical space controlled by an electronic lock, the user device comprising: a processor; and a memory storing instructions that, when executed by the processor cause the user device to: receive user input to transmit a control message to an access controller to trigger an alert signal by a specific electronic lock, wherein the access controller is located remotely from the specific electronic lock, wherein the alert signal is a light signal; send the control message to the access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the specific electronic lock to emit the alert signal; and send an unlock message to the access controller comprising the user authentication information after receiving an unlock user input from the user to unlock the specific electronic lock, in order to unlock the specific electronic lock.

10. A non-transitory computer-readable medium comprising a computer program stored thereon for requesting remote unlocking of a physical space controlled by an electronic lock, the computer program comprising computer program code which, when run on an user device, causes the user device to: receive user input to transmit a control message to an access controller to trigger an alert signal by a specific electronic lock, wherein the access controller is located remotely from the specific electronic lock; send the control message to the access controller, the control message comprising user authentication information, the control message causing the access controller to trigger the specific electronic lock to emit the alert signal, wherein the alert signal is a light signal; and send an unlock message to the access controller comprising the user authentication information after receiving an unlock user input from the user to unlock the specific electronic lock, in order to unlock the specific electronic lock.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) The invention is now described, by way of example, with reference to the accompanying drawings, in which:

(2) FIG. 1 is a sequence diagram illustrating a use case illustrating embodiments presented herein;

(3) FIG. 2 is a flow chart illustrating a method for requesting remote unlocking of a physical space;

(4) FIG. 3. illustrates various two examples of a lock identifier and an alert signal;

(5) FIG. 4 is a schematic diagram illustrating components of the user device of FIG. 1; and

(6) FIG. 5 shows one example of a computer program product 90 comprising computer readable means.

DETAILED DESCRIPTION

(7) The invention will now be described more fully hereinafter with reference to the accompanying drawings, in which certain embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout the description.

(8) FIG. 1 is a sequence diagram illustrating a use case illustrating embodiments presented herein. A user device 20 belongs to a user 25, who e.g. can be a delivery company employee. The user device 20 is any suitable device with capability of processing and communication. For instance, the user device 20 can be implemented as a wearable device, a mobile phone, a smart phone or a tablet/laptop computer with wireless connectivity.

(9) When the user arrives at a space to which the user is to access, the user needs to identify the correct electronic lock 10 (hereinafter also referred to simply as ‘the lock’).

(10) The user controls 50 the user device 20 to transmit a control message 51 to access controller 30 to trigger an alert by the appropriate lock 10. The control message 50 comprises user authentication information. The user authentication information allows the access controller 30 to authorise the user device 20, as known in the art per se. The control message 51 causes the access controller 30 to send an alert message 52 to the electronic lock 10.

(11) The user authorisation information is a piece of data used by the user device 20 to gain access to the closed physical space. Physical space can be a house, an apartment, a room, a vehicle, a storage or any other closed physical space.

(12) The user authorisation information is specific the particular user device and cannot be used by any other user device to gain access. It may optionally comprise information about a validity time window, defining when the user device is permitted to unlock the electronic lock 10. The user device 20 can be preconfigured to store the user authorisation information or the user device 20 can be authorised by a home owner directly or via the access controller 30.

(13) It is to be noted that the functionality described herein being performed by the access controller 30 can form part of a server, gateway or data access layer. A gateway is a network node equipped for interfacing with another network that uses different communication protocols, e.g. to provide network (e.g. Internet) access for the electronic lock and optionally other devices in the premises of the electronic lock 10.

(14) In order to use the access delegation to access the physical space, the deliverer (i.e. user 25) should be in the vicinity 15 of the electronic lock.

(15) Once the lock 10 receives the alert message 52, the lock 10 emits an alert signal 53 which the user 25 can experience. For instance, the alert signal 53 can be presented to the user 25 as a short sound or light signal from the lock 10 or an external device in the vicinity 15 of the lock, connected to the lock. In one embodiment, vicinity 15 can be defined as within five metres of the lock 10. In any case, the vicinity 15 is sufficiently small so that the alert signal is distinguishable from alert signals of any other lock.

(16) By triggering the alert signal 53, the user 25 receives a confirmation that the user is in the correct location. Since the alert signal 53 is emitted from the vicinity 15 of lock 10, it is confirmed to the user that the user is in the correct location to unlock the lock. Hence, after receiving an unlock user input 56 (e.g. in an application, also known as app, executing in the user device 20) from the user 25, the user device 20 can send an unlock message 57 to the access controller 30. The unlock message 57 comprises the user authentication identification to the access controller 30. The access controller 30 then transmits a corresponding unlock command 58 to the electronic lock 10 to be unlocked.

(17) In one embodiment, in order for the user to prove his/her presence at the appropriate location, the user device 20 acquires 54 lock identifier which is provided in the physical space 15 or its surroundings. The lock identifier is only locally provided, whereby the user needs to be close to the electronic lock to obtain the lock identifier. The lock identifier can be acquired in a signal 55 from the lock 10 or from user input 54, where the user obtains the lock identifier.

(18) The lock identifier can be in the lock, on the lock or on a distance short enough to be able to distinguish between more than one lock on e.g. neighbouring hotel room doors or apartment doors. For instance, the lock identifier can be provided within 1 metre, or 30 cm of the lock.

(19) The lock identifier may be broadcast to the user device 20 e.g. using a Bluetooth low energy beacon or any other short-range transmitter. The lock identifier may also be optically presented to the user device 20 as a barcode, e.g. a QR code.

(20) In one embodiment, the lock identifier may be an image or a video of the electronic lock 10 or physical space 15 or its surroundings, acquired by the user device 20. In this embodiment, the user can use the camera of the user device 20 to capture the image or video. Using image processing, the captured image or video can be compared with stored images for that location, whereby it can be determined whether the user is at the location of the lock or not.

(21) The user device 20 sends an unlock message 57 to the access controller 30. The unlock message comprises user authorisation information together with the acquired lock identifier. After it is verified that the user is indeed in proximity to the electronic lock 10, the access controller 30 can then send an unlock message to the electronic lock to be opened.

(22) FIG. 2 is a flow chart illustrating a method for requesting remote unlocking of a physical space. The method corresponds to the actions performed by the user device in FIG. 1 and described above. The method is performed in the user device of FIG. 1.

(23) In a send control message step 40, the user device sends a control message to an access controller. The control message comprises user authentication information. The control message causes the access controller to trigger the electronic lock to emit an alert signal. The alert signal can be transmitted from the lock. The alert signal can be a sound signal and/or a light signal, allowing the user to be alerted of the location of the electronic lock.

(24) In an optional receive lock identifier step 42 the user device acquires a lock identifier from the vicinity of the electronic lock.

(25) The lock identifier can be broadcast from the electronic lock. For instance, the lock identifier can be broadcast using a Bluetooth beacon. Alternatively, the lock identifier can be acquired from an optical, machine readable code provided by the electronic lock. Alternatively, the lock identifier is acquired from a two dimensional bar code. Alternatively, the lock identifier can be based on a digital image of a camera of the user device as described above.

(26) In a send unlock message step 44, the user device sends an unlock message to the access controller comprising the user authentication information, in order to unlock the electronic lock. When step 42 is performed, the unlock message also comprises the lock identifier.

(27) FIG. 3. illustrates various two examples of a lock identifier and an alert signal from a lock 10. On the right-hand side of FIG. 3, the uppermost example illustrates a lock identifier 11a in the form of an optical, machine readable code, in this example a QR (Quick response) code. The middle example illustrates a lock identifier lib in the form of a Bluetooth beacon. The lowermost example illustrates an alert signal 53 emitted by the lock, in this example in the form of an audible signal.

(28) FIG. 4 is a schematic diagram illustrating components of the user device 20 of FIG. 1. A processor 60 is provided using any combination of one or more of a suitable central processing unit (CPU), multiprocessor, microcontroller, digital signal processor (DSP), etc., capable of executing software instructions 67 stored in a memory 64, which can thus be a computer program product. The processor 60 could alternatively be implemented using an application specific integrated circuit (ASIC), field programmable gate array (FPGA), etc. The processor 60 can be configured to execute the method described with reference to FIG. 2 and FIG. 3 above.

(29) The memory 64 can be any combination of random-access memory (RAM) and/or read-only memory (ROM). The memory 64 also comprises persistent storage, which, for example, can be any single one or combination of magnetic memory, optical memory, solid-state memory or even remotely mounted memory.

(30) A data memory 66 is also provided for reading and/or storing data during execution of software instructions in the processor 60. The data memory 66 can be any combination of RAM and/or ROM.

(31) The user device 20 further comprises an I/O interface 62 for communicating with external and/or internal entities.

(32) Other components of the user device 20 are omitted in order not to obscure the concepts presented herein.

(33) FIG. 5 shows one example of a computer program product 90 comprising computer readable means. On this computer readable means, a computer program 91 can be stored, which computer program can cause a processor to execute a method according to embodiments described herein. In this example, the computer program product is an optical disc, such as a CD (compact disc) or a DVD (digital versatile disc) or a Blu-Ray disc. As explained above, the computer program product could also be embodied in a memory of a device, such as the computer program product 64 of FIG. 4. While the computer program 91 is here schematically shown as a track on the depicted optical disk, the computer program can be stored in any way which is suitable for the computer program product, such as a removable solid-state memory, e.g. a Universal Serial Bus (USB) drive.

(34) The invention has mainly been described above with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.