WO2013170292A1 - Mobile device powered lock - Google Patents

Mobile device powered lock Download PDF

Info

Publication number
WO2013170292A1
WO2013170292A1 PCT/AU2013/000484 AU2013000484W WO2013170292A1 WO 2013170292 A1 WO2013170292 A1 WO 2013170292A1 AU 2013000484 W AU2013000484 W AU 2013000484W WO 2013170292 A1 WO2013170292 A1 WO 2013170292A1
Authority
WO
WIPO (PCT)
Prior art keywords
lock
mobile device
cable
door
device powered
Prior art date
Application number
PCT/AU2013/000484
Other languages
French (fr)
Inventor
Clinton Graeme BURCHAT
Original Assignee
Burchat Clinton Graeme
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2012901958A external-priority patent/AU2012901958A0/en
Application filed by Burchat Clinton Graeme filed Critical Burchat Clinton Graeme
Publication of WO2013170292A1 publication Critical patent/WO2013170292A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture

Definitions

  • the present invention relates to a lock operable and powered by a mobile device and cable.
  • the following describes a non-limiting example of the invention being used with reference to a lock being used for a shopping container, as a convenient application of the invention.
  • the invention has a great many applications and it is not intended at all that the invention be limited to use with a shopping container.
  • the invention is also described with use of a mobile phone.
  • the invention may be used with any mobile device and it is not intended to limit the invention to use with a mobile phone, other devices such as a tablet computer could also be used.
  • Locks utilising mobile phones are known requiring that an electrical supply is provided to the lock to be unlocked. It is the power to the lock that enables the lock to receive the instructions, such as a radio signal from the phone and to move between a locked and unlocked state. A professional locksmith or electrician is required to install the lock and the necessary power cables.
  • the inventor has developed a significantly improved form of lock that enables unlocking and locking through use of a mobile phone and power to the lock is provided by the mobile device through a cable.
  • the lock subject of the invention does not require the services of an electrician to be installed in a door, reducing inconvenience and the cost of installation.
  • There are clear and significant advantages to having the power of the lock provided by the mobile device For example, known locks need power and so in the event of a power cut, the lock will cease to operate which may not only be inconvenient but also dangerous.
  • the subject invention is a smart, convenient and powerful new lock that has a multitude of applications.
  • any prior art referred to herein does not constitute an admission that the prior art forms part of the common general knowledge in Australia or elsewhere.
  • the present invention provides a mobile device powered lock including: a security application accessible from a mobile device; and
  • a cable connectable between the mobile device and a lock movable between a locked position and an unlocked position
  • the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable cause the lock to move between the locked and unlocked position and the power to do so is provided by the mobile device through the cable.
  • the mobile device is a mobile phone.
  • the mobile device is a smart phone.
  • the mobile device is a tablet computer or the like.
  • the security application is an application downloadable to the mobile device.
  • the security application may alternatively be provided with the firmware of the phone and or service provider.
  • the security application may be an application hosted by another device.
  • the security application may be web based, accessible from the mobile device. Any suitable software may be used as the security application. Any suitable device may be used to host the security application.
  • the security application used by the mobile device may be wireless or linked to another device.
  • a personal computer may control security applications for a number of mobile devices.
  • the security application may not be kept on the mobile device but the mobile device used to access the security application hosted elsewhere.
  • the security application could be accessed elsewhere and just the power provided to the lock by the mobile device, in another form of the invention.
  • the security application may be web based, cloud hosted, networked or hosted on a PC, for example.
  • Levels of permission and authority may be controlled by an administrator.
  • authority to unlock and lock at least one lock can be controlled by the security application.
  • Authority may need to be withdrawn when a person no longer needs to lock or unlock a specific lock, for example.
  • the security application is of a form when a security key needs to be provided to enable the software to be used to activate the lock via the cable.
  • the security key may be a password and user name.
  • the security application is operable only after input of an authorised security key.
  • operation of the mobile powered lock is only possible after correctly imputing a security key.
  • the security key may take any suitable form.
  • the security key may be chosen from the group: access code; password, password and user name, timed access code; random access code; security token; biometric security including fingerprint or retina scan.
  • entering of a correct security key enables operation of the security application such that the mobile device when connected to the lock by the cable can move the lock between a locked and an unlocked position.
  • the lock may be any suitable form of lock.
  • the lock may be a specialised kind of lock developed especially for the invention. More preferred is that the lock is a conventional lock adapted for use with the invention. In this way the door or other article to be secured need not be changed in order that the improved locking mechanism can be used.
  • an existing door handle and lock can be used with the new locking device utilising the existing lock and causing it to lock and unlock.
  • the lock may be a lockable door handle.
  • the lock may be the lock of a safe.
  • the lock may be a door lock.
  • the lock is a padlock. In this form of the invention the shackle of the padlock is movable between a locked and unlocked state.
  • the padlock may be used to lock any suitable area.
  • the lock may be chosen from the group: door lock; door handle lock; safe lock; tumbler lock; or padlock.
  • the lock includes a lock mechanism which can lock a door, area or object.
  • the lock mechanism may be a door, cabinet or to enable access to an item such as a box or computer.
  • the lock mechanism can be used to secure any item that it is desired to secure.
  • the lock resides in a door and locking and unlocking of the mobile device powered lock, locks or unlocks the door.
  • the lock may also reside in lid or door to a container and the locking and unlocking of the mobile device powered lock, locks or unlocks the lid or door or the container such that the contents can be secured or accessed.
  • the lock may be installed in any suitable area to secure an area or items.
  • the lock may be any suitable lock.
  • the lock may include one or more lock mechanisms, which may be the same or different to one another.
  • the lock includes a cylinder lock.
  • the lock may alternatively be a standard lock or any suitable lock.
  • the lock can cause a projection to project or be retained. When the lock is in a door the projection may project into the door to maintain the door in the locked positioned and the projection may be retracted into the lock to unlock the door and enable the door to be freely opened and closed.
  • the projection may project into a wall to maintain a locked positioned of a door or the like and the projection may be retracted into the lock to unlock the door or the like so that the door or the like can be freely opened and closed.
  • Other alternative means of lock mechanisms and means of keeping secure may be used.
  • the lock is a padlock.
  • the padlock may include a shackle which may be released or secured around an object in either the unlocked or locked state respectively.
  • the padlock may include any suitable means of maintaining items locked.
  • the shackle may project outside of a body of the lock. The shackle may be retained to protect against unauthorised interference.
  • the lock includes one or more socket or port and the one or more socket or port is adapted to receive an end of the cable therein.
  • the lock may include any suitable number of sockets or ports.
  • the sockets or ports may be adapted to receive different connectors for different cables therein.
  • the lock may be adapted for use by two different types of mobile device and one socket may be included for each type of mobile device.
  • the sockets or ports included may be the same or different to one another.
  • an end of the cable includes a Universal Serial Bus (“USB”) connector.
  • the end of the cable includes a USB connector and the lock includes one or more USB socket or port.
  • USB 1 .0 port and another socket may be a USB 2.0 port or later version.
  • USB 1 .00, 2.00, 3.00 or otherwise could be used.
  • Alternative forms of communication and connection for power transfer could be used instead of USB.
  • two USB sockets or ports are included in the lock.
  • the other end of the cable is adapted for connection to the mobile device.
  • power and or data can be transferred along the cable between the mobile device and the lock.
  • the cable is a USB cable with a USB connector at one end suitable to be connected to the lock and the other end has a connector suitable to connect to the mobile device.
  • the cable includes a connector substantially the same as used to charge the mobile device.
  • the cable may take any suitable form.
  • the cable is connectable between the mobile device and the lock so that a current is passed between them.
  • the cable is connected between the mobile device and the lock so that data is passed between them.
  • the mobile device and lock are connected together by the cable such that an electrical charge and information can be passed between them.
  • the cable may be a Red Park cable.
  • the power and instruction to move the lock between a locked and unlocked state is communicated by means of the cable.
  • the lock includes an actuator which can cause the lock to change between a locked and unlocked state.
  • the actuator may move a projection between a locked and unlocked state.
  • the actuator is a small motor.
  • the actuator may alternatively be a solenoid. Any suitable actuator may be used.
  • the actuator operates the lock mechanism.
  • the actuator causes the lock mechanism to change between a locked and unlocked state.
  • the lock includes a printed circuit board assembly.
  • the printed circuit board assembly is configured so that on connection to the mobile device by the cable and authorisation by the security application, power is supplied from the mobile device causing activation of the circuit.
  • Activation of the circuit preferably locks or unlocks the lock.
  • activation of the circuit can both unlock and lock the lock, the instruction being to change the state, from one to the other.
  • Firmware on the circuit board may be used to control the response of the lock to the instructions from the mobile device.
  • the firmware may be of a simple form to open or close the lock or may include more complex instructions and variants to the instruction (refer to Designworks software development Brisbane, Australia). It is envisaged that further development of the software will vastly expand the functionality of the mobile device powered lock within the scope of the inventive concept.
  • a rod, bar or the like is included.
  • the rod, bar or the like is connected to the lock mechanism and on authorisation and activation of the printed circuit board assembly the actuator causes movement of the rod, bar or the like.
  • the rod, bar or the like can move between a first position and a second position.
  • the lock mechanism is locked and in the second position the lock mechanism is unlocked, or vice versa.
  • the rod, bar or the like acts on the lock mechanism so as to cause a projection to extend from the lock to lock a door or similar in the locked state and the rod, bar or the like can be caused to cause the projection to be again retained within the lock in the unlocked state.
  • the actuator may move the lock mechanism directly between a locked and unlocked state or there may be other parts to the mechanism.
  • the lock includes a USB port, printed circuit board assembly, an actuator and a locking mechanism with a connecting rod between the actuator and the locking mechanism and the actuator moves the connecting rod on activation of the printed circuit board to move between the locking mechanism between a locked and unlocked state.
  • the locked position is one where a door or area is secured.
  • the unlocked position is one where a door or area is released so that it can be accessed readily.
  • the mobile device can both lock and unlock.
  • the mobile device could be adapted to either lock or unlock and conventional means can be used to either unlock or lock, accordingly.
  • the mobile device powered lock is installed in a door, cupboard or the like and when in the locked position the door is locked and when in the unlocked position the door or cupboard is unlocked and can be opened and accessed.
  • the lock is configured to be substantially tamperproof to deter unauthorised access.
  • the lock is substantially contained within a sealed unit to substantially prevent unauthorised access.
  • the mobile device powered lock is used to secure a box for receipt of delivered goods therein.
  • the goods are groceries.
  • the goods may be mail or parcels.
  • the mobile device powered lock is fitted to a grocery box and the lock can be locked or unlocked by a delivery person or customer by use of the mobile device and cable to enable delivery of groceries, securing of the groceries and retrieval of the groceries by the customer at a later time.
  • a delivery person may be given authority to open all grocery boxes supplied by a company.
  • Overall permissions and authority may be controlled by a security application on a personal computer or web hosted security application. Overall permissions and authority may be controlled by a single mobile device.
  • the delivery person can access all grocery boxes supplied by a company and the person to whom the delivery is made can only open his or her own grocery box.
  • the authority of permissions to enable grocery boxes to be locked and unlocked can be adapted to suit the particular application.
  • each mobile device may only be able to lock and unlock a small number of grocery boxes.
  • a log of locking and unlocking of the boxes is created.
  • a log is created of the locking and unlocking activity.
  • a log is created of the particular locks unlocked by the mobile device.
  • the logging of the locking and unlocking information may be made by the security application. The logged information may be available to a customer to track the progress of their goods being delivered. The logged information may be used for payment purposes.
  • a mobile device powered lock including:
  • a lock including an lock mechanism movable between a locked position and an unlocked position to maintain a door or similar closure locked or unlocked;
  • USB cable connectable between the mobile phone or similar device and a printed circuit board assembly of the lock
  • USB cable is connected between the mobile phone or similar device and the printed circuit board assembly of the lock, and a user can use a security key for the security application on the mobile phone or similar device enabling the security application to be authorised activating the printed circuit board assembly causing an actuator to change the lock between the locked and unlocked position and the power to move the actuator is provided by the mobile phone or similar device through the cable.
  • the present invention also provides in variant a mobile device powered lock including: a mobile device including a security application;
  • a lock movable between a locked position and an unlocked position; and a cable connectable to the mobile device and to the lock;
  • the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable cause an actuator to change the lock between a locked and unlocked position and the power to move the actuator is provided by the mobile device through the cable.
  • the invention also provides a method of use of a mobile device powered lock including a mobile device, lock including an electronic circuit and cable, and the method including the following steps:
  • the mobile device powered lock is the mobile device powered lock according to the invention in any of its variants or forms.
  • the mobile device powered lock can be used in a multitude of different applications and industries to enable an item or area to be secured.
  • Each of the mobile device, lock and cable can be manufactured industrially and supplied either directly to customers or to retailers to sell individually.
  • Figure 1 is a perspective view from above of a mobile phone, lock and cable according to a first preferred embodiment of the invention
  • Figure 2 is a perspective view from above of the mobile phone, cable and lock of Figure 1 , including an internal view of the lock;
  • Figure 3 is a perspective view from above of the mobile phone and cable of Figures 1 and 2 being used with a padlock, a different application of the invention;
  • Figure 4 is a storyboard of the navigation and screenshots of the security application of the mobile phone of Figures 1 to 3;
  • Figure 5 is a screenshot of the security application of the mobile phone of Figures 1 to 4, instructing the user to connect the cable to the mobile phone and lock;
  • Figure 6 is a screenshot of the security application of the mobile phone of Figures 1 to 5, as shown when the cable is connected to both the mobile phone and lock;
  • Figure 7 is a screenshot of the security application of the mobile phone of Figures 1 to 6, indicating that the lock is unlocked;
  • Figure 8 is a screenshot of the security application of the mobile phone of Figures 1 to 7, giving the disconnect cable message;
  • Figure 9 is a screenshot of the security application of the mobile phone of Figures 1 to 8, showing that the lock is now locked;
  • Figure 10 is a screenshot of the security application of the mobile phone of Figures 1 to 9, showing the log options;
  • Figure 1 1 is a screenshot of the security application of the mobile phone of Figures 1 to 10, showing more options, including settings;
  • Figure 12 is a top level schematic of the electronics of the lock of Figures 1 to 1 1 ;
  • Figure 13 is a first half of a schematic of the electronics of the lock of Figures 1 to 1 1 , the left hand side;
  • Figure 14 is a second half of the schematic of the electronics of the lock of Figure 13, the right hand side;
  • Figure 15 is a further schematic of the electronics of the lock of Figures 1 to 1 1 ;
  • Figure 16 is a further schematic of the electronics of the lock of Figures 1 to 1 1 :
  • Figure 17 are additions to the left hand side of the schematic of Figure 16; and Figure 18 are additions to the right hand side of the schematic of Figure 16.
  • Mobile phone 10 is illustrated as a smart phone of a known kind including a security application "InnBox" (refer to Designworks, Brisbane, Australia). Mobile phone 10 may be replaced with other mobile devices such as a tablet computer or similar. Mobile phone 10 is chargeable itself through use of a socket at the bottom of the phone to charge a battery, in the usual way. A particular connector connects to the phone battery connected to a transformer which in turn is connected to a power source. Alternatively, mobile phone 10 may be docked in a docking unit connected to a mains supply or PC for providing charge.
  • a docking unit connected to a mains supply or PC for providing charge.
  • Cable 12 is a vital part of the described embodiment as it enables not only communication but also power to be supplied from mobile phone 10 to lock 14, different to other mobile phone controlled locks.
  • Cable 12 as illustrated has a connector 16 at one end which is adapted to fit into the power charging socket of mobile phone 10.
  • Connector 16 is identical to the power charging connector used by phone 10. The particular form of connector 16 would be changed to suit the particular phone or mobile device to be used with the invention.
  • Cable 14 has a Universal Serial Bus (“USB”) connector 18 at the other end, the industry standard for short distance digital communications.
  • USB connector 18 is a USB 1 .0 connector but could be replaced with other more recent versions of the USB connector 2.0, 3.0 or otherwise and be of a smaller size.
  • USB connector 18 is suitable to fit in socket 20 or socket 22 on lock 14 as described in more detail below.
  • USB connector 18 is shown in detail in the inset of Figure 1 . More than one socket is included, to enable multiple use or different sockets could be adapted to work with different mobile devices for different levels of security. As illustrated socket 20 and socket 22 are the same. Socket 20 and socket 22 are suitable to receive USB connector 18 therein so as to be connected and in communication with mobile phone 10. Socket 20 and 22 could also be referred to as USB ports. The number of ports or sockets included could be varied to suit the particular application to which the invention is to be put and the type of locks and unlocking mechanisms and security levels to be included.
  • Lock 14 as illustrated includes handle 24 on back plate 26 including socket section 28.
  • the form of lock 14 is generally in overall appearance that of a standard door handle but includes additional features to enable secure locking and unlocking by mobile phone 10.
  • lock 14 is tamperproof so as to prevent unauthorised access and unlocking without use of the invention.
  • Lock 14 is shown in door 30 (only part of which is shown) and is intended to be a door to a cabinet for keeping groceries.
  • Clearly lock 14 in door 30 could alternatively be a door to secure a room, or area or the door and lock of a cupboard or other secure area.
  • the invention can be used anywhere and for any application where it is desirable to be able lock and unlock and use the convenience and added security of the mobile powered lock.
  • Cylinder lock 32 is shown in door handle 24 which enables the door to be locked and unlocked in the usual manner. It is also possible to lock or unlock door 30 through use of cylinder lock 24 and a conventional key. Use of a conventional key may be used including as a back-up.
  • Cylinder lock 32 is connected to a small cylinder (not shown) inside door handle 24 which in turn is connected to door projection 34 which extends into door projection receiving portion 36 when door 30 is locked shut. Activation of cylinder lock 32 enables movement of door projection 34 from being wholly contained within door handle 24, to move out so as to project into door projection receiving portion 36 and to lock or maintain door 30 in a locked state.
  • cylinder lock 32 by a key or activation by mobile phone 10 turns the small cylinder in door handle 24 which turns a cam (not shown) which in turn releases a spring (not shown) causing the movement of door projection 34 into door projection receiving portion 36.
  • Connecting rod 38 is a thin metal rod and connects cylinder lock 32 to actuator 40. Activation of actuator 40 enables connecting rod 38 to be moved between a first position where cylinder lock 32 is locked and a second position where cylinder lock 32 is unlocked and door 30 is accordingly locked and unlocked.
  • Actuator 40 is a small motor as illustrated but could alternatively be a mechanical solenoid, suitable for the purpose. Actuator 40 provides linear movement on activation to connecting rod 38. It is connecting rod 38 that actually moves and connects actuator 40 to cylinder lock 32 on activation by mobile phone 10. In an alternative form of the invention actuator 40 can replace cylinder lock 32 and the associated parts and lock and unlock door 30 directly.
  • Printed circuit board assembly 42 (refer to the schematics of Figures 12 to 18) drives actuator 40 when connected to USB socket 20 or 22 and authorised to do so by mobile phone 10 and the security application. Power from mobile phone 10 connects through use of cable 12 via USB connector 18 to USB port or socket 20 or 22 in printed circuit board assembly 42. In this way communication and power from mobile phone 10 can cause actuator 40 to move connecting rod 38 and hence cylinder lock 32 and attached door projection between the locked and unlocked positions.
  • a person will connect mobile phone 10 with cable 12 to unlock 14 by connecting USB connector 16 of cable 12 to USB socket 20, for example.
  • the security application is selected on the phone, as described in more detail below.
  • the security application has previously been downloaded to the phone but could alternatively be firmware or supplied on phone 10, or be connected to by the phone by web or cloud based networks or a networked PC, for example.
  • the person enters a password and user name.
  • the security application enables USB communication via cable 12 from phone 10 to unlock 14 (refer to the description below with respect to Figures 4 to 1 1 ). It is in this way that phone 10 can operate lock 14 as power is supplied via the USB cable through to power the lock.
  • any form of security key may be used.
  • Door 30 can be locked by pulling shut or locking with a conventional key or through use of mobile phone 10.
  • Door 30 is described as the door for a grocery box or cabinet which would be situated outside of a residence or office.
  • the grocery box is suitable for receipt of groceries or other delivered items.
  • the current problem with many grocery boxes is security. Generally, grocery items are delivered and left, unsecured on a door step or at the back of a residence.
  • Locked grocery boxes are known but generally use a clumsy method of locking such as a simple padlock and both the delivery person and the owner needs to have the keys to access the grocery container and the goods within.
  • Use of the convenient mobile powered lock of the invention for the security of a grocery box is a significant improvement over the prior art.
  • the grocery box can be used away from the house as no power source is required and in fact can be placed near a post box or road which is most convenient for the delivery person.
  • the grocery box can be readily installed by the home owner with no need to use the services of an electrician.
  • a person may have a regular weekly order of groceries which are delivered when nobody is home.
  • the delivery person can arrive at the address and use his or her mobile phone, cable and use a password and user name to access the lock when connected by the cable to a mobile phone.
  • Once unlocked groceries can be placed in the box, the box locked and the delivery person continue on with deliveries.
  • the owner of the box returns home, he or she can connect the cable with their mobile phone and access the box.
  • the activity of the mobile phone and locking and unlocking of the grocery boxes is logged and tracked by the security application.
  • the grocery box can also be used as a mail box to receive secure parcels or other goods. Additional levels of security such as rotating or changing pin numbers may be used to secure the mailbox.
  • the mobile powered lock had numerous applications.
  • the mobile device powered lock is particularly useful for securing boxes or safes.
  • FIG 3 a variant to the invention is disclosed with reference numerals similar to the first where mobile phone 1 10, cable 1 12 and lock 1 14 are used together. Lock 1 14 is sealed so as to prevent unauthorised access.
  • Mobile phone 1 10 is a smart phone including a security application. Mobile phone 1 10 could be replaced with other mobile devices such as a tablet computer or similar. Mobile phone 1 10 is chargeable through use of a socket at the bottom of the phone, in the usual way.
  • Cable 1 12 enables communication and power to be supplied from mobile phone 1 10 to lock 1 14.
  • Cable 1 12 as illustrated has a connector 1 16 at one end which is adapted to fit into the power charging socket of mobile phone 1 10.
  • Connector 1 16 is identical to the power charging connector used by phone 1 10.
  • Cable 1 14 has a Universal Serial Bus (“USB”) connector 1 18 at the other end.
  • USB connector 1 18 is suitable to fit in socket or USB port 120 on lock 1 14 as shown in detail in the inset of Figure 3.
  • Lock 1 14 as illustrated is in the form of a padlock having a shackle 124 and body 126 including socket section 128.
  • Door 130 is illustrated including bracket 131 through which shackle 124 can be passed in the usual manner to secure closed.
  • Lock 1 14 is tamperproof to prevent an unauthorised person from activating the unlocking mechanism unless they use mobile phone 1 10 and cable 1 12.
  • a person uses mobile phone 1 10 and unlocks the security application by use of a security key.
  • the security application is authorised the person can instruct that locking or unlocking occurs provided cable 1 12 is plugged into socket 120.
  • the unlocking instruction is sent from phone 1 10 through cable 1 12 power is supplied to a printed circuit board assembly within body 126.
  • a circuit is completed to activate an actuator to move lock mechanism to enable shackle 124 to be released.
  • Shackle 124 can then be removed from body 126 partially or wholly to enable removal from bracket 131 and in turn door 130 can be opened. None of the printed circuit board assembly, actuator and locking mechanism are shown but work in a similar manner to first described embodiment.
  • the padlock form of the invention can be used to secure grocery boxes in the same manner as described for the first embodiment. Use of the invention to secure padlocks is particularly useful as it has many everyday applications.
  • the padlock of the invention can replace any padlock such as used on sheds, tool boxes, vehicle secure boxes for example and improve the security for the contents.
  • the padlock form of the invention could be readily sold direct to customers for immediate use without any need for installation or set-up.
  • Cable 12 and 1 12 is illustrated as a Red Park cable, used for development of the security application. It is anticipated that cable 12 and 1 12 will be the hardware supplied with the mobile device, such as a particular make of mobile phone. Alternatively, cable 12 and 1 12 could be designed specifically for use with the security application and be supplied separate to the mobile device, perhaps with the security application and or lock. In this form of the invention the connectors of the cable will be adapted to be suitable to the particular mobile device. Referring to Figures 4 to 1 1 1 the security application for the mobile phone is described in further detail named InnBox (refer Designworks Brisbane, Australia). Figure 4 gives the storyboard of the navigation through the software to unlock the lock and to the log and settings features. Figures 5 to 1 1 give examples of some of the screenshots seen on mobile phone 10, 1 10 during use.
  • a security key in this case a user name and password, must be entered correctly.
  • the username and password can be set up when first installing the InnBox software and a high level security password will be required to prevent unauthorised persons accessing the lock. Use of the username and password prevents unauthorised access of the lock.
  • the authorised user enters the correct username and password into mobile phone 10, 1 10 followed by the "sign in” tab and the software enables navigation to the next page. The user can then choose one of three tabs at the bottom of the screen "Activate", "Log” and "More".
  • screenshot gives the message "Disconnect Cable” and "Close door to lock automatically” after which the "Lock” icon is displayed as shown in Figure 9.
  • the “Close door to lock automatically” message is given as there could be some variation in the order of use of the lock and removal of the cable.
  • the example given uses the invention to unlock lock 14, 1 14 and the locking can occur by simply closing lock 14, 1 14 and removing cable 12, 1 12.
  • the invention could be used in reverse to lock closed lock 14, 1 14 or the cable may be required to both lock and unlock, for example.
  • Figure 10 illustrates a screenshot of use of the "Log” tab giving the choice of "My Activation Log” for a listing of unlocking actions and "Connected Lock Log” giving details of the particular locks unlocked. Other features could be added to this part of the security application, for monitoring activity.
  • Figure 11 illustrates a screenshot of the use of the "More” tab where various settings can be adjusted. These include the User ID and manual Lock options as well as information about the security application itself. The invention is applicable to a great many locked areas, cupboards, secure outdoor areas, a safe, a door and the unlocking method will be the same.
  • protocol is the string which matched from the protocol list passed to initWithProtocol:

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to a mobile device powered lock including a security application accessible from a mobile device, a cable and a lock movable between a locked position and an unlocked position. In use the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable the lock can be moved between a locked and unlocked position and the power to do so is provided by the mobile device through the cable. The invention also relates to a method of use of a mobile device powered lock.

Description

MOBILE DEVICE POWERED LOCK
FIELD OF THE INVENTION
The present invention relates to a lock operable and powered by a mobile device and cable. BACKGROUND OF THE INVENTION
The following describes a non-limiting example of the invention being used with reference to a lock being used for a shopping container, as a convenient application of the invention. The invention has a great many applications and it is not intended at all that the invention be limited to use with a shopping container. The invention is also described with use of a mobile phone. The invention may be used with any mobile device and it is not intended to limit the invention to use with a mobile phone, other devices such as a tablet computer could also be used.
Locks utilising mobile phones are known requiring that an electrical supply is provided to the lock to be unlocked. It is the power to the lock that enables the lock to receive the instructions, such as a radio signal from the phone and to move between a locked and unlocked state. A professional locksmith or electrician is required to install the lock and the necessary power cables. The inventor has developed a significantly improved form of lock that enables unlocking and locking through use of a mobile phone and power to the lock is provided by the mobile device through a cable. The lock subject of the invention does not require the services of an electrician to be installed in a door, reducing inconvenience and the cost of installation. There are clear and significant advantages to having the power of the lock provided by the mobile device. For example, known locks need power and so in the event of a power cut, the lock will cease to operate which may not only be inconvenient but also dangerous.
The subject invention is a smart, convenient and powerful new lock that has a multitude of applications. For clarity, any prior art referred to herein, does not constitute an admission that the prior art forms part of the common general knowledge in Australia or elsewhere.
It is an object of the present invention to provide to provide a mobile device powered lock that at least ameliorates one or more of the aforementioned problems of the prior art.
DISCLOSURE OF THE INVENTION
Accordingly, the present invention provides a mobile device powered lock including: a security application accessible from a mobile device; and
a cable connectable between the mobile device and a lock movable between a locked position and an unlocked position;
wherein, in use, the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable cause the lock to move between the locked and unlocked position and the power to do so is provided by the mobile device through the cable.
Preferably, the mobile device is a mobile phone. Preferably, the mobile device is a smart phone. Alternatively, the mobile device is a tablet computer or the like.
Preferably, the security application is an application downloadable to the mobile device. The security application may alternatively be provided with the firmware of the phone and or service provider. The security application may be an application hosted by another device. The security application may be web based, accessible from the mobile device. Any suitable software may be used as the security application. Any suitable device may be used to host the security application. For example, the security application used by the mobile device may be wireless or linked to another device. A personal computer may control security applications for a number of mobile devices. The security application may not be kept on the mobile device but the mobile device used to access the security application hosted elsewhere. The security application could be accessed elsewhere and just the power provided to the lock by the mobile device, in another form of the invention. The security application may be web based, cloud hosted, networked or hosted on a PC, for example. Levels of permission and authority may be controlled by an administrator. Preferably, authority to unlock and lock at least one lock can be controlled by the security application. Authority may need to be withdrawn when a person no longer needs to lock or unlock a specific lock, for example. Preferably, the security application is of a form when a security key needs to be provided to enable the software to be used to activate the lock via the cable. The security key may be a password and user name.
Preferably, the security application is operable only after input of an authorised security key. Preferably, operation of the mobile powered lock is only possible after correctly imputing a security key. The security key may take any suitable form. The security key may be chosen from the group: access code; password, password and user name, timed access code; random access code; security token; biometric security including fingerprint or retina scan. Preferably, entering of a correct security key enables operation of the security application such that the mobile device when connected to the lock by the cable can move the lock between a locked and an unlocked position.
The lock may be any suitable form of lock. The lock may be a specialised kind of lock developed especially for the invention. More preferred is that the lock is a conventional lock adapted for use with the invention. In this way the door or other article to be secured need not be changed in order that the improved locking mechanism can be used. For example, an existing door handle and lock can be used with the new locking device utilising the existing lock and causing it to lock and unlock. The lock may be a lockable door handle. The lock may be the lock of a safe. The lock may be a door lock. Preferably, in one form of the invention the lock is a padlock. In this form of the invention the shackle of the padlock is movable between a locked and unlocked state. The padlock may be used to lock any suitable area. The lock may be chosen from the group: door lock; door handle lock; safe lock; tumbler lock; or padlock.
Preferably, the lock includes a lock mechanism which can lock a door, area or object. The lock mechanism may be a door, cabinet or to enable access to an item such as a box or computer. The lock mechanism can be used to secure any item that it is desired to secure. Preferably, the lock resides in a door and locking and unlocking of the mobile device powered lock, locks or unlocks the door. The lock may also reside in lid or door to a container and the locking and unlocking of the mobile device powered lock, locks or unlocks the lid or door or the container such that the contents can be secured or accessed. The lock may be installed in any suitable area to secure an area or items.
The lock may be any suitable lock. The lock may include one or more lock mechanisms, which may be the same or different to one another. Preferably the lock includes a cylinder lock. The lock may alternatively be a standard lock or any suitable lock. Preferably, the lock can cause a projection to project or be retained. When the lock is in a door the projection may project into the door to maintain the door in the locked positioned and the projection may be retracted into the lock to unlock the door and enable the door to be freely opened and closed. The projection may project into a wall to maintain a locked positioned of a door or the like and the projection may be retracted into the lock to unlock the door or the like so that the door or the like can be freely opened and closed. Other alternative means of lock mechanisms and means of keeping secure may be used. Preferably, in one form of the invention the lock is a padlock. The padlock may include a shackle which may be released or secured around an object in either the unlocked or locked state respectively. The padlock may include any suitable means of maintaining items locked. The shackle may project outside of a body of the lock. The shackle may be retained to protect against unauthorised interference.
Preferably, the lock includes one or more socket or port and the one or more socket or port is adapted to receive an end of the cable therein. The lock may include any suitable number of sockets or ports. The sockets or ports may be adapted to receive different connectors for different cables therein. For example, the lock may be adapted for use by two different types of mobile device and one socket may be included for each type of mobile device. The sockets or ports included may be the same or different to one another.
Preferably, an end of the cable includes a Universal Serial Bus ("USB") connector. Preferably, the end of the cable includes a USB connector and the lock includes one or more USB socket or port. There may be two sockets included and one may be a USB 1 .0 port and another socket may be a USB 2.0 port or later version. USB 1 .00, 2.00, 3.00 or otherwise could be used. Alternative forms of communication and connection for power transfer could be used instead of USB. However, it is most preferred to use a USB connection and port. Preferably, two USB sockets or ports are included in the lock.
Preferably, the other end of the cable is adapted for connection to the mobile device. Preferably, power and or data can be transferred along the cable between the mobile device and the lock. Preferably, the cable is a USB cable with a USB connector at one end suitable to be connected to the lock and the other end has a connector suitable to connect to the mobile device. Preferably, the cable includes a connector substantially the same as used to charge the mobile device. The cable may take any suitable form.
Preferably, the cable is connectable between the mobile device and the lock so that a current is passed between them. Preferably, the cable is connected between the mobile device and the lock so that data is passed between them. Preferably, the mobile device and lock are connected together by the cable such that an electrical charge and information can be passed between them. The cable may be a Red Park cable. Preferably, the power and instruction to move the lock between a locked and unlocked state is communicated by means of the cable.
Preferably, the lock includes an actuator which can cause the lock to change between a locked and unlocked state. The actuator may move a projection between a locked and unlocked state. Preferably, the actuator is a small motor. The actuator may alternatively be a solenoid. Any suitable actuator may be used. Preferably, the actuator operates the lock mechanism. Preferably, the actuator causes the lock mechanism to change between a locked and unlocked state.
Preferably, the lock includes a printed circuit board assembly. Preferably, the printed circuit board assembly is configured so that on connection to the mobile device by the cable and authorisation by the security application, power is supplied from the mobile device causing activation of the circuit. Activation of the circuit preferably locks or unlocks the lock. In one form of the invention activation of the circuit can both unlock and lock the lock, the instruction being to change the state, from one to the other. Firmware on the circuit board may be used to control the response of the lock to the instructions from the mobile device. The firmware may be of a simple form to open or close the lock or may include more complex instructions and variants to the instruction (refer to Designworks software development Brisbane, Australia). It is envisaged that further development of the software will vastly expand the functionality of the mobile device powered lock within the scope of the inventive concept.
Preferably, a rod, bar or the like is included. Preferably, the rod, bar or the like is connected to the lock mechanism and on authorisation and activation of the printed circuit board assembly the actuator causes movement of the rod, bar or the like. Preferably, the rod, bar or the like can move between a first position and a second position. Preferably, in the first position the lock mechanism is locked and in the second position the lock mechanism is unlocked, or vice versa. Preferably, the rod, bar or the like acts on the lock mechanism so as to cause a projection to extend from the lock to lock a door or similar in the locked state and the rod, bar or the like can be caused to cause the projection to be again retained within the lock in the unlocked state. The actuator may move the lock mechanism directly between a locked and unlocked state or there may be other parts to the mechanism.
Preferably, the lock includes a USB port, printed circuit board assembly, an actuator and a locking mechanism with a connecting rod between the actuator and the locking mechanism and the actuator moves the connecting rod on activation of the printed circuit board to move between the locking mechanism between a locked and unlocked state. Preferably, the locked position is one where a door or area is secured. Preferably, the unlocked position is one where a door or area is released so that it can be accessed readily. Preferably, the mobile device can both lock and unlock. However, it is envisaged that the mobile device could be adapted to either lock or unlock and conventional means can be used to either unlock or lock, accordingly. Preferably, the mobile device powered lock is installed in a door, cupboard or the like and when in the locked position the door is locked and when in the unlocked position the door or cupboard is unlocked and can be opened and accessed.
Preferably, the lock is configured to be substantially tamperproof to deter unauthorised access. Preferably, the lock is substantially contained within a sealed unit to substantially prevent unauthorised access.
Preferably, the mobile device powered lock is used to secure a box for receipt of delivered goods therein. Preferably, the goods are groceries. The goods may be mail or parcels. Preferably, the mobile device powered lock is fitted to a grocery box and the lock can be locked or unlocked by a delivery person or customer by use of the mobile device and cable to enable delivery of groceries, securing of the groceries and retrieval of the groceries by the customer at a later time. A delivery person may be given authority to open all grocery boxes supplied by a company. Overall permissions and authority may be controlled by a security application on a personal computer or web hosted security application. Overall permissions and authority may be controlled by a single mobile device. Preferably, the delivery person can access all grocery boxes supplied by a company and the person to whom the delivery is made can only open his or her own grocery box. The authority of permissions to enable grocery boxes to be locked and unlocked can be adapted to suit the particular application. In an alternative form of the invention, each mobile device may only be able to lock and unlock a small number of grocery boxes. Preferably, a log of locking and unlocking of the boxes is created. Preferably, a log is created of the locking and unlocking activity. Preferably, a log is created of the particular locks unlocked by the mobile device. The logging of the locking and unlocking information may be made by the security application. The logged information may be available to a customer to track the progress of their goods being delivered. The logged information may be used for payment purposes.
Accordingly, the present invention also provides in a variant a mobile device powered lock including:
a mobile phone or similar device using a security application;
a lock including an lock mechanism movable between a locked position and an unlocked position to maintain a door or similar closure locked or unlocked; and
a USB cable connectable between the mobile phone or similar device and a printed circuit board assembly of the lock;
wherein, in use, the USB cable is connected between the mobile phone or similar device and the printed circuit board assembly of the lock, and a user can use a security key for the security application on the mobile phone or similar device enabling the security application to be authorised activating the printed circuit board assembly causing an actuator to change the lock between the locked and unlocked position and the power to move the actuator is provided by the mobile phone or similar device through the cable.
Accordingly, the present invention also provides in variant a mobile device powered lock including: a mobile device including a security application;
a lock movable between a locked position and an unlocked position; and a cable connectable to the mobile device and to the lock;
wherein, in use, the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable cause an actuator to change the lock between a locked and unlocked position and the power to move the actuator is provided by the mobile device through the cable. Accordingly the invention also provides a method of use of a mobile device powered lock including a mobile device, lock including an electronic circuit and cable, and the method including the following steps:
a) connecting the mobile device to the electronic circuit of the lock by the cable;
b) authorising a security application by entering a security key into the mobile device; and
c) unlocking or locking of the lock by causing the lock to move between a locked and unlocked position or vice versa due to instruction and power provided by the cable and mobile device to the electronic circuit of the lock.
The order of steps a) and b) can be readily reversed or conducted simultaneously. Preferably, the mobile device powered lock is the mobile device powered lock according to the invention in any of its variants or forms.
INDUSTRIAL APPLICABILITY
The mobile device powered lock can be used in a multitude of different applications and industries to enable an item or area to be secured. Each of the mobile device, lock and cable can be manufactured industrially and supplied either directly to customers or to retailers to sell individually.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in connection with non-limiting preferred embodiments with reference to the accompanying drawings, in which:
Figure 1 is a perspective view from above of a mobile phone, lock and cable according to a first preferred embodiment of the invention;
Figure 2 is a perspective view from above of the mobile phone, cable and lock of Figure 1 , including an internal view of the lock; Figure 3 is a perspective view from above of the mobile phone and cable of Figures 1 and 2 being used with a padlock, a different application of the invention; Figure 4 is a storyboard of the navigation and screenshots of the security application of the mobile phone of Figures 1 to 3;
Figure 5 is a screenshot of the security application of the mobile phone of Figures 1 to 4, instructing the user to connect the cable to the mobile phone and lock;
Figure 6 is a screenshot of the security application of the mobile phone of Figures 1 to 5, as shown when the cable is connected to both the mobile phone and lock; Figure 7 is a screenshot of the security application of the mobile phone of Figures 1 to 6, indicating that the lock is unlocked;
Figure 8 is a screenshot of the security application of the mobile phone of Figures 1 to 7, giving the disconnect cable message;
Figure 9 is a screenshot of the security application of the mobile phone of Figures 1 to 8, showing that the lock is now locked;
Figure 10 is a screenshot of the security application of the mobile phone of Figures 1 to 9, showing the log options;
Figure 1 1 is a screenshot of the security application of the mobile phone of Figures 1 to 10, showing more options, including settings; Figure 12 is a top level schematic of the electronics of the lock of Figures 1 to 1 1 ;
Figure 13 is a first half of a schematic of the electronics of the lock of Figures 1 to 1 1 , the left hand side; Figure 14 is a second half of the schematic of the electronics of the lock of Figure 13, the right hand side;
Figure 15 is a further schematic of the electronics of the lock of Figures 1 to 1 1 ; Figure 16 is a further schematic of the electronics of the lock of Figures 1 to 1 1 :
Figure 17 are additions to the left hand side of the schematic of Figure 16; and Figure 18 are additions to the right hand side of the schematic of Figure 16.
DETAILED DESCRIPTION OF THE INVENTION INCLUDING A BEST MODE
Referring to Figures 1 and 2, a first preferred embodiment of the invention will be described, where mobile phone 10, cable 12 and lock 14 can be seen used together to create a secure locking and unlocking system powered completely by mobile phone 10 and cable 12. Lock 14 is sealed and tamper proofed to ensure a secure locking system.
Mobile phone 10 is illustrated as a smart phone of a known kind including a security application "InnBox" (refer to Designworks, Brisbane, Australia). Mobile phone 10 may be replaced with other mobile devices such as a tablet computer or similar. Mobile phone 10 is chargeable itself through use of a socket at the bottom of the phone to charge a battery, in the usual way. A particular connector connects to the phone battery connected to a transformer which in turn is connected to a power source. Alternatively, mobile phone 10 may be docked in a docking unit connected to a mains supply or PC for providing charge.
Cable 12 is a vital part of the described embodiment as it enables not only communication but also power to be supplied from mobile phone 10 to lock 14, different to other mobile phone controlled locks. Cable 12 as illustrated has a connector 16 at one end which is adapted to fit into the power charging socket of mobile phone 10. Connector 16 is identical to the power charging connector used by phone 10. The particular form of connector 16 would be changed to suit the particular phone or mobile device to be used with the invention. Cable 14 has a Universal Serial Bus ("USB") connector 18 at the other end, the industry standard for short distance digital communications. USB connector 18 is a USB 1 .0 connector but could be replaced with other more recent versions of the USB connector 2.0, 3.0 or otherwise and be of a smaller size. USB connector 18 is suitable to fit in socket 20 or socket 22 on lock 14 as described in more detail below. USB connector 18 is shown in detail in the inset of Figure 1 . More than one socket is included, to enable multiple use or different sockets could be adapted to work with different mobile devices for different levels of security. As illustrated socket 20 and socket 22 are the same. Socket 20 and socket 22 are suitable to receive USB connector 18 therein so as to be connected and in communication with mobile phone 10. Socket 20 and 22 could also be referred to as USB ports. The number of ports or sockets included could be varied to suit the particular application to which the invention is to be put and the type of locks and unlocking mechanisms and security levels to be included.
Lock 14 as illustrated includes handle 24 on back plate 26 including socket section 28. The form of lock 14 is generally in overall appearance that of a standard door handle but includes additional features to enable secure locking and unlocking by mobile phone 10. Importantly lock 14 is tamperproof so as to prevent unauthorised access and unlocking without use of the invention. Lock 14 is shown in door 30 (only part of which is shown) and is intended to be a door to a cabinet for keeping groceries. Clearly lock 14 in door 30 could alternatively be a door to secure a room, or area or the door and lock of a cupboard or other secure area. The invention can be used anywhere and for any application where it is desirable to be able lock and unlock and use the convenience and added security of the mobile powered lock. Cylinder lock 32 is shown in door handle 24 which enables the door to be locked and unlocked in the usual manner. It is also possible to lock or unlock door 30 through use of cylinder lock 24 and a conventional key. Use of a conventional key may be used including as a back-up.
Referring to Figure 2 in particular, mobile phone 10 is shown connected to connector 16 of cable 12, ready for use. USB connector 18 is on its way to being connected to socket 22 in socket section 28 of lock 14. Lock 14 is shown as a mirror image of door 30 but is the same lock 14 as shown in Figure 1 . Cylinder lock 32 is connected to a small cylinder (not shown) inside door handle 24 which in turn is connected to door projection 34 which extends into door projection receiving portion 36 when door 30 is locked shut. Activation of cylinder lock 32 enables movement of door projection 34 from being wholly contained within door handle 24, to move out so as to project into door projection receiving portion 36 and to lock or maintain door 30 in a locked state. The activation of cylinder lock 32, by a key or activation by mobile phone 10 turns the small cylinder in door handle 24 which turns a cam (not shown) which in turn releases a spring (not shown) causing the movement of door projection 34 into door projection receiving portion 36.
To unlock door 30 and enable door 30 to be opened further activation of cylinder lock 32, by a key or activation by mobile phone 10 is needed. The activation again turns the small cylinder in door handle 24 which turns the cam. Again the spring causing the movement of door projection 34 into door projection receiving portion 36, is released so the pressure is released and door projection 34 returns into door handle 24. Once door projection 34 is fully within lock 14, and out of door projection receiving portion 36, door 30 is free to be opened and closed and is in the unlocked state.
Connecting rod 38 is a thin metal rod and connects cylinder lock 32 to actuator 40. Activation of actuator 40 enables connecting rod 38 to be moved between a first position where cylinder lock 32 is locked and a second position where cylinder lock 32 is unlocked and door 30 is accordingly locked and unlocked.
Actuator 40 is a small motor as illustrated but could alternatively be a mechanical solenoid, suitable for the purpose. Actuator 40 provides linear movement on activation to connecting rod 38. It is connecting rod 38 that actually moves and connects actuator 40 to cylinder lock 32 on activation by mobile phone 10. In an alternative form of the invention actuator 40 can replace cylinder lock 32 and the associated parts and lock and unlock door 30 directly. Printed circuit board assembly 42 (refer to the schematics of Figures 12 to 18) drives actuator 40 when connected to USB socket 20 or 22 and authorised to do so by mobile phone 10 and the security application. Power from mobile phone 10 connects through use of cable 12 via USB connector 18 to USB port or socket 20 or 22 in printed circuit board assembly 42. In this way communication and power from mobile phone 10 can cause actuator 40 to move connecting rod 38 and hence cylinder lock 32 and attached door projection between the locked and unlocked positions.
In use, a person will connect mobile phone 10 with cable 12 to unlock 14 by connecting USB connector 16 of cable 12 to USB socket 20, for example. Using mobile phone 10 the security application is selected on the phone, as described in more detail below. The security application has previously been downloaded to the phone but could alternatively be firmware or supplied on phone 10, or be connected to by the phone by web or cloud based networks or a networked PC, for example. The person enters a password and user name. On entering the correct password and user name combination the security application enables USB communication via cable 12 from phone 10 to unlock 14 (refer to the description below with respect to Figures 4 to 1 1 ). It is in this way that phone 10 can operate lock 14 as power is supplied via the USB cable through to power the lock. Instead of a password and user name any form of security key may be used. For example, a key code, timed code, use of a security token, biometric including a fingerprint or retina scan security. Once the password and user name or other security key has been successfully entered the phone can control the locking and unlocking of door 30 through cable 12. Power is supplied to printed circuit board assembly 42 completing a circuit to actuator 40 which causes connecting rod 38 to move cylinder lock 32, causing door projecting 34 to be retained within the lock. The process can be reversed to lock door 30 by use of phone 10. Additional security is provided by the need to have mobile phone 10, the security key to access and authorise unlocking through use of the application on mobile phone 10 and the need to have the correct cable 12. Door 30 can be locked by pulling shut or locking with a conventional key or through use of mobile phone 10.. Door 30 is described as the door for a grocery box or cabinet which would be situated outside of a residence or office. The grocery box is suitable for receipt of groceries or other delivered items. The current problem with many grocery boxes is security. Generally, grocery items are delivered and left, unsecured on a door step or at the back of a residence.
Locked grocery boxes are known but generally use a clumsy method of locking such as a simple padlock and both the delivery person and the owner needs to have the keys to access the grocery container and the goods within. Use of the convenient mobile powered lock of the invention for the security of a grocery box is a significant improvement over the prior art. The grocery box can be used away from the house as no power source is required and in fact can be placed near a post box or road which is most convenient for the delivery person. The grocery box can be readily installed by the home owner with no need to use the services of an electrician.
In use a person may have a regular weekly order of groceries which are delivered when nobody is home. The delivery person can arrive at the address and use his or her mobile phone, cable and use a password and user name to access the lock when connected by the cable to a mobile phone. Once unlocked groceries can be placed in the box, the box locked and the delivery person continue on with deliveries. When the owner of the box returns home, he or she can connect the cable with their mobile phone and access the box. The activity of the mobile phone and locking and unlocking of the grocery boxes is logged and tracked by the security application.
The grocery box can also be used as a mail box to receive secure parcels or other goods. Additional levels of security such as rotating or changing pin numbers may be used to secure the mailbox. Clearly, use of the mobile powered lock had numerous applications. For example, the mobile device powered lock is particularly useful for securing boxes or safes. Referring to Figure 3 a variant to the invention is disclosed with reference numerals similar to the first where mobile phone 1 10, cable 1 12 and lock 1 14 are used together. Lock 1 14 is sealed so as to prevent unauthorised access. Mobile phone 1 10 is a smart phone including a security application. Mobile phone 1 10 could be replaced with other mobile devices such as a tablet computer or similar. Mobile phone 1 10 is chargeable through use of a socket at the bottom of the phone, in the usual way. Cable 1 12 enables communication and power to be supplied from mobile phone 1 10 to lock 1 14. Cable 1 12 as illustrated has a connector 1 16 at one end which is adapted to fit into the power charging socket of mobile phone 1 10. Connector 1 16 is identical to the power charging connector used by phone 1 10. Cable 1 14 has a Universal Serial Bus ("USB") connector 1 18 at the other end. USB connector 1 18 is suitable to fit in socket or USB port 120 on lock 1 14 as shown in detail in the inset of Figure 3.
Lock 1 14 as illustrated is in the form of a padlock having a shackle 124 and body 126 including socket section 128. Door 130 is illustrated including bracket 131 through which shackle 124 can be passed in the usual manner to secure closed. Lock 1 14 is tamperproof to prevent an unauthorised person from activating the unlocking mechanism unless they use mobile phone 1 10 and cable 1 12.
In use, as with the first described embodiment, a person uses mobile phone 1 10 and unlocks the security application by use of a security key. Once the security application is authorised the person can instruct that locking or unlocking occurs provided cable 1 12 is plugged into socket 120. When the unlocking instruction is sent from phone 1 10 through cable 1 12 power is supplied to a printed circuit board assembly within body 126. As power is supplied to the printed circuit board assembly a circuit is completed to activate an actuator to move lock mechanism to enable shackle 124 to be released. Shackle 124 can then be removed from body 126 partially or wholly to enable removal from bracket 131 and in turn door 130 can be opened. None of the printed circuit board assembly, actuator and locking mechanism are shown but work in a similar manner to first described embodiment.
The padlock form of the invention can be used to secure grocery boxes in the same manner as described for the first embodiment. Use of the invention to secure padlocks is particularly useful as it has many everyday applications. The padlock of the invention can replace any padlock such as used on sheds, tool boxes, vehicle secure boxes for example and improve the security for the contents. The padlock form of the invention could be readily sold direct to customers for immediate use without any need for installation or set-up.
Cable 12 and 1 12 is illustrated as a Red Park cable, used for development of the security application. It is anticipated that cable 12 and 1 12 will be the hardware supplied with the mobile device, such as a particular make of mobile phone. Alternatively, cable 12 and 1 12 could be designed specifically for use with the security application and be supplied separate to the mobile device, perhaps with the security application and or lock. In this form of the invention the connectors of the cable will be adapted to be suitable to the particular mobile device. Referring to Figures 4 to 1 1 the security application for the mobile phone is described in further detail named InnBox (refer Designworks Brisbane, Australia). Figure 4 gives the storyboard of the navigation through the software to unlock the lock and to the log and settings features. Figures 5 to 1 1 give examples of some of the screenshots seen on mobile phone 10, 1 10 during use.
A person would access mobile phone 10, 1 10 in the usual manner and from the applications list or icons displayed choose "InnBox" to display the Logon page. To proceed a security key, in this case a user name and password, must be entered correctly. The username and password can be set up when first installing the InnBox software and a high level security password will be required to prevent unauthorised persons accessing the lock. Use of the username and password prevents unauthorised access of the lock. The authorised user enters the correct username and password into mobile phone 10, 1 10 followed by the "sign in" tab and the software enables navigation to the next page. The user can then choose one of three tabs at the bottom of the screen "Activate", "Log" and "More". The "Activate" tab is used for the unlocking of the lock, "Log" is for looking at the log of locking and unlocking that has occurred and "More" has application settings. As can be seen on Figure 5 "Activate" is highlighted indicating that the unlocking process is underway and the screen gives the message "Connect Cable". At this point cable 12, 1 12 is connected by the user to both mobile phone 10, 1 10 and lock 14, 1 14 and the security application recognises that this has occurred and the screen changes to the screenshot as shown in Figure 6. It is only once the cable has been connected to the electronic circuits of lock 14, 1 14 that power is supplied enabling unlocking. Before the cable is attached there is no power or electrical connection to lock 14, 1 14. The arrows below the image of the cable connected to mobile phone 10, 1 10 and cable 12, 1 12 have a sequence of colour changes to indicate to the user that activation is occurring. The message "Please wait" is displayed under the words "Lock Power Up" until power is supplied from mobile phone 10, 1 10 to lock 14, 1 14. When lock 14, 1 14 is ready for unlocking the "unlock" screen, as can be seen in Figure 7, is displayed. The user can tap on the "unlock" button and the screenshot of Figure 8 is shown to indicate to the user that cable 12, 1 12 should be disconnected. The lock is now accessible and the user can open lock 14, 1 14 and access the area. Cable 12, 1 12 can be disconnected so that once the lock is closed again it will lock automatically. In the given example, screenshot gives the message "Disconnect Cable" and "Close door to lock automatically" after which the "Lock" icon is displayed as shown in Figure 9. Again the "Close door to lock automatically" message is given as there could be some variation in the order of use of the lock and removal of the cable. The example given uses the invention to unlock lock 14, 1 14 and the locking can occur by simply closing lock 14, 1 14 and removing cable 12, 1 12. Clearly, the invention could be used in reverse to lock closed lock 14, 1 14 or the cable may be required to both lock and unlock, for example.
Figure 10 illustrates a screenshot of use of the "Log" tab giving the choice of "My Activation Log" for a listing of unlocking actions and "Connected Lock Log" giving details of the particular locks unlocked. Other features could be added to this part of the security application, for monitoring activity. Figure 11 illustrates a screenshot of the use of the "More" tab where various settings can be adjusted. These include the User ID and manual Lock options as well as information about the security application itself. The invention is applicable to a great many locked areas, cupboards, secure outdoor areas, a safe, a door and the unlocking method will be the same.
An example of the code for the mobile phone application is as follows as would be readily understood by a person skilled in the art. Adaptation of the security application for different mobile devices will enable other mobile devices to use the invention.
//
// Login. h
// Inn-Box
//
// Created by Alexander Wall on 22/02/13.
// Copyright (c) 2013 Designworks. All rights reserved.
// #import <UIKit/UIKit.h>
©interface Login : UlViewController
- (IBAction)loginbtn:(id)sender;
- (IBAction)PW:(id)sender;
@end
//
// Login. m
// Inn-Box
//
// Created by Alexander Wall on 22/02/13. // Copyright (c) 2013 Designworks. All rights reserved.
//
#import "Login. h" ©interface Login () @end
©implementation Login
- (id)initWithNibName:(NSString *)nibNameOrNil bundle:(NSBundle *)nibBundleOrNil
{
self = [super initWithNibName:nibNameOrNil
bundle:nibBundleOrNil];
if (self) {
// Custom initialization
}
return self;
}
- (void)viewDidLoad
{
[super viewDidLoad];
! // Do any additional setup after loading the view.
}
- (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
} - (IBAction)loginbtn:(id)sender {
}
- (IBAction)PW:(id)sender {
[self dismissViewControllerAnimated:YES completion:NULL];
}
@end
//
// FirstViewController.h
// Inn-Box
//
// Created by Alexander Wall on 21/02/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import <UIKit/UIKit.h> ©interface FirstViewController : UlViewController
©property (strong, nonatomic) IBOutlet UMmageView *imageView;
@end
//
// FirstViewController.m
// Inn-Box
//
// Created by Alexander Wall on 21/02/13.
// Copyright (c) 2013 Designworks. All rights reserved.
// #import "FirstViewController.h"
#import "PowerUpViewController.h"
©interface FirstViewController () @end
©implementation FirstViewController
- (void)viewDidLoad
{
[super viewDidLoad];
[self.navigationController.navigationBar setTintColor:[UIColor blackColor]]; self.navigationController.title = ©"Activate";
[[NSNotificationCenter defaultCenter] addObserverself
selector:@selector(cableConnected) name:@"CableConnected" object:nil];
} - (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
- (void) cableConnected
{
[self performSegueWithldentifier: @"next" sender: self]; [[NSNotificationCenter defaultCenter] removeObserverself name:@"CableConnected" object: nil];
} @end
//
// SecondViewController.h
// Inn-Box
//
// Created by Alexander Wall on 21/02/13.
// Copyright (c) 2013 Designworks. All rights reserved.
// #import <UIKit/UIKit.h>
©interface SecondViewController : UlViewController @end
//
// SecondViewController.m
// Inn-Box
//
// Created by Alexander Wall on 21/02/13.
// Copyright (c) 2013 Designworks. All rights reserved. //
#import "SecondViewController.h" ©interface SecondViewController ()
@end ©implementation SecondViewController
- (void)viewDidLoad
{
[super viewDidLoad];
[self.navigationController.navigationBar setTintColor:[UIColor blackColor]]; self.navigationController.title = ©"Activate";
}
- (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
@end
//
// AppDelegate.h
// Inn-Box
//
// Created by Alexander Wall on 21/02/13.
// Copyright (c) 2013 Designworks. All rights reserved. //
#import <UIKit/UIKit.h>
#import "RscMgr.h" ©interface AppDelegate : UIResponder
<UIApplicationDelegate, RscMgrDelegate>
©property (strong, nonatomic) UlWindow *window; ©property (strong, nonatomic) RscMgr *redparkManager;
@end
//
// AppDelegate.m
// Inn-Box
//
// Created by Alexander Wall on 21/02/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import "AppDelegate.h" ©implementation AppDelegate
©synthesize redparkManager;
- (BOOL)application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary
*)launchOptions
{
// Override point for customization after application launch. self.redparkManager = [[RscMgr alloc] init];
[self.redparkManager setDelegate:self];
!
return YES;
}
! ! ! ! ! ! !
- (void)applicationWillResignActive:(UIApplication *)application
{
// Sent when the application is about to move from active to inactive state. This can occur for certain types of temporary interruptions (such as an incoming phone call or SMS message) or when
the user quits the application and it begins the transition to the background state.
// Use this method to pause ongoing tasks, disable timers, and throttle down OpenGL ES frame rates. Games should use this method to
pause the game.
}
- (void)applicationDidEnterBackground:(U I Application *)application {
// Use this method to release shared resources, save user data, invalidate timers, and store enough application state information to restore your application to its current state in case it is terminated later.
// If your application supports background execution, this method is called instead of applicationWillTerminate: when the user quits. }
- (void)applicationWillEnterForeground:(U I Application *)application {
// Called as part of the transition from the background to the inactive state; here you can undo many of the changes made on entering
the background.
}
- (void)applicationDidBecomeActive:(UIApplication *)application {
// Restart any tasks that were paused (or not yet started) while the application was inactive. If the application was previously in the background, optionally refresh the user interface. }
- (void)applicationWillTerminate:(UIApplication *)application
{
// Called when the application is about to terminate. Save data if appropriate. See also applicationDidEnterBackground:.
}
// Redpark Serial Cable has been connected and/or application moved to foreground.
// protocol is the string which matched from the protocol list passed to initWithProtocol:
- (void) cableConnected:(NSString *)protocol
{
NSLog(@"Cable connected");
[self.redparkManager open]; [self.redparkManager setBaud:57600]; [self.redparkManager setDataSize:kDataSize8];
[self.redparkManager setParity:SERIAL_PARITY_NONE];
[self.redparkManager setStopBits:STOPBITS_1 ];
[[NSNotificationCenter defaultCenter]
postNotificationName:@"CableConnected" object: nil];
}
// Redpark Serial Cable was disconnected and/or application moved to background
- (void) cableDisconnected
{
NSLog(@"Cable disconnected");
[[NSNotificationCenter defaultCenter]
postNotificationName:@"CableDisconnected" objec nil];
} // serial port status has changed
// user can call getModemStatus or getPortStatus to get current state
- (void) portStatusChanged
{
NSLog(@"Port status changed");
}
// bytes are available to be read (user should call read:, getDataFromBytesAvailable, or
getStringFromBytesAvailable)
- (void) readBytesAvailable:(Ulnt32)length
{
NSLog(@"Bytes available to be read");
[[NSNotificationCenter defaultCenter]
postNotificationName:@"BytesAvailable" objec nil];
}
@end
//
// ManualLockViewController.h
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import <UIKit/UIKit.h>
©interface ManualLockViewController : UlViewController
- (IBAction)lockButtonPressed:(id)sender; @end
//
// ManualLockViewController.m
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import "ManualLockViewController.h"
#import "RscMgr.h"
#import "AppDelegate.h" ©interface IvIanualLockViewController ()
@end
©implementation IvIanualLockViewController
- (id)initWithNibName:(NSSthng *)nibNameOrNil bundle:(NSBundle *)nibBundleOrNil
{
self = [super initWithNibName:nibNameOrNil
bundle:nibBundleOrNil];
if (self) {
// Custom initialization
}
return self;
}
- (void)viewDidLoad
{ [super viewDidLoad];
! // Do any additional setup after loading the view. } - (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
- (IBAction)lockButtonPressed:(id)sender
{
RscMgr *redParkMgr = ((AppDelegate *)[[UIApplication sharedApplication]
delegate]). redparkManager;
[redParkMgr writeString:@"L"];
}
@end
//
// DisconnectViewController.h
// Inn-Box
//
// Created by Alexander Wall on 3/04/13. // Copyright (c) 2013 Designworks. All rights reserved. //
#import <UIKit/UIKit.h> ©interface DisconnectViewController : UlViewController
@end
// // DisconnectViewController.m
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import "DisconnectViewController.h" ©interface DisconnectViewController () @end
©implementation DisconnectViewController
- (id)initWithNibName:(NSSthng *)nibNameOrNil bundle:(NSBundle *)nibBundleOrNil
{
self = [super initWithNibName:nibNameOrNil
bundle:nibBundleOrNil];
if (self) {
// Custom initialization
}
return self;
}
- (void)viewDidLoad
{
[super viewDidLoad];
! // Do any additional setup after loading the view.
}
- (void)didReceiveMemoryWarning {
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
@end
//
// UnlockViewController.h
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import <UIKit/UIKit.h>
©interface UnlockViewController : UlViewController
- (IBAction)unlockButtonPressed:(id)sender;
©property (strong, nonatomic) IBOutlet UIButton *imageView;
@end //
// UnlockViewController.m
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import "UnlockViewController.h" #import "AppDelegate.h"
©interface UnlockViewController () @end
©implementation UnlockViewController
- (id)initWithNibName:(NSString *)nibNameOrNil bundle:(NSBundle *)nibBundleOrNil
{
self = [super initWithNibName:nibNameOrNil
bundle: nibBundleOrNil];
if (self) {
// Custom initialization
}
return self;
} - (void)viewDidLoad
{
[super viewDidLoad];
! // Do any additional setup after loading the view.
}
- (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
- (IBAction)unlockButtonPressed:(id)sender {
RscMgr *redParkMgr = ((AppDelegate *)[[UIApplication
sharedApplication] delegate]). redparkManager;
[redParkMgr writeString:@"U"];
[self performSegueWithldentifier: @"next" sender: self];
}
@end //
// PowerUpViewController.h
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import <UIKit/UIKit.h> ©interface PowerUpViewController : UlViewController
©property (strong, nonatomic) IBOutlet UllmageView *imageView; ©property (strong, nonatomic) IBOutlet U I Activityl ndicatorView *activityView; @end
//
// PowerUpViewController. m
// Inn-Box
//
// Created by Alexander Wall on 3/04/13.
// Copyright (c) 2013 Designworks. All rights reserved.
// #import "PowerUpViewController.h"
#import "DisconnectViewController.h"
#import "AppDelegate.h"
#import "RscMgr.h"
©interface PowerUpViewController () @end ©implementation PowerUpViewController
- (id)initWithNibName:(NSString *)nibNameOrNil bundle:(NSBundle *)nibBundleOrNil
{
self = [super initWithNibName:nibNameOrNil
bundle: nibBundleOrNil];
if (self) {
// Custom initialization }
return self;
}
- (void)viewDidLoad
{
[super viewDidLoad];
! [[NSNotificationCenter defaultCenter] addObserverself selector: @selector(bytesAvailable) name:@"BytesAvailable" objec nil];
}
- (void) viewDidAppear:(BOOL)animated
{ [super viewDidAppearanimated];
[self.activityView startAnimating];
}
- (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
- (void) bytesAva liable
{
[self performSegueWithldentifier: @"next" sender: self]; [[NSNotificationCenter defaultCenter] removeObserverself name:@"BytesAvailable" objec nil];
}
@end //
// LogViewController.h
// Inn-Box
//
// Created by Alexander Wall on 7/03/13.
// Copyright (c) 2013 Designworks. All rights reserved. //
#import <UIKit/UIKit.h> ©interface LogViewController : UlViewController
@end //
// LogViewController.m
// Inn-Box
//
// Created by Alexander Wall on 7/03/13.
// Copyright (c) 2013 Designworks. All rights reserved.
//
#import "LogViewController.h" ©interface LogViewController () @end
©implementation LogViewController
- (id)initWithNibName:(NSString *)nibNameOrNil bundle:(NSBundle *)nibBundleOrNil
{
self = [super initWithNibName:nibNameOrNil
bundle: nibBundleOrNil];
if (self) {
// Custom initialization
}
return self;
} - (void)viewDidLoad
{
[super viewDidLoad];
! // Do any additional setup after loading the view. }
- (void)didReceiveMemoryWarning
{
[super didReceiveMemoryWarning];
// Dispose of any resources that can be recreated.
}
@end
The particular words and icons displayed on the InnBox security application, and order of operation can readily be changed as is suitable for the particular application of the invention.
There are clearly a great many applications for this important invention. Most locks could be adapted by use of the inventive technology to incorporate a lock used and powered through use of a mobile device and cable. Each of these locks can readily use the technology without the need to hire an electrician to install expensive complex locking systems.
It will be apparent to a person skilled in the art that changes may be made to the embodiments disclosed herein without departing from the spirit and scope of the invention in its various aspects.
REFERENCE SIGNS LIST:
10 Mobile phone 1 10 Mobile phone
12 Cable 1 12 Cable
14 Lock 1 14 Lock
16 Connector 1 16 Connector
18 USB Connector 1 18 USB Connector
20 Socket on lock 120 Socket on lock
22 Socket on lock 124 Shackle
24 Handle 126 Body
26 Back plate 128 Socket section
28 Socket section 130 Door
30 Door 131 Bracket
32 Conventional lock
34 Door projection
36 Door projection receiving portion
38 Connecting rod
40 Actuator
42 Printed Circuit Board

Claims

THE CLAIMS:
1 . A mobile device powered lock including: a security application accessible from a mobile device; and
a cable connectable between the mobile device and a lock movable between a locked position and an unlocked position;
wherein, in use, the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable cause the lock to move between the locked and unlocked position and the power to do so is provided by the mobile device through the cable.
2. The mobile device powered lock of claim 1 , wherein the mobile device is a smart phone.
3. The mobile device powered lock of claims 1 or 2, wherein the security application is an application downloadable to the mobile device.
4. The mobile device powered lock according to any one of claims 1 to 3, wherein authority to unlock and lock at least one lock can be controlled by the security application.
5. The mobile device powered lock according to any one of claims 1 to 4, wherein the security application is of a form when a security key needs to be provided to enable the software to be used to activate the lock via the cable.
6. The mobile device powered lock of claim 5, wherein the security key may be a password and user name.
7. The mobile device powered lock according to any one of claims 5 or 6, wherein the security key is chosen from the group: access code; password, password and user name, timed access code; random access code; security token; biometric security including fingerprint or retina scan.
8. The mobile device powered lock according to any one of claims 1 to 7, wherein the lock is chosen from the group: door lock; door handle lock; safe lock; tumbler lock; or padlock.
9. The mobile device powered lock according to any one of claims 1 to 8, wherein the lock resides in a door and locking and unlocking of the mobile device powered lock, locks or unlocks the door.
10. The mobile device powered lock according to any one of claims 1 to 9, wherein the lock can cause a projection to project or be retained and when the lock is in a door the projection projects into the door to maintain the door in the locked positioned and the projection may be retracted into the lock to unlock the door and enable the door to be freely opened and closed.
1 1 . The mobile device powered lock according to any one of claims 1 to 10, wherein the lock is a padlock including shackle which is released or secured around an object in either the unlocked or locked state respectively.
12. The mobile device powered lock according to any one of claims 1 to 1 1 , wherein the lock includes one or more socket or port and the one or more socket or port is adapted to receive an end of the cable therein.
13. The mobile device powered lock according to any one of claims 1 to 12, wherein an end of the cable includes a Universal Serial Bus ("USB") connector. and the lock includes one or more USB socket or port.
14. The mobile device powered lock according to claim 13, wherein the other end of the cable is adapted for connection to the mobile device.
15. The mobile device powered lock according to any one of claims 1 to 14, wherein the cable is a USB cable with a USB connector at one end suitable to be connected to the lock and the other end has a connector suitable to connect to the mobile device.
16. The mobile device powered lock according to any one of claims 1 to 15, wherein power and or data can be transferred along the cable between the mobile device and the lock.
17. The mobile device powered lock according to any one of claims 1 to 16, wherein the lock includes an actuator which can cause the lock to change between a locked and unlocked state.
18. The mobile device powered lock according to any one of claims 1 to 17, wherein the lock includes a USB port, printed circuit board assembly, an actuator and a locking mechanism with a connecting rod between the actuator and the locking mechanism and the actuator moves the connecting rod on activation of the printed circuit board to move between the locking mechanism between a locked and unlocked state.
19. The mobile device powered lock according to any one of claims 1 to 18, wherein the lock is configured to be substantially tamperproof.
20. The mobile device powered lock according to any one of claims 1 to 19, wherein the mobile device powered lock is used to secure a box for receipt of delivered goods therein.
21 . The mobile device powered lock according to any one of claims 1 to 20, wherein a log is created of the locking and unlocking activity and the particular locks unlocked by the mobile device.
22. A mobile device powered lock including:
a mobile phone or similar device using a security application;
a lock including a lock mechanism movable between a locked position and an unlocked position to maintain a door or similar closure locked or unlocked; and
a USB cable connectable between the mobile phone or similar device and a printed circuit board assembly of the lock; wherein, in use, the USB cable is connected between the mobile phone or similar device and the printed circuit board assembly of the lock, and a user can use a security key for the security application on the mobile phone or similar device enabling the security application to be authorised activating the printed circuit board assembly causing an actuator to change the lock between the locked and unlocked position and the power to move the actuator is provided by the mobile phone or similar device through the cable.
23. A mobile device powered lock including: a mobile device including a security application;
a lock movable between a locked position and an unlocked position; and a cable connectable to the mobile device and to the lock;
wherein, in use, the cable is connected to both the mobile device and the lock, and a user can use a security key for the security application enabling the security application to be authorised and via the cable cause an actuator to change the lock between a locked and unlocked position and the power to move the actuator is provided by the mobile device through the cable.
24. A method of use of a mobile device powered lock including a mobile device, lock including an electronic circuit and cable, and the method including the following steps:
a) connecting the mobile device to the electronic circuit of the lock by the cable;
b) authorising a security application by entering a security key into the mobile device; and
c) unlocking or locking of the lock by causing the lock to move between a locked and unlocked position or vice versa due to instruction and power provided by the cable and mobile device to the electronic circuit of the lock.
25. The method of claim 24 when the mobile device powered lock is the mobile device powered lock of any one of claims 1 to 23.
PCT/AU2013/000484 2012-05-14 2013-05-14 Mobile device powered lock WO2013170292A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2012901958A AU2012901958A0 (en) 2012-05-14 Mobile device powered lock
AU2012901958 2012-05-14

Publications (1)

Publication Number Publication Date
WO2013170292A1 true WO2013170292A1 (en) 2013-11-21

Family

ID=49582885

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2013/000484 WO2013170292A1 (en) 2012-05-14 2013-05-14 Mobile device powered lock

Country Status (1)

Country Link
WO (1) WO2013170292A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318644A (en) * 2014-09-03 2015-01-28 马文超 Method for achieving cipher lock, cipher lock formed by the method, and annular lock
US9728022B2 (en) 2015-01-28 2017-08-08 Noke, Inc. Electronic padlocks and related methods
US9747739B2 (en) 2014-08-18 2017-08-29 Noke, Inc. Wireless locking device
CN111542981A (en) * 2017-06-26 2020-08-14 安全插头有限公司 Electric safety cover
SE1951396A1 (en) * 2019-12-04 2021-06-05 Assa Abloy Ab Electronic lock configured to receive power from a mobile phone
DE202021105208U1 (en) 2021-09-28 2021-10-13 Ewa Musiol Radio key for contactless opening of an electronic lock
US11199889B2 (en) 2019-02-15 2021-12-14 Carrier Corporation Bezel interface providing backup power to relay control circuitry
US11352817B2 (en) 2019-01-25 2022-06-07 Noke, Inc. Electronic lock and interchangeable shackles
CN115075657A (en) * 2022-06-24 2022-09-20 珠海优特物联科技有限公司 Lock core component
DE102021125075B3 (en) 2021-09-28 2023-02-02 Ewa Musiol Radio key system for touch-free opening of an electronic lock
EP4141827A4 (en) * 2020-12-08 2023-10-25 Platformbase Co., Ltd Electronic key interlocked with smart device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060107073A1 (en) * 2004-11-12 2006-05-18 International Business Machines Corporation System and method for equipment security cable lock interface
WO2008136844A1 (en) * 2007-05-04 2008-11-13 Gartner Klaus W Portable entry system and method
US20080303630A1 (en) * 2007-06-06 2008-12-11 Danilo Jose Martinez DigiKey and DigiLock
CN201865444U (en) * 2010-11-25 2011-06-15 合肥天智科技发展有限公司 Safety lock with rotary tongue
CN202559875U (en) * 2011-11-16 2012-11-28 孙勃 Electronic lock system supplying electric energy to electronic lock through mobile phone

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060107073A1 (en) * 2004-11-12 2006-05-18 International Business Machines Corporation System and method for equipment security cable lock interface
WO2008136844A1 (en) * 2007-05-04 2008-11-13 Gartner Klaus W Portable entry system and method
US20080303630A1 (en) * 2007-06-06 2008-12-11 Danilo Jose Martinez DigiKey and DigiLock
CN201865444U (en) * 2010-11-25 2011-06-15 合肥天智科技发展有限公司 Safety lock with rotary tongue
CN202559875U (en) * 2011-11-16 2012-11-28 孙勃 Electronic lock system supplying electric energy to electronic lock through mobile phone

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9747739B2 (en) 2014-08-18 2017-08-29 Noke, Inc. Wireless locking device
US10176656B2 (en) 2014-08-18 2019-01-08 Noke, Inc. Wireless locking device
US10319165B2 (en) 2014-08-18 2019-06-11 Noke, Inc. Wireless locking device
CN104318644A (en) * 2014-09-03 2015-01-28 马文超 Method for achieving cipher lock, cipher lock formed by the method, and annular lock
US9728022B2 (en) 2015-01-28 2017-08-08 Noke, Inc. Electronic padlocks and related methods
US10210686B2 (en) 2015-01-28 2019-02-19 Noke, Inc. Electronic padlocks and related methods
US10713868B2 (en) 2015-01-28 2020-07-14 Noke, Inc. Electronic locks with duration-based touch sensor unlock codes
CN111542981A (en) * 2017-06-26 2020-08-14 安全插头有限公司 Electric safety cover
US11352817B2 (en) 2019-01-25 2022-06-07 Noke, Inc. Electronic lock and interchangeable shackles
US11199889B2 (en) 2019-02-15 2021-12-14 Carrier Corporation Bezel interface providing backup power to relay control circuitry
SE1951396A1 (en) * 2019-12-04 2021-06-05 Assa Abloy Ab Electronic lock configured to receive power from a mobile phone
SE545352C2 (en) * 2019-12-04 2023-07-18 Assa Abloy Ab Electronic lock configured to receive power from a mobile phone
EP4141827A4 (en) * 2020-12-08 2023-10-25 Platformbase Co., Ltd Electronic key interlocked with smart device
DE202021105208U1 (en) 2021-09-28 2021-10-13 Ewa Musiol Radio key for contactless opening of an electronic lock
DE102021125075B3 (en) 2021-09-28 2023-02-02 Ewa Musiol Radio key system for touch-free opening of an electronic lock
CN115075657A (en) * 2022-06-24 2022-09-20 珠海优特物联科技有限公司 Lock core component
CN115075657B (en) * 2022-06-24 2024-01-12 珠海优特电力科技股份有限公司 Lock core component

Similar Documents

Publication Publication Date Title
WO2013170292A1 (en) Mobile device powered lock
US11103063B2 (en) Apparatus for management of access key used for locker access
EP3740630A1 (en) Systems and methods for controlling access to a secured space
CN104484925A (en) Intelligent lock control system
CN102831721A (en) Intelligent safe deposit box system and control method
CN201066914Y (en) Theft prevention mobile phone for controlling shut down, battery disassembly and mobile phone card
WO2018075153A1 (en) Network connectivity module for electro-mechanical locks
CN102903167A (en) Management system for renting and selling houses
CN105869246A (en) Intelligent unlocking system and method thereof
CN205713524U (en) A kind of dynamic password electric padlock
GB2443633A (en) Remotely enabled lock
JP2002528801A (en) Remote access and security system
JP2002288750A (en) Keyless system
US9437059B2 (en) Gatekeeper lock system
JP6913926B2 (en) Key system, key case
CN202711348U (en) Door opened and closed under remote control
CN105141795B (en) A kind of unlocking method and system waiting for tripper
CN110599636A (en) Customs lock, customs lock key, and customs lock opening and closing method and system
CN202148739U (en) Unlocking management system
CN103617661A (en) Wireless unlocking system and unlocking method thereof
CN111667331A (en) House watching system applied to house leasing or selling
CN206323407U (en) Switching device during a kind of pact of distal end non-networked AES agreement
US11893846B2 (en) Devices, systems, apparatuses, and methods for smart cam locks and key lock boxes
EP4031734A1 (en) A method and system for locking and unlocking
JP2010161911A (en) Charging cable for electric vehicle

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13791518

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13791518

Country of ref document: EP

Kind code of ref document: A1