US20220301369A1 - Unlocking lock on device based on ultra-wideband location tracking - Google Patents
Unlocking lock on device based on ultra-wideband location tracking Download PDFInfo
- Publication number
- US20220301369A1 US20220301369A1 US17/204,617 US202117204617A US2022301369A1 US 20220301369 A1 US20220301369 A1 US 20220301369A1 US 202117204617 A US202117204617 A US 202117204617A US 2022301369 A1 US2022301369 A1 US 2022301369A1
- Authority
- US
- United States
- Prior art keywords
- lock
- gui
- uwb
- instructions
- executable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
- G06F1/1698—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675 the I/O peripheral being a sending/receiving arrangement to establish a cordless communication link, e.g. radio or infrared link, integrated cellular phone
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1632—External expansion units, e.g. docking stations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00912—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00944—Details of construction or manufacture
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/7163—Spread spectrum techniques using impulse radio
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00317—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having only one limited data transmission range
- G07C2009/00333—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having only one limited data transmission range and the lock having more than one limited data transmission ranges
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/60—Indexing scheme relating to groups G07C9/00174 - G07C9/00944
- G07C2209/63—Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B2201/00—Indexing scheme relating to details of transmission systems not covered by a single group of H04B3/00 - H04B13/00
- H04B2201/69—Orthogonal indexing scheme relating to spread spectrum techniques in general
- H04B2201/7163—Orthogonal indexing scheme relating to impulse radio
- H04B2201/71634—Applied to ranging
Definitions
- the disclosure below relates to technically inventive, non-routine solutions that are necessarily rooted in computer technology and that produce concrete technical improvements.
- the disclosure below relates to techniques for unlocking a lock on a device based on ultra-wideband (UWB) location tracking.
- UWB ultra-wideband
- a first device includes at least one processor, an ultra-wideband (UWB) transceiver accessible to the at least one processor, and storage accessible to the at least one processor.
- the storage includes instructions executable by the at least one processor to track a location of a second device different from the first device using one or more UWB signals received from the second device via the UWB transceiver.
- the instructions are also executable to unlock a hardware lock controlled by the first device responsive to a determination, based on the tracking of the location of the second device, that the second device is within a predetermined area of the first device.
- the hardware lock may also be unlockable using a physical, metallic key.
- the hardware lock may be located on the first device and may be controllable electronically to physically actuate at least one element within the hardware lock to unlock the hardware lock.
- the predetermined area may be an area in a particular direction relative to the first device.
- the predetermined area may be an area extending from a particular side of the first device but not all sides of the first device.
- the instructions may be executable to unlock the hardware lock responsive to a determination, based on the tracking of the location of the second device, that the second device is within the predetermined area of the first device for at least a threshold non-zero amount of time.
- the instructions may also be executable to determine that the second device is currently being used by a user and, responsive to the determination that the second device is currently being used by the user, lock the hardware lock notwithstanding the second device being currently within the predetermined area.
- the instructions may be executable to access first user identification (ID) data in local storage of the first device and determine whether second user ID data received via the one or more UWB signals from the second device matches the first user ID data. Responsive to the determination that the second device is within the predetermined area and based on the first and second user ID data matching, the instructions may be executable to unlock the hardware lock controlled by the first device.
- ID user identification
- the instructions may be executable to unlock the hardware lock controlled by the first device responsive to the determination and based on receipt of a software key to unlock the hardware lock.
- the software key may be received from the second device via the UWB transceiver.
- a method in another aspect, includes tracking, using a first device, a location of a second device different from the first device using ultra-wideband (UWB) communication. The method also includes unlocking a physical lock controlled by the first device based on the tracking of the location of the second device.
- UWB ultra-wideband
- the physical lock may provide access to the inside of a compartment in which a computer is houseable, where the computer may be different from the first device.
- the method may include unlocking the physical lock based on the tracking of the location of the second device and based on receipt of login information to unlock the physical lock.
- the login information may be provided via one or more UWB signals from the second device used as part of the tracking.
- the method may include tracking, using the first device, the location of the second device using UWB communication to determine that the second device is within a predetermined area of the first device. Based on determining that the second device is within the predetermined area of the first device, the method may include unlocking the physical lock controlled by the first device.
- At least one computer readable storage medium that is not a transitory signal includes instructions executable by at least one processor to track a location of a first device relative to a second device using ultra-wideband (UWB) communication.
- the instructions are also executable to unlock a lock of the second device based on the tracking of the location of the first device, where the second device may include a compartment secured by the lock.
- UWB ultra-wideband
- the lock may be a tangible lock on the second device that secures the compartment. Additionally, in some example implementations the instructions may be executable to unlock a software lock for the second device and unlock the tangible lock on the second device based on the tracking of the location of the first device.
- the instructions may be executable to track the location of the first device using UWB communication to determine that the first device is moving away from the second device.
- the instructions may be executable to actuate a locking mechanism in the lock to place the lock in a locked configuration based on the determination that the first device is moving away from the second device.
- the instructions may be executable to permit the second device to be powered down responsive to a determination that the first device is within a predetermined area of a particular side of the second device.
- the predetermined area may be an area in front of a power switch for the second device, where the power switch may be located on the particular side.
- the instructions may also be executable to deny a request to power down the second device responsive to a determination that the first device is not within the predetermined area of the particular side of the second device.
- FIG. 1 is a block diagram of an example system consistent with present principles
- FIG. 2 is a block diagram of an example network of devices consistent with present principles
- FIG. 3 is an example illustration of an end-user with a smartphone approaching another device with an inner compartment to unlock a hardware lock of the other device based on UWB location tracking consistent with present principles
- FIG. 4 illustrates example logic in example flow chart format that may be executed by a device performing UWB location tracking consistent with present principles
- FIGS. 5 and 7 show example graphical user interfaces (GUIs) that may be presented at various times based on UWB location tracking consistent with present principles;
- FIG. 6 shows an example GUI that may be presented to configure one or more settings of a device to operate consistent with present principles
- FIG. 8 shows an example illustration of UWB location accuracy consistent with present principles.
- UWB-based smart hardware lock for a device.
- UWB-enabled devices such as smartphones with UWB transceivers may be used to not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position such as at the keyboard for the locking device when activating the locking device and/or when providing a password for an additional software lock of the locking device.
- the locking device may also validate that the user is at another expected position such as the rear of the device near its power switch when attempting to deactivate the locking device. These things may be done based on use of UWB by the locking device to detect both direction and distance to the user's personal device such as their smartphone.
- a system may include server and client components, connected over a network such that data may be exchanged between the client and server components.
- the client components may include one or more computing devices including televisions (e.g., smart TVs, Internet-enabled TVs), computers such as desktops, laptops and tablet computers, so-called convertible devices (e.g., having a tablet configuration and laptop configuration), and other mobile devices including smart phones.
- These client devices may employ, as non-limiting examples, operating systems from Apple Inc. of Cupertino Calif., Google Inc. of Mountain View, Calif., or Microsoft Corp. of Redmond, Wash. A Unix® or similar such as Linux® operating system may be used.
- These operating systems can execute one or more browsers such as a browser made by Microsoft or Google or Mozilla or another browser program that can access web pages and applications hosted by Internet servers over a network such as the Internet, a local intranet, or a virtual private network.
- instructions refer to computer-implemented steps for processing information in the system. Instructions can be implemented in software, firmware or hardware, or combinations thereof and include any type of programmed step undertaken by components of the system; hence, illustrative components, blocks, modules, circuits, and steps are sometimes set forth in terms of their functionality.
- a processor may be any general-purpose single- or multi-chip processor that can execute logic by means of various lines such as address lines, data lines, and control lines and registers and shift registers. Moreover, any logical blocks, modules, and circuits described herein can be implemented or performed with a general-purpose processor, a digital signal processor (DSP), a field programmable gate array (FPGA) or other programmable logic device such as an application specific integrated circuit (ASIC), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
- DSP digital signal processor
- FPGA field programmable gate array
- ASIC application specific integrated circuit
- a processor can also be implemented by a controller or state machine or a combination of computing devices.
- the methods herein may be implemented as software instructions executed by a processor, suitably configured application specific integrated circuits (ASIC) or field programmable gate array (FPGA) modules, or any other convenient manner as would be appreciated by those skilled in those art.
- the software instructions may also be embodied in a non-transitory device that is being vended and/or provided that is not a transitory, propagating signal and/or a signal per se (such as a hard disk drive, CD ROM, or Flash drive).
- the software code instructions may also be downloaded over the Internet. Accordingly, it is to be understood that although a software application for undertaking present principles may be vended with a device such as the system 100 described below, such an application may also be downloaded from a server to a device over a network such as the Internet.
- Software modules and/or applications described by way of flow charts and/or user interfaces herein can include various sub-routines, procedures, etc. Without limiting the disclosure, logic stated to be executed by a particular module can be redistributed to other software modules and/or combined together in a single module and/or made available in a shareable library.
- Logic when implemented in software can be written in an appropriate language such as but not limited to hypertext markup language (HTML)-5, Java®/JavaScript, C# or C++, and can be stored on or transmitted from a computer-readable storage medium such as a random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), a hard disk drive or solid state drive, compact disk read-only memory (CD-ROM) or other optical disk storage such as digital versatile disc (DVD), magnetic disk storage or other magnetic storage devices including removable thumb drives, etc.
- HTTP hypertext markup language
- ROM read-only memory
- EEPROM electrically erasable programmable read-only memory
- CD-ROM compact disk read-only memory
- DVD digital versatile disc
- magnetic disk storage or other magnetic storage devices including removable thumb drives, etc.
- a processor can access information over its input lines from data storage, such as the computer readable storage medium, and/or the processor can access information wirelessly from an Internet server by activating a wireless transceiver to send and receive data.
- Data typically is converted from analog signals to digital by circuitry between the antenna and the registers of the processor when being received and from digital to analog when being transmitted.
- the processor then processes the data through its shift registers to output calculated data on output lines, for presentation of the calculated data on the device.
- a system having at least one of A, B, and C includes systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.
- circuitry includes all levels of available integration, e.g., from discrete logic circuits to the highest level of circuit integration such as VLSI and includes programmable logic components programmed to perform the functions of an embodiment as well as general-purpose or special-purpose processors programmed with instructions to perform those functions.
- the system 100 may be a desktop computer system, such as one of the ThinkCentre® or ThinkPad® series of personal computers sold by Lenovo (US) Inc. of Morrisville, N.C., or a workstation computer, such as the ThinkStation®, which are sold by Lenovo (US) Inc. of Morrisville, N.C.; however, as apparent from the description herein, a client device, a server or other machine in accordance with present principles may include other features or only some of the features of the system 100 .
- the system 100 may be, e.g., a game console such as XBOX®, and/or the system 100 may include a mobile communication device such as a mobile telephone, notebook computer, and/or other portable computerized device.
- the system 100 may include a so-called chipset 110 .
- a chipset refers to a group of integrated circuits, or chips, that are designed to work together. Chipsets are usually marketed as a single product (e.g., consider chipsets marketed under the brands INTEL®, AMD®, etc.).
- the chipset 110 has a particular architecture, which may vary to some extent depending on brand or manufacturer.
- the architecture of the chipset 110 includes a core and memory control group 120 and an I/O controller hub 150 that exchange information (e.g., data, signals, commands, etc.) via, for example, a direct management interface or direct media interface (DMI) 142 or a link controller 144 .
- DMI direct management interface or direct media interface
- the DMI 142 is a chip-to-chip interface (sometimes referred to as being a link between a “northbridge” and a “southbridge”).
- the core and memory control group 120 include one or more processors 122 (e.g., single core or multi-core, etc.) and a memory controller hub 126 that exchange information via a front side bus (FSB) 124 .
- processors 122 e.g., single core or multi-core, etc.
- memory controller hub 126 that exchange information via a front side bus (FSB) 124 .
- FSA front side bus
- various components of the core and memory control group 120 may be integrated onto a single processor die, for example, to make a chip that supplants the “northbridge” style architecture.
- the memory controller hub 126 interfaces with memory 140 .
- the memory controller hub 126 may provide support for DDR SDRAM memory (e.g., DDR, DDR2, DDR3, etc.).
- DDR SDRAM memory e.g., DDR, DDR2, DDR3, etc.
- the memory 140 is a type of random-access memory (RAM). It is often referred to as “system memory.”
- the memory controller hub 126 can further include a low-voltage differential signaling interface (LVDS) 132 .
- the LVDS 132 may be a so-called LVDS Display Interface (LDI) for support of a display device 192 (e.g., a CRT, a flat panel, a projector, a touch-enabled light emitting diode display or other video display, etc.).
- a block 138 includes some examples of technologies that may be supported via the LVDS interface 132 (e.g., serial digital video, HDMI/DVI, display port).
- the memory controller hub 126 also includes one or more PCI-express interfaces (PCI-E) 134 , for example, for support of discrete graphics 136 .
- PCI-E PCI-express interfaces
- the memory controller hub 126 may include a 16-lane (x16) PCI-E port for an external PCI-E-based graphics card (including, e.g., one of more GPUs).
- An example system may include AGP or PCI-E for support of graphics.
- the I/O hub controller 150 can include a variety of interfaces.
- the example of FIG. 1 includes a SATA interface 151 , one or more PCI-E interfaces 152 (optionally one or more legacy PCI interfaces), one or more USB interfaces 153 , a LAN interface 154 (more generally a network interface for communication over at least one network such as the Internet, a WAN, a LAN, a Bluetooth network using Bluetooth 5.0 communication, etc.
- the I/O hub controller 150 may include integrated gigabit Ethernet controller lines multiplexed with a PCI-E interface port. Other network features may operate independent of a PCI-E interface.
- the interfaces of the I/O hub controller 150 may provide for communication with various devices, networks, etc.
- the SATA interface 151 provides for reading, writing, or reading and writing information on one or more drives 180 such as HDDs, SDDs or a combination thereof, but in any case, the drives 180 are understood to be, e.g., tangible computer readable storage mediums that are not transitory, propagating signals.
- the I/O hub controller 150 may also include an advanced host controller interface (AHCI) to support one or more drives 180 .
- AHCI advanced host controller interface
- the PCI-E interface 152 allows for wireless connections 182 to devices, networks, etc.
- the USB interface 153 provides for input devices 184 such as keyboards (KB), mice and various other devices (e.g., cameras, phones, storage, media players, etc.).
- the LPC interface 170 provides for use of one or more ASICs 171 , a trusted platform module (TPM) 172 , a super I/O 173 , a firmware hub 174 , BIOS support 175 as well as various types of memory 176 such as ROM 177 , Flash 178 , and non-volatile RAM (NVRAM) 179 .
- TPM trusted platform module
- this module may be in the form of a chip that can be used to authenticate software and hardware devices.
- a TPM may be capable of performing platform authentication and may be used to verify that a system seeking access is the expected system.
- the system 100 upon power on, may be configured to execute boot code 190 for the BIOS 168 , as stored within the SPI Flash 166 , and thereafter processes data under the control of one or more operating systems and application software (e.g., stored in system memory 140 ).
- An operating system may be stored in any of a variety of locations and accessed, for example, according to instructions of the BIOS 168 .
- the system 100 may include an ultra-wideband (UWB) transceiver 191 configured to transmit and receive data using UWB signals and UWB communication protocol(s), such as protocols set forth by the FiRa Consortium.
- UWB may use low energy, short-range, high-bandwidth pulse communication over a relatively large portion of the radio spectrum.
- an ultra-wideband signal/pulse may be established by a radio signal with fractional bandwidth greater than 20% and/or a bandwidth greater than 500 MHz.
- UWB communication may occur by using multiple frequencies (e.g., concurrently) in the frequency range from 3.1 to 10.6 GHz in certain examples.
- the transceiver 191 itself may include one or more Vivaldi antennas and/or a MIMO (multiple-input and multiple-output) distributed antenna system, for example.
- MIMO multiple-input and multiple-output
- various UWB algorithms, time difference of arrival (TDoA) algorithms, and/or angle of arrival (AoA) algorithms may be used for system 100 to determine the distance to and location of another UWB transceiver on another device that is in communication with the UWB transceiver on the system 100 to thus track the real-time location of the other device.
- the system 100 may include a gyroscope that senses and/or measures the orientation of the system 100 and provides related input to the processor 122 , as well as an accelerometer that senses acceleration and/or movement of the system 100 and provides related input to the processor 122 . Still further, the system 100 may include an audio receiver/microphone that provides input from the microphone to the processor 122 based on audio that is detected, such as via a user providing audible input to the microphone. The system 100 may also include a camera that gathers one or more images and provides the images and related input to the processor 122 .
- the camera may be a thermal imaging camera, an infrared (IR) camera, a digital camera such as a webcam, a three-dimensional (3D) camera, and/or a camera otherwise integrated into the system 100 and controllable by the processor 122 to gather still images and/or video.
- the system 100 may include a global positioning system (GPS) transceiver that is configured to communicate with at least one satellite to receive/identify geographic position information and provide the geographic position information to the processor 122 .
- GPS global positioning system
- another suitable position receiver other than a GPS receiver may be used in accordance with present principles to determine the location of the system 100 .
- an example client device or other machine/computer may include fewer or more features than shown on the system 100 of FIG. 1 .
- the system 100 is configured to undertake present principles.
- example devices are shown communicating over a network 200 such as the Internet in accordance with present principles. It is to be understood that each of the devices described in reference to FIG. 2 may include at least some of the features, components, and/or elements of the system 100 described above. Indeed, any of the devices disclosed herein may include at least some of the features, components, and/or elements of the system 100 described above.
- FIG. 2 shows a notebook computer and/or convertible computer 202 , a desktop computer 204 , a wearable device 206 such as a smart watch, a smart television (TV) 208 , a smart phone 210 , a tablet computer 212 , and a server 214 such as an Internet server that may provide cloud storage accessible to the devices 202 - 212 .
- the devices 202 - 214 may be configured to communicate with each other over the network 200 and/or UWB to undertake present principles.
- a hardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock.
- a processor in the device 306 such as the device's central processing unit (CPU) or another processor may track the location of the phone 304 in real time using UWB as the phone 304 moves about the environment to determine whether to unlock the lock 309 .
- the phone 304 may track its own location with respect to the device 306 based on UWB signals transmitted between the two devices to then send a hardware unlock command to the device 306 responsive one or more conditions being met as set forth further below.
- the device 306 may unlock the hardware lock 309 without a metallic, tangible key or other non-electronic method being used to unlock the lock 309 .
- the area 310 as illustrated may be virtual in that the user 302 would not be able to see the cone of the area 310 but the phone 304 entering the area 310 as tracked by the device 306 may still be a trigger for the device 306 to nonetheless unlock the hardware lock 309 .
- the vertex of the cone for the area 310 may extend outward from a center point of the lock 309 , for example, so that the area 310 does not include any area behind the device 306 as positioned on the table 308 , with it being understood that the lock 309 is located on the front face of the device 306 .
- the device 306 may require that the phone 304 be located continuously in the area 310 for at least a threshold non-zero amount of time so that the phone 304 entering the area 310 for a mere moment does not trigger an unintentional unlocking of the hardware lock 309 . To accomplish this, three seconds may be sufficient for the threshold amount of time, for example.
- the device 306 may track the real-time current location of the phone 304 to identify a motion vector from the smartphone 304 toward the device 306 that indicates motion of the phone 304 with respect to the front of the device 306 bearing the lock 309 .
- the motion vector may need to satisfy a threshold to trigger the device 306 to unlock the lock 309 , such as for example the motion vector indicating motion of the phone 304 toward the front vertical face of the device 306 bearing the lock 309 from a direction in front of the front face, such that the motion is orthogonal to the front face plus or minus fifteen degrees in the X and/or Y dimension.
- motion vector tracking may be combined with use of the area 310 so that both conditions would have to be met in order to trigger the unlocking of the lock 309 . This might be helpful where, for example, the user 302 walks sideways in front of the device 306 while doing something else and the phone 304 temporarily enters the area 310 , but the motion vector indicates motion parallel to the front face of the device 306 (or at least not orthogonal to the front face plus/minus fifteen degrees). Thus, a false trigger would be averted.
- the cone of the area 310 may be divided as shown by line 312 so that satisfying both the motion vector condition and area condition may be required to trigger unlocking of the lock 309 for the outer frustoconical portion 314 of the area 310 , but the device 304 entering the inner conical portion 316 of the area 310 regardless of motion vector may also still trigger unlocking of the lock 309 .
- the device 306 itself, note that it may be any number of different types of devices but, in certain examples, may be an electronic safe or other structure having metallic outer walls to prevent penetration of the walls as well as to prevent access to an inner compartment 318 of the device 306 save through a door on the front face that is lockable and unlockable via the lock 309 .
- the other device 320 might be, for example, an Internet of things (IoT) device, edge device (e.g., router/modem), smart cash register, personal computer, or server.
- IoT Internet of things
- edge device e.g., router/modem
- smart cash register personal computer, or server.
- the outer ports in turn may be coupled to other devices or components outside the device 306 via a respective USB connection, ethernet connection, a power outlet connection (via a power adapter connected to the outer power port), etc.
- the device 320 may remain both networked to the outside and secured within the device 306 until an authorized user has his/her phone with appropriate access permissions located within the area 310 to unlock the lock 309 and thus the door of the device 306 to gain access to the compartment and device 320 .
- an outer back side of the device 306 may bear an on/off hardware switch 322 that a person may flip on or off to respectively power on or power off/down the device 306 , and/or to respectively power on or power off/down the device 320 inside.
- an authorized device such as an authorized user's smartphone
- the predetermined area 324 extending from an opposite side of the device 306 than the area 310 , it may be similar in many other respects such as being virtual so that the user 302 would not be able to see the cone of the area 324 but the phone 304 entering the area 324 as tracked by the device 306 via UWB location tracking may still be a trigger for the device 306 .
- the trigger is to permit the device 306 and/or device 320 to be powered down via actuation of the switch 322 .
- the vertex of the cone for the area 324 may extend from a center point of the switch 322 , for example, so that the area 324 does not include any overlapping area as the area 310 .
- the device 306 permit itself and/or the device 320 to be powered off or down via actuation of the switch 322 by an authorized user.
- This may be helpful so that only authorized users with UWB-enabled devices can power down the device 306 and/or 320 , which might be important if the device 320 were used for security monitoring in a store or held access to secure information that is to be available to other devices more or less all the time.
- powering off a device is one example of a device being powered down.
- Other examples of powering down a device include placing the device in a sleep state or hibernate state.
- FIG. 4 it shows example logic that may be executed by a first device such as the system 100 or device 306 consistent with present principles. Note that while the logic of FIG. 4 is shown in flow chart format, state logic or other suitable logic may also be used.
- the first device may track a location of a second device using UWB signals received in real time from the second device.
- the second device might be the smartphone 304 from the example above or another type of personal device such as a wearable smartwatch, tablet computer, electronic glasses, or augmented reality (AR) or virtual reality (VR) headset, etc.
- AR augmented reality
- VR virtual reality
- the logic may then proceed to decision diamond 402 where the first device may determine whether the second device is within a predetermined area of the first device to unlock a hardware lock of the first device, such as the area 310 described above (e.g., for a threshold amount of time). An affirmative determination may cause the logic to proceed to block 410 as will be described shortly. However, first note that responsive to a negative determination at diamond 402 , the logic may instead proceed to decision diamond 404 .
- the first device may determine whether the second device is inside of another predetermined area of the first device within which an authorized user's personal device is to be in order to permit a power down of the first device or other device inside of it (e.g., the device 320 ).
- the other predetermined area may be the area 324 from the example of FIG. 3 above.
- the second device may in some examples be required to be within the area continuously for a threshold amount of time for an affirmative determination.
- the logic may proceed to block 408 where the first device may permit a user command to power down to be executed to in turn power down the first device itself.
- the logic may instead proceed to block 406 where the first device may deny the request to power down the first device and instead keep the first device powered on as it was prior to receipt of the user command (e.g., that might have been provided via a hardware power button or switch like the switch 322 ). Then from either of blocks 406 or 408 , the logic may return to block 400 and proceed therefrom.
- the first device may unlock a hardware lock on the first device, such as the lock 309 described above.
- the unlocking may be performed based on UWB location tracking simply indicating that the second device is within the corresponding predetermined area (e.g., area 310 ).
- the unlocking may be performed based on the second device not only being within the corresponding predetermined area but also transmitting valid login information that is received by the first device via the same or different UWB signals that were used for the location tracking itself in order to unlock an additional software lock for the first device that requires valid user authentication credentials.
- the login information may be received via other wireless signals from the second device such as Bluetooth or Wi-Fi signals, if desired.
- a copy of the login information itself may be stored in secure local storage of the second device, e.g., by system administrator that only gives certain users access to unlock the first device's lock via their respective personal devices.
- the login information may include user identification (ID) data such as a username or email address so that, at block 410 , the first device may access another copy of user ID data in local storage of the first device and determine whether the received user ID data matches the local copy of the user ID data.
- the login information may also include a software key such as a password or numerical passcode or even randomized key like an encryption key so that, also at block 410 , the first device may compare the received software key to corresponding software key data also stored locally to determine whether a match exists to thus authenticate the associated user.
- the prestored user ID data and software key for comparison to the login information received from the second device may also be stored remotely in secure cloud storage, if desired.
- the first device may electronically control its hardware lock, e.g., by physically actuating at least one element within the hardware lock to unlock the hardware lock.
- the first device may control an inner locking mechanism like pins in the lock's cylinder by actuating a motor inside the lock to place the pins in an unlocked configuration so that latch or bolt may be moved by the user to open the first device's door to reach its inner compartment.
- the first device may also actuate the latch or bolt itself via a motor so that the door pops open automatically.
- the logic may proceed to decision diamond 412 .
- the first device may determine whether the second device itself is currently in use by the user (e.g., for at least a threshold amount of time such as five seconds to avoid false triggers). Whether the second device is currently in use may be determined based on paired Bluetooth or other communication between the two devices, for example. Or the second device may transmit, via UWB signals or other wireless signals, its current processes and/or device status to the first device.
- the second device currently being in use may include providing touch input to the display of the second device, the second device presenting audio visual content like an Internet video streamed to the second device, the second device's camera being currently in use, etc. Responsive to an affirmative determination at diamond 412 , the logic may proceed to block 414 where the first device may close its door protected by the lock (e.g., using a motor if the door is not already closed) and lock its hardware lock with the door closed to thus secure the compartment inside the first device (that again might house a separate computer or server).
- the lock e.g., using a motor if the door is not already closed
- lock e.g., using a motor if the door is not already closed
- the first device may do so at block 414 notwithstanding the second device being currently within the predetermined area for unlocking the hardware lock in order to secure the inner compartment of the first device while the user's attention is diverted elsewhere (to the second device in active use). Then once the display of the second device is powered off or the user otherwise stops using the second device, the first device may again unlock its hardware lock (assuming the second device is still within the predetermined area in front of the hardware lock, for example).
- the logic may instead proceed to decision diamond 416 .
- the first device may determine, based on UWB location tracking, whether the second device is now outside of the predetermined area for unlocking the hardware lock (e.g., for at least a threshold amount of time such as five seconds, to avoid false triggers again). Additionally, or alternatively, at diamond 416 the first device may determine whether a motion vector for the second device identified via UWB location tracking indicates motion away from the first device (e.g., in any direction), or motion away from the first device so long as not also within the inner conical portion 316 described above.
- the logic may revert back to diamond 412 and proceed therefrom. However, responsive to an affirmative determination at diamond 416 , the logic may instead proceed to block 414 as described above so that the first device may lock its hardware lock.
- GUI 500 may be presented on a display of the first device of FIG. 4 based on the first device unlocking its hardware lock based on UWB location tracking as set forth herein.
- the GUI 500 may include a prompt 502 indicating that the first device has unlocked its hardware lock based on a paired smartphone coming within a predetermined area in front of the first device.
- the GUI 500 may also include a selector 504 which may be selectable to command the first device to present another GUI from which one or more settings related to UWB location tracking for unlocking the hardware lock may be configured.
- FIG. 6 An example of such a settings GUI is shown in FIG. 6 .
- GUI 600 of FIG. 6 each of the options to be discussed below may be selected by directing touch or cursor input to the respective check box adjacent to the respective option.
- the GUI 600 may include a first option 602 that may be selectable to set or configure the first device to, in the future, perform UWB location tracking of other devices to determine whether to unlock the first device's hardware lock and/or permit execution of a power down command consistent with present principles.
- the option 602 may be selected to enable the device to execute the logic of FIG. 4 and/or present the GUI 500 of FIG. 5 or GUI 700 of FIG. 7 that will be described later.
- an option 604 may be presented on the GUI 600 .
- the option 604 may be selected to set or enable the first device of FIG. 4 to require an authorized personal device to be located within the predetermined area for unlocking the first device's hardware lock even when a metallic key is inserted into the lock's keyhole and turned to unlock the lock manually.
- option 604 may be selected to establish an even higher degree of security for accessing the first device's inner compartment to prevent unauthorized access to the compartment by a person who might have gained access to the metallic key but still does not possess a personal device that has been set with the appropriate access permissions.
- the GUI 600 may also include respective input boxes 608 , 610 , 612 at which the user may respectively enter respective numbers to establish the dimensions of one or both of the cones of the predetermined areas 310 , 324 as discussed above in relation to FIG. 3 .
- box 608 may be used to enter a number of feet for the first device to use for the length of the cone(s)
- box 610 may be used to enter a number of feet to use for the width of the cone(s) at their widest (e.g., at the respective cone's base or circular plane surface).
- box 612 may be used to enter a number of feet for the first device to use for the height of the cone(s) (e.g., again at the respective cone's base or circular plane surface).
- the cone(s) need not be symmetric in all examples, and further note that in some examples a predetermined area need not be cone-shaped at all.
- the predetermined areas may simply be boxes of a predetermined height, width, and length in front of and behind the first device.
- dimensions may be specified in feet according to the GUI 600 , other increments may also be used such as meters or centimeters.
- an input box 614 may be presented on the GUI 600 .
- the user may input a number into the box 614 in order to establish a threshold time during which another device in UWB communication with the first device is to be within the first device's predetermined area(s) before the first device unlocks its hardware lock and/or permits execution of a power down command.
- the GUI 600 may also include another input box 616 for the user to enter another number to establish a different threshold time after the other device leaves the predetermined area(s) for the first device to lock its hardware lock and/or disallow a power down command from being executed.
- the GUI 600 may include an option 618 that may be selected to set or enable the first device to lock its hardware lock if another device paired or communicating with it is in active use.
- the option 618 may be selected to set or configure the first device to specifically execute diamond 412 and block 414 as described above.
- the GUI 600 may also include an option 620 .
- the option 620 may be selected to specifically set or enable the first device to require another device to be within the predetermined area at the back of the first device for the first device to permit execution of a power down command.
- the option 620 may be selected to set or configure the first device to specifically execute steps 404 - 408 of FIG. 4 .
- FIG. 7 it shows another example GUI 700 that may be presented on the display of the first device of FIG. 4 consistent with present principles.
- the GUI 700 may be presented on the first device's display responsive to a determination that another device paired with the first device is actively in use as set forth above.
- the first device has locked its hardware lock.
- the GUI 700 may include a prompt 702 indicating that the first device has locked its hardware lock since the first device has identified another device paired with it (in this case, a smartphone) as being currently in use.
- the prompt 702 may also include instructions to put the other device down on a surface or turn off its display for the first device to unlock its hardware lock again.
- determining whether the other device has been put down on a surface may be based on orientation data transmitted wirelessly to the first device, as generated at the second device using its gyroscope or other orientation sensor. Orientation of the other device may also be determined based on UWB location tracking itself as the first device might determine based on the angle of arrival of UWB signals from the other device and the known location of UWB transceiver on the other device.
- FIG. 8 it shows an example illustration 800 of UWB location accuracy.
- a first device 802 that might be executing the logic of FIG. 4 may determine a bearing 806 to a second device 804 using UWB signal exchange, which may be accurate to plus/minus three degrees 808 or even less.
- Depth (distance) between the first device 802 and second device 804 may also be determined using UWB to plus/minus ten centimeters 810 or even less.
- the device 802 may determine the location of the device 804 relative to the device 802 with relatively high accuracy. So, for example, the device 802 may determine whether the second device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles.
- UWB-based unlocking of a given device's hardware lock and the permitting a power down command may be performed for multiple different end-users with various levels of permissions. For instance, suppose a first user and a second user each have their own smartphone for UWB location tracking and may report, via UWB signals, a device identification (ID) and/or login information for their respective smartphone so that the first device of FIG. 4 may track the different devices by device/user ID.
- ID device identification
- different rules or rule sets may be implemented for each user.
- one user might have administrator privileges for the first device and so when his/her respective smartphone is detected via UWB as being within a respective predetermined area, the first device may unlock its hardware lock or permit a power down command to be executed.
- the second user may have lesser privileges, where the second user's smartphone may be permitted to unlock the hardware lock when within that respective predetermined area but is still not permitted to power down the first device even if his/her smartphone is within the respective predetermined area for power down.
Abstract
In one aspect, a first device may include at least one processor, an ultra-wideband (UWB) transceiver accessible to the at least one processor, and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to track a location of a second device different from the first device using one or more UWB signals received from the second device via the UWB transceiver. The instructions may also be executable to unlock a hardware lock controlled by the first device responsive to a determination, based on the tracking of the location of the second device, that the second device is within a predetermined area of the first device.
Description
- The disclosure below relates to technically inventive, non-routine solutions that are necessarily rooted in computer technology and that produce concrete technical improvements. In particular, the disclosure below relates to techniques for unlocking a lock on a device based on ultra-wideband (UWB) location tracking.
- As recognized herein, manual password entry and other methods for accessing an electronic device pose security risks as those methods are highly susceptible to hacking and data leaks. There are currently no adequate solutions to the foregoing computer-related, technological problem.
- Accordingly, in one aspect a first device includes at least one processor, an ultra-wideband (UWB) transceiver accessible to the at least one processor, and storage accessible to the at least one processor. The storage includes instructions executable by the at least one processor to track a location of a second device different from the first device using one or more UWB signals received from the second device via the UWB transceiver. The instructions are also executable to unlock a hardware lock controlled by the first device responsive to a determination, based on the tracking of the location of the second device, that the second device is within a predetermined area of the first device.
- In some examples, the hardware lock may also be unlockable using a physical, metallic key.
- The hardware lock may be located on the first device and may be controllable electronically to physically actuate at least one element within the hardware lock to unlock the hardware lock.
- Still further, in certain example implementations the predetermined area may be an area in a particular direction relative to the first device. In addition to or in lieu of that, the predetermined area may be an area extending from a particular side of the first device but not all sides of the first device.
- Additionally, if desired the instructions may be executable to unlock the hardware lock responsive to a determination, based on the tracking of the location of the second device, that the second device is within the predetermined area of the first device for at least a threshold non-zero amount of time.
- As another example, the instructions may also be executable to determine that the second device is currently being used by a user and, responsive to the determination that the second device is currently being used by the user, lock the hardware lock notwithstanding the second device being currently within the predetermined area.
- Still further, in certain example embodiments the instructions may be executable to access first user identification (ID) data in local storage of the first device and determine whether second user ID data received via the one or more UWB signals from the second device matches the first user ID data. Responsive to the determination that the second device is within the predetermined area and based on the first and second user ID data matching, the instructions may be executable to unlock the hardware lock controlled by the first device.
- Still further, in some examples the instructions may be executable to unlock the hardware lock controlled by the first device responsive to the determination and based on receipt of a software key to unlock the hardware lock. The software key may be received from the second device via the UWB transceiver.
- In another aspect, a method includes tracking, using a first device, a location of a second device different from the first device using ultra-wideband (UWB) communication. The method also includes unlocking a physical lock controlled by the first device based on the tracking of the location of the second device.
- In certain examples, the physical lock may provide access to the inside of a compartment in which a computer is houseable, where the computer may be different from the first device.
- Still further, in some example implementations the method may include unlocking the physical lock based on the tracking of the location of the second device and based on receipt of login information to unlock the physical lock. The login information may be provided via one or more UWB signals from the second device used as part of the tracking.
- Additionally, in some examples the method may include tracking, using the first device, the location of the second device using UWB communication to determine that the second device is within a predetermined area of the first device. Based on determining that the second device is within the predetermined area of the first device, the method may include unlocking the physical lock controlled by the first device.
- In still another aspect, at least one computer readable storage medium (CRSM) that is not a transitory signal includes instructions executable by at least one processor to track a location of a first device relative to a second device using ultra-wideband (UWB) communication. The instructions are also executable to unlock a lock of the second device based on the tracking of the location of the first device, where the second device may include a compartment secured by the lock.
- The lock may be a tangible lock on the second device that secures the compartment. Additionally, in some example implementations the instructions may be executable to unlock a software lock for the second device and unlock the tangible lock on the second device based on the tracking of the location of the first device.
- Still further, in some example embodiments the instructions may be executable to track the location of the first device using UWB communication to determine that the first device is moving away from the second device. In these embodiments, the instructions may be executable to actuate a locking mechanism in the lock to place the lock in a locked configuration based on the determination that the first device is moving away from the second device.
- Additionally, if desired the instructions may be executable to permit the second device to be powered down responsive to a determination that the first device is within a predetermined area of a particular side of the second device. The predetermined area may be an area in front of a power switch for the second device, where the power switch may be located on the particular side. The instructions may also be executable to deny a request to power down the second device responsive to a determination that the first device is not within the predetermined area of the particular side of the second device.
- The details of present principles, both as to their structure and operation, can best be understood in reference to the accompanying drawings, in which like reference numerals refer to like parts, and in which:
-
FIG. 1 is a block diagram of an example system consistent with present principles; -
FIG. 2 is a block diagram of an example network of devices consistent with present principles; -
FIG. 3 is an example illustration of an end-user with a smartphone approaching another device with an inner compartment to unlock a hardware lock of the other device based on UWB location tracking consistent with present principles; -
FIG. 4 illustrates example logic in example flow chart format that may be executed by a device performing UWB location tracking consistent with present principles; -
FIGS. 5 and 7 show example graphical user interfaces (GUIs) that may be presented at various times based on UWB location tracking consistent with present principles; -
FIG. 6 shows an example GUI that may be presented to configure one or more settings of a device to operate consistent with present principles; and -
FIG. 8 shows an example illustration of UWB location accuracy consistent with present principles. - Among other things, the detailed description below relates to an UWB-based smart hardware lock for a device. UWB-enabled devices such as smartphones with UWB transceivers may be used to not only validate that an authorized user is present in proximity to the locking device, but that the user is at a specific expected position such as at the keyboard for the locking device when activating the locking device and/or when providing a password for an additional software lock of the locking device. The locking device may also validate that the user is at another expected position such as the rear of the device near its power switch when attempting to deactivate the locking device. These things may be done based on use of UWB by the locking device to detect both direction and distance to the user's personal device such as their smartphone.
- Prior to delving further into the details of the instant techniques, note with respect to any computer systems discussed herein that a system may include server and client components, connected over a network such that data may be exchanged between the client and server components. The client components may include one or more computing devices including televisions (e.g., smart TVs, Internet-enabled TVs), computers such as desktops, laptops and tablet computers, so-called convertible devices (e.g., having a tablet configuration and laptop configuration), and other mobile devices including smart phones. These client devices may employ, as non-limiting examples, operating systems from Apple Inc. of Cupertino Calif., Google Inc. of Mountain View, Calif., or Microsoft Corp. of Redmond, Wash. A Unix® or similar such as Linux® operating system may be used. These operating systems can execute one or more browsers such as a browser made by Microsoft or Google or Mozilla or another browser program that can access web pages and applications hosted by Internet servers over a network such as the Internet, a local intranet, or a virtual private network.
- As used herein, instructions refer to computer-implemented steps for processing information in the system. Instructions can be implemented in software, firmware or hardware, or combinations thereof and include any type of programmed step undertaken by components of the system; hence, illustrative components, blocks, modules, circuits, and steps are sometimes set forth in terms of their functionality.
- A processor may be any general-purpose single- or multi-chip processor that can execute logic by means of various lines such as address lines, data lines, and control lines and registers and shift registers. Moreover, any logical blocks, modules, and circuits described herein can be implemented or performed with a general-purpose processor, a digital signal processor (DSP), a field programmable gate array (FPGA) or other programmable logic device such as an application specific integrated circuit (ASIC), discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can also be implemented by a controller or state machine or a combination of computing devices. Thus, the methods herein may be implemented as software instructions executed by a processor, suitably configured application specific integrated circuits (ASIC) or field programmable gate array (FPGA) modules, or any other convenient manner as would be appreciated by those skilled in those art. Where employed, the software instructions may also be embodied in a non-transitory device that is being vended and/or provided that is not a transitory, propagating signal and/or a signal per se (such as a hard disk drive, CD ROM, or Flash drive). The software code instructions may also be downloaded over the Internet. Accordingly, it is to be understood that although a software application for undertaking present principles may be vended with a device such as the system 100 described below, such an application may also be downloaded from a server to a device over a network such as the Internet.
- Software modules and/or applications described by way of flow charts and/or user interfaces herein can include various sub-routines, procedures, etc. Without limiting the disclosure, logic stated to be executed by a particular module can be redistributed to other software modules and/or combined together in a single module and/or made available in a shareable library.
- Logic when implemented in software, can be written in an appropriate language such as but not limited to hypertext markup language (HTML)-5, Java®/JavaScript, C# or C++, and can be stored on or transmitted from a computer-readable storage medium such as a random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), a hard disk drive or solid state drive, compact disk read-only memory (CD-ROM) or other optical disk storage such as digital versatile disc (DVD), magnetic disk storage or other magnetic storage devices including removable thumb drives, etc.
- In an example, a processor can access information over its input lines from data storage, such as the computer readable storage medium, and/or the processor can access information wirelessly from an Internet server by activating a wireless transceiver to send and receive data. Data typically is converted from analog signals to digital by circuitry between the antenna and the registers of the processor when being received and from digital to analog when being transmitted. The processor then processes the data through its shift registers to output calculated data on output lines, for presentation of the calculated data on the device.
- Components included in one embodiment can be used in other embodiments in any appropriate combination. For example, any of the various components described herein and/or depicted in the Figures may be combined, interchanged, or excluded from other embodiments.
- “A system having at least one of A, B, and C” (likewise “a system having at least one of A, B, or C” and “a system having at least one of A, B, C”) includes systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.
- The term “circuit” or “circuitry” may be used in the summary, description, and/or claims. As is well known in the art, the term “circuitry” includes all levels of available integration, e.g., from discrete logic circuits to the highest level of circuit integration such as VLSI and includes programmable logic components programmed to perform the functions of an embodiment as well as general-purpose or special-purpose processors programmed with instructions to perform those functions.
- Now specifically in reference to
FIG. 1 , an example block diagram of an information handling system and/or computer system 100 is shown that is understood to have a housing for the components described below. Note that in some embodiments the system 100 may be a desktop computer system, such as one of the ThinkCentre® or ThinkPad® series of personal computers sold by Lenovo (US) Inc. of Morrisville, N.C., or a workstation computer, such as the ThinkStation®, which are sold by Lenovo (US) Inc. of Morrisville, N.C.; however, as apparent from the description herein, a client device, a server or other machine in accordance with present principles may include other features or only some of the features of the system 100. Also, the system 100 may be, e.g., a game console such as XBOX®, and/or the system 100 may include a mobile communication device such as a mobile telephone, notebook computer, and/or other portable computerized device. - As shown in
FIG. 1 , the system 100 may include a so-called chipset 110. A chipset refers to a group of integrated circuits, or chips, that are designed to work together. Chipsets are usually marketed as a single product (e.g., consider chipsets marketed under the brands INTEL®, AMD®, etc.). - In the example of
FIG. 1 , the chipset 110 has a particular architecture, which may vary to some extent depending on brand or manufacturer. The architecture of the chipset 110 includes a core andmemory control group 120 and an I/O controller hub 150 that exchange information (e.g., data, signals, commands, etc.) via, for example, a direct management interface or direct media interface (DMI) 142 or alink controller 144. In the example ofFIG. 1 , theDMI 142 is a chip-to-chip interface (sometimes referred to as being a link between a “northbridge” and a “southbridge”). - The core and
memory control group 120 include one or more processors 122 (e.g., single core or multi-core, etc.) and a memory controller hub 126 that exchange information via a front side bus (FSB) 124. As described herein, various components of the core andmemory control group 120 may be integrated onto a single processor die, for example, to make a chip that supplants the “northbridge” style architecture. - The memory controller hub 126 interfaces with
memory 140. For example, the memory controller hub 126 may provide support for DDR SDRAM memory (e.g., DDR, DDR2, DDR3, etc.). In general, thememory 140 is a type of random-access memory (RAM). It is often referred to as “system memory.” - The memory controller hub 126 can further include a low-voltage differential signaling interface (LVDS) 132. The
LVDS 132 may be a so-called LVDS Display Interface (LDI) for support of a display device 192 (e.g., a CRT, a flat panel, a projector, a touch-enabled light emitting diode display or other video display, etc.). Ablock 138 includes some examples of technologies that may be supported via the LVDS interface 132 (e.g., serial digital video, HDMI/DVI, display port). The memory controller hub 126 also includes one or more PCI-express interfaces (PCI-E) 134, for example, for support ofdiscrete graphics 136. Discrete graphics using a PCI-E interface has become an alternative approach to an accelerated graphics port (AGP). For example, the memory controller hub 126 may include a 16-lane (x16) PCI-E port for an external PCI-E-based graphics card (including, e.g., one of more GPUs). An example system may include AGP or PCI-E for support of graphics. - In examples in which it is used, the I/
O hub controller 150 can include a variety of interfaces. The example ofFIG. 1 includes aSATA interface 151, one or more PCI-E interfaces 152 (optionally one or more legacy PCI interfaces), one ormore USB interfaces 153, a LAN interface 154 (more generally a network interface for communication over at least one network such as the Internet, a WAN, a LAN, a Bluetooth network using Bluetooth 5.0 communication, etc. under direction of the processor(s) 122), a general purpose I/O interface (GPIO) 155, a low-pin count (LPC)interface 170, apower management interface 161, aclock generator interface 162, an audio interface 163 (e.g., forspeakers 194 to output audio), a total cost of operation (TCO)interface 164, a system management bus interface (e.g., a multi-master serial computer bus interface) 165, and a serial peripheral flash memory/controller interface (SPI Flash) 166, which, in the example ofFIG. 1 , includes basic input/output system (BIOS) 168 andboot code 190. With respect to network connections, the I/O hub controller 150 may include integrated gigabit Ethernet controller lines multiplexed with a PCI-E interface port. Other network features may operate independent of a PCI-E interface. - The interfaces of the I/
O hub controller 150 may provide for communication with various devices, networks, etc. For example, where used, theSATA interface 151 provides for reading, writing, or reading and writing information on one ormore drives 180 such as HDDs, SDDs or a combination thereof, but in any case, thedrives 180 are understood to be, e.g., tangible computer readable storage mediums that are not transitory, propagating signals. The I/O hub controller 150 may also include an advanced host controller interface (AHCI) to support one or more drives 180. The PCI-E interface 152 allows forwireless connections 182 to devices, networks, etc. TheUSB interface 153 provides forinput devices 184 such as keyboards (KB), mice and various other devices (e.g., cameras, phones, storage, media players, etc.). - In the example of
FIG. 1 , theLPC interface 170 provides for use of one ormore ASICs 171, a trusted platform module (TPM) 172, a super I/O 173, afirmware hub 174,BIOS support 175 as well as various types ofmemory 176 such asROM 177,Flash 178, and non-volatile RAM (NVRAM) 179. With respect to theTPM 172, this module may be in the form of a chip that can be used to authenticate software and hardware devices. For example, a TPM may be capable of performing platform authentication and may be used to verify that a system seeking access is the expected system. - The system 100, upon power on, may be configured to execute
boot code 190 for the BIOS 168, as stored within theSPI Flash 166, and thereafter processes data under the control of one or more operating systems and application software (e.g., stored in system memory 140). An operating system may be stored in any of a variety of locations and accessed, for example, according to instructions of the BIOS 168. - Additionally, the system 100 may include an ultra-wideband (UWB)
transceiver 191 configured to transmit and receive data using UWB signals and UWB communication protocol(s), such as protocols set forth by the FiRa Consortium. As understood herein, UWB may use low energy, short-range, high-bandwidth pulse communication over a relatively large portion of the radio spectrum. Thus, for example, an ultra-wideband signal/pulse may be established by a radio signal with fractional bandwidth greater than 20% and/or a bandwidth greater than 500 MHz. UWB communication may occur by using multiple frequencies (e.g., concurrently) in the frequency range from 3.1 to 10.6 GHz in certain examples. - To transmit UWB signals consistent with present principles, the
transceiver 191 itself may include one or more Vivaldi antennas and/or a MIMO (multiple-input and multiple-output) distributed antenna system, for example. It is to be further understood that various UWB algorithms, time difference of arrival (TDoA) algorithms, and/or angle of arrival (AoA) algorithms may be used for system 100 to determine the distance to and location of another UWB transceiver on another device that is in communication with the UWB transceiver on the system 100 to thus track the real-time location of the other device. - Additionally, though not shown for simplicity, in some embodiments the system 100 may include a gyroscope that senses and/or measures the orientation of the system 100 and provides related input to the processor 122, as well as an accelerometer that senses acceleration and/or movement of the system 100 and provides related input to the processor 122. Still further, the system 100 may include an audio receiver/microphone that provides input from the microphone to the processor 122 based on audio that is detected, such as via a user providing audible input to the microphone. The system 100 may also include a camera that gathers one or more images and provides the images and related input to the processor 122. The camera may be a thermal imaging camera, an infrared (IR) camera, a digital camera such as a webcam, a three-dimensional (3D) camera, and/or a camera otherwise integrated into the system 100 and controllable by the processor 122 to gather still images and/or video. Also, the system 100 may include a global positioning system (GPS) transceiver that is configured to communicate with at least one satellite to receive/identify geographic position information and provide the geographic position information to the processor 122. However, it is to be understood that another suitable position receiver other than a GPS receiver may be used in accordance with present principles to determine the location of the system 100.
- It is to be understood that an example client device or other machine/computer may include fewer or more features than shown on the system 100 of
FIG. 1 . In any case, it is to be understood at least based on the foregoing that the system 100 is configured to undertake present principles. - Turning now to
FIG. 2 , example devices are shown communicating over anetwork 200 such as the Internet in accordance with present principles. It is to be understood that each of the devices described in reference toFIG. 2 may include at least some of the features, components, and/or elements of the system 100 described above. Indeed, any of the devices disclosed herein may include at least some of the features, components, and/or elements of the system 100 described above. -
FIG. 2 shows a notebook computer and/orconvertible computer 202, adesktop computer 204, awearable device 206 such as a smart watch, a smart television (TV) 208, asmart phone 210, atablet computer 212, and aserver 214 such as an Internet server that may provide cloud storage accessible to the devices 202-212. It is to be understood that the devices 202-214 may be configured to communicate with each other over thenetwork 200 and/or UWB to undertake present principles. - Now in reference to the
example illustration 300 shown inFIG. 3 , suppose an end-user 302 is holding his or hersmartphone 304 in one hand while walking toward adevice 306 that is sitting on a table 308 and has ahardware lock 309 such as a UWB-enabled smart door lock, deadbolt lock, barrel bolt lock, cam lock, or padlock. Based on UWB signals transmitted by thephone 304 to thedevice 306, a processor in thedevice 306 such as the device's central processing unit (CPU) or another processor may track the location of thephone 304 in real time using UWB as thephone 304 moves about the environment to determine whether to unlock thelock 309. However, also note that in some examples thephone 304 may track its own location with respect to thedevice 306 based on UWB signals transmitted between the two devices to then send a hardware unlock command to thedevice 306 responsive one or more conditions being met as set forth further below. - Thus, once the device 306 (or phone 304) determines that the
phone 304 has entered apredetermined area 310 in front of thedevice 306, thedevice 306 may unlock thehardware lock 309 without a metallic, tangible key or other non-electronic method being used to unlock thelock 309. Note that thearea 310 as illustrated may be virtual in that theuser 302 would not be able to see the cone of thearea 310 but thephone 304 entering thearea 310 as tracked by thedevice 306 may still be a trigger for thedevice 306 to nonetheless unlock thehardware lock 309. The vertex of the cone for thearea 310 may extend outward from a center point of thelock 309, for example, so that thearea 310 does not include any area behind thedevice 306 as positioned on the table 308, with it being understood that thelock 309 is located on the front face of thedevice 306. - In this way, only when the
user 302 approaches thedevice 306 from a particular direction relative to the front of thedevice 306 and enters the three-dimensional cone-shapedarea 310 does thedevice 306 unlock itshardware lock 309. This may be helpful so that unintentional triggers are not provided for unlocking thelock 309, like if theuser 302 were to be walking around the backside of thedevice 306 on another side of the table 308. Additionally, to further avoid false triggers, in some examples thedevice 306 may require that thephone 304 be located continuously in thearea 310 for at least a threshold non-zero amount of time so that thephone 304 entering thearea 310 for a mere moment does not trigger an unintentional unlocking of thehardware lock 309. To accomplish this, three seconds may be sufficient for the threshold amount of time, for example. - Also note that in addition to or in lieu of the
smartphone 304 entering thearea 310 to trigger thedevice 306 to unlock itshardware lock 309, still other conditions may be met to unlock thehardware lock 309. For example, again using UWB location tracking, thedevice 306 may track the real-time current location of thephone 304 to identify a motion vector from thesmartphone 304 toward thedevice 306 that indicates motion of thephone 304 with respect to the front of thedevice 306 bearing thelock 309. Again, to avoid false triggers, the motion vector may need to satisfy a threshold to trigger thedevice 306 to unlock thelock 309, such as for example the motion vector indicating motion of thephone 304 toward the front vertical face of thedevice 306 bearing thelock 309 from a direction in front of the front face, such that the motion is orthogonal to the front face plus or minus fifteen degrees in the X and/or Y dimension. - Additionally, note that in some examples to further avoid false triggers, motion vector tracking may be combined with use of the
area 310 so that both conditions would have to be met in order to trigger the unlocking of thelock 309. This might be helpful where, for example, theuser 302 walks sideways in front of thedevice 306 while doing something else and thephone 304 temporarily enters thearea 310, but the motion vector indicates motion parallel to the front face of the device 306 (or at least not orthogonal to the front face plus/minus fifteen degrees). Thus, a false trigger would be averted. - However, recognizing that there may still be instances where the
user 302 may walk from a side direction toward thedevice 306 with the intention to unlock thelock 309, in some examples the cone of thearea 310 may be divided as shown byline 312 so that satisfying both the motion vector condition and area condition may be required to trigger unlocking of thelock 309 for the outerfrustoconical portion 314 of thearea 310, but thedevice 304 entering the innerconical portion 316 of thearea 310 regardless of motion vector may also still trigger unlocking of thelock 309. - As for the
device 306 itself, note that it may be any number of different types of devices but, in certain examples, may be an electronic safe or other structure having metallic outer walls to prevent penetration of the walls as well as to prevent access to aninner compartment 318 of thedevice 306 save through a door on the front face that is lockable and unlockable via thelock 309. However, further note that there may still be USB ports, ethernet ports, power ports, and other ports on the outside of thedevice 306 that connect to respective ports on the inside of thedevice 306 to which anotherdevice 320 may couple from inside thecompartment 318. Theother device 320 might be, for example, an Internet of things (IoT) device, edge device (e.g., router/modem), smart cash register, personal computer, or server. The outer ports in turn may be coupled to other devices or components outside thedevice 306 via a respective USB connection, ethernet connection, a power outlet connection (via a power adapter connected to the outer power port), etc. In this way, with thelock 309 locking the door of thedevice 306 shut, thedevice 320 may remain both networked to the outside and secured within thedevice 306 until an authorized user has his/her phone with appropriate access permissions located within thearea 310 to unlock thelock 309 and thus the door of thedevice 306 to gain access to the compartment anddevice 320. - Still in reference to
FIG. 3 , note further that an outer back side of the device 306 (e.g., vertical side opposite the outer front side that bears the lock 309) may bear an on/offhardware switch 322 that a person may flip on or off to respectively power on or power off/down thedevice 306, and/or to respectively power on or power off/down thedevice 320 inside. However, rather than simply allowing any person to control the power state of thedevices 306 and/or 320 via theswitch 322, consistent with present principles an authorized device (such as an authorized user's smartphone) may be required to be located within a separatepredefined area 324 for a same or different threshold amount of time as thearea 310. - Aside from the
predetermined area 324 extending from an opposite side of thedevice 306 than thearea 310, it may be similar in many other respects such as being virtual so that theuser 302 would not be able to see the cone of thearea 324 but thephone 304 entering thearea 324 as tracked by thedevice 306 via UWB location tracking may still be a trigger for thedevice 306. However, here the trigger is to permit thedevice 306 and/ordevice 320 to be powered down via actuation of theswitch 322. The vertex of the cone for thearea 324 may extend from a center point of theswitch 322, for example, so that thearea 324 does not include any overlapping area as thearea 310. - In this way, only when the
user 302 approaches thedevice 306 from a particular direction relative to the back of thedevice 306 and enters the three-dimensional cone-shapedarea 324 may thedevice 306 permit itself and/or thedevice 320 to be powered off or down via actuation of theswitch 322 by an authorized user. This may be helpful so that only authorized users with UWB-enabled devices can power down thedevice 306 and/or 320, which might be important if thedevice 320 were used for security monitoring in a store or held access to secure information that is to be available to other devices more or less all the time. - Before moving on to
FIG. 4 , also note consistent with present principles that powering off a device is one example of a device being powered down. Other examples of powering down a device include placing the device in a sleep state or hibernate state. - Continuing the detailed description now in reference to
FIG. 4 , it shows example logic that may be executed by a first device such as the system 100 ordevice 306 consistent with present principles. Note that while the logic ofFIG. 4 is shown in flow chart format, state logic or other suitable logic may also be used. - Beginning at
block 400, the first device may track a location of a second device using UWB signals received in real time from the second device. The second device might be thesmartphone 304 from the example above or another type of personal device such as a wearable smartwatch, tablet computer, electronic glasses, or augmented reality (AR) or virtual reality (VR) headset, etc. - The logic may then proceed to
decision diamond 402 where the first device may determine whether the second device is within a predetermined area of the first device to unlock a hardware lock of the first device, such as thearea 310 described above (e.g., for a threshold amount of time). An affirmative determination may cause the logic to proceed to block 410 as will be described shortly. However, first note that responsive to a negative determination atdiamond 402, the logic may instead proceed todecision diamond 404. - At
diamond 404 the first device may determine whether the second device is inside of another predetermined area of the first device within which an authorized user's personal device is to be in order to permit a power down of the first device or other device inside of it (e.g., the device 320). For example, the other predetermined area may be thearea 324 from the example ofFIG. 3 above. And here too the second device may in some examples be required to be within the area continuously for a threshold amount of time for an affirmative determination. Then responsive to an affirmative determination atdiamond 404, the logic may proceed to block 408 where the first device may permit a user command to power down to be executed to in turn power down the first device itself. However, responsive to a negative determination atdiamond 404, the logic may instead proceed to block 406 where the first device may deny the request to power down the first device and instead keep the first device powered on as it was prior to receipt of the user command (e.g., that might have been provided via a hardware power button or switch like the switch 322). Then from either ofblocks - Now referring to the
aforementioned block 410, which again may be arrived at responsive to an affirmative determination atdiamond 402, atblock 410 the first device may unlock a hardware lock on the first device, such as thelock 309 described above. The unlocking may be performed based on UWB location tracking simply indicating that the second device is within the corresponding predetermined area (e.g., area 310). Or the unlocking may be performed based on the second device not only being within the corresponding predetermined area but also transmitting valid login information that is received by the first device via the same or different UWB signals that were used for the location tracking itself in order to unlock an additional software lock for the first device that requires valid user authentication credentials. However, further note that in other examples the login information may be received via other wireless signals from the second device such as Bluetooth or Wi-Fi signals, if desired. - A copy of the login information itself may be stored in secure local storage of the second device, e.g., by system administrator that only gives certain users access to unlock the first device's lock via their respective personal devices. The login information may include user identification (ID) data such as a username or email address so that, at
block 410, the first device may access another copy of user ID data in local storage of the first device and determine whether the received user ID data matches the local copy of the user ID data. The login information may also include a software key such as a password or numerical passcode or even randomized key like an encryption key so that, also atblock 410, the first device may compare the received software key to corresponding software key data also stored locally to determine whether a match exists to thus authenticate the associated user. However, also note that in some examples the prestored user ID data and software key for comparison to the login information received from the second device may also be stored remotely in secure cloud storage, if desired. - In any case, based on the login information received via UWB or other wireless signals from the second device matching the pre-stored login information, the first device may electronically control its hardware lock, e.g., by physically actuating at least one element within the hardware lock to unlock the hardware lock. For example, the first device may control an inner locking mechanism like pins in the lock's cylinder by actuating a motor inside the lock to place the pins in an unlocked configuration so that latch or bolt may be moved by the user to open the first device's door to reach its inner compartment. Or in some examples, the first device may also actuate the latch or bolt itself via a motor so that the door pops open automatically.
- Still in reference to
FIG. 4 , fromblock 410 the logic may proceed todecision diamond 412. Atdiamond 412 the first device may determine whether the second device itself is currently in use by the user (e.g., for at least a threshold amount of time such as five seconds to avoid false triggers). Whether the second device is currently in use may be determined based on paired Bluetooth or other communication between the two devices, for example. Or the second device may transmit, via UWB signals or other wireless signals, its current processes and/or device status to the first device. - The second device currently being in use may include providing touch input to the display of the second device, the second device presenting audio visual content like an Internet video streamed to the second device, the second device's camera being currently in use, etc. Responsive to an affirmative determination at
diamond 412, the logic may proceed to block 414 where the first device may close its door protected by the lock (e.g., using a motor if the door is not already closed) and lock its hardware lock with the door closed to thus secure the compartment inside the first device (that again might house a separate computer or server). The first device may do so atblock 414 notwithstanding the second device being currently within the predetermined area for unlocking the hardware lock in order to secure the inner compartment of the first device while the user's attention is diverted elsewhere (to the second device in active use). Then once the display of the second device is powered off or the user otherwise stops using the second device, the first device may again unlock its hardware lock (assuming the second device is still within the predetermined area in front of the hardware lock, for example). - However, referring back to
diamond 412, if a negative determination is made rather than an affirmative one, the logic may instead proceed todecision diamond 416. Atdiamond 416 the first device may determine, based on UWB location tracking, whether the second device is now outside of the predetermined area for unlocking the hardware lock (e.g., for at least a threshold amount of time such as five seconds, to avoid false triggers again). Additionally, or alternatively, atdiamond 416 the first device may determine whether a motion vector for the second device identified via UWB location tracking indicates motion away from the first device (e.g., in any direction), or motion away from the first device so long as not also within the innerconical portion 316 described above. - Responsive to a negative determination at
diamond 416, the logic may revert back todiamond 412 and proceed therefrom. However, responsive to an affirmative determination atdiamond 416, the logic may instead proceed to block 414 as described above so that the first device may lock its hardware lock. - Now in reference to
FIG. 5 , a graphical user interface (GUI) 500 is shown that may be presented on a display of the first device ofFIG. 4 based on the first device unlocking its hardware lock based on UWB location tracking as set forth herein. As shown, theGUI 500 may include a prompt 502 indicating that the first device has unlocked its hardware lock based on a paired smartphone coming within a predetermined area in front of the first device. TheGUI 500 may also include aselector 504 which may be selectable to command the first device to present another GUI from which one or more settings related to UWB location tracking for unlocking the hardware lock may be configured. An example of such a settings GUI is shown inFIG. 6 . - Accordingly, reference is now made to the
GUI 600 ofFIG. 6 . Note that each of the options to be discussed below may be selected by directing touch or cursor input to the respective check box adjacent to the respective option. - As shown in
FIG. 6 , theGUI 600 may include afirst option 602 that may be selectable to set or configure the first device to, in the future, perform UWB location tracking of other devices to determine whether to unlock the first device's hardware lock and/or permit execution of a power down command consistent with present principles. For example, theoption 602 may be selected to enable the device to execute the logic ofFIG. 4 and/or present theGUI 500 ofFIG. 5 orGUI 700 ofFIG. 7 that will be described later. - If desired, in some examples an
option 604 may be presented on theGUI 600. Theoption 604 may be selected to set or enable the first device ofFIG. 4 to require an authorized personal device to be located within the predetermined area for unlocking the first device's hardware lock even when a metallic key is inserted into the lock's keyhole and turned to unlock the lock manually. Thus,option 604 may be selected to establish an even higher degree of security for accessing the first device's inner compartment to prevent unauthorized access to the compartment by a person who might have gained access to the metallic key but still does not possess a personal device that has been set with the appropriate access permissions. - As also shown in
FIG. 6 , theGUI 600 may also includerespective input boxes predetermined areas FIG. 3 . As shown inFIG. 6 ,box 608 may be used to enter a number of feet for the first device to use for the length of the cone(s), whilebox 610 may be used to enter a number of feet to use for the width of the cone(s) at their widest (e.g., at the respective cone's base or circular plane surface). Likewise,box 612 may be used to enter a number of feet for the first device to use for the height of the cone(s) (e.g., again at the respective cone's base or circular plane surface). Thus, note that the cone(s) need not be symmetric in all examples, and further note that in some examples a predetermined area need not be cone-shaped at all. For example, the predetermined areas may simply be boxes of a predetermined height, width, and length in front of and behind the first device. Still further, note that while dimensions may be specified in feet according to theGUI 600, other increments may also be used such as meters or centimeters. - Still in reference to
FIG. 6 , in some examples aninput box 614 may be presented on theGUI 600. The user may input a number into thebox 614 in order to establish a threshold time during which another device in UWB communication with the first device is to be within the first device's predetermined area(s) before the first device unlocks its hardware lock and/or permits execution of a power down command. If desired, theGUI 600 may also include anotherinput box 616 for the user to enter another number to establish a different threshold time after the other device leaves the predetermined area(s) for the first device to lock its hardware lock and/or disallow a power down command from being executed. - Additionally, in some examples the
GUI 600 may include anoption 618 that may be selected to set or enable the first device to lock its hardware lock if another device paired or communicating with it is in active use. For example, theoption 618 may be selected to set or configure the first device to specifically executediamond 412 and block 414 as described above. - The
GUI 600 may also include an option 620. The option 620 may be selected to specifically set or enable the first device to require another device to be within the predetermined area at the back of the first device for the first device to permit execution of a power down command. For example, the option 620 may be selected to set or configure the first device to specifically execute steps 404-408 ofFIG. 4 . - Now in reference to
FIG. 7 , it shows anotherexample GUI 700 that may be presented on the display of the first device ofFIG. 4 consistent with present principles. TheGUI 700 may be presented on the first device's display responsive to a determination that another device paired with the first device is actively in use as set forth above. As a result, per this example the first device has locked its hardware lock. Accordingly, as shown theGUI 700 may include a prompt 702 indicating that the first device has locked its hardware lock since the first device has identified another device paired with it (in this case, a smartphone) as being currently in use. The prompt 702 may also include instructions to put the other device down on a surface or turn off its display for the first device to unlock its hardware lock again. Note that determining whether the other device has been put down on a surface may be based on orientation data transmitted wirelessly to the first device, as generated at the second device using its gyroscope or other orientation sensor. Orientation of the other device may also be determined based on UWB location tracking itself as the first device might determine based on the angle of arrival of UWB signals from the other device and the known location of UWB transceiver on the other device. - Continuing the detailed description in reference to
FIG. 8 , it shows anexample illustration 800 of UWB location accuracy. As shown, afirst device 802 that might be executing the logic ofFIG. 4 may determine abearing 806 to asecond device 804 using UWB signal exchange, which may be accurate to plus/minus threedegrees 808 or even less. Depth (distance) between thefirst device 802 andsecond device 804 may also be determined using UWB to plus/minus tencentimeters 810 or even less. Thus, thedevice 802 may determine the location of thedevice 804 relative to thedevice 802 with relatively high accuracy. So, for example, thedevice 802 may determine whether thesecond device 804 comes within a predetermined area as set forth above to determine whether the first device should unlock its hardware lock consistent with present principles. - Moving on from
FIG. 9 , it is to be further understood that UWB-based unlocking of a given device's hardware lock and the permitting a power down command may be performed for multiple different end-users with various levels of permissions. For instance, suppose a first user and a second user each have their own smartphone for UWB location tracking and may report, via UWB signals, a device identification (ID) and/or login information for their respective smartphone so that the first device ofFIG. 4 may track the different devices by device/user ID. - In accordance with this example, different rules or rule sets may be implemented for each user. For example, one user might have administrator privileges for the first device and so when his/her respective smartphone is detected via UWB as being within a respective predetermined area, the first device may unlock its hardware lock or permit a power down command to be executed. However, the second user may have lesser privileges, where the second user's smartphone may be permitted to unlock the hardware lock when within that respective predetermined area but is still not permitted to power down the first device even if his/her smartphone is within the respective predetermined area for power down.
- It may now be appreciated that present principles provide for an improved computer-based user interface that increases the functionality, accuracy, and ease of use of the devices disclosed herein. The disclosed concepts are rooted in computer technology for computers to carry out their functions.
- It is to be understood that whilst present principals have been described with reference to some example embodiments, these are not intended to be limiting, and that various alternative arrangements may be used to implement the subject matter claimed herein. Components included in one embodiment can be used in other embodiments in any appropriate combination. For example, any of the various components described herein and/or depicted in the Figures may be combined, interchanged, or excluded from other embodiments.
Claims (24)
1. A first device, comprising:
at least one processor;
an ultra-wideband (UWB) transceiver accessible to the at least one processor; and
storage accessible to the at least one processor and comprising instructions executable by the at least one processor to:
track a location of a second device different from the first device using one or more UWB signals received from the second device via the UWB transceiver;
based on at least one additional user action at the second device and responsive to a determination, based on the tracking of the location of the second device, that the second device is within a predetermined area of the first device, unlock a hardware lock controlled by the first device, wherein the at least one additional user action comprises powering off a display of the second device.
2-20. (canceled)
21. The first device of claim 1 , wherein the instructions are executable to:
present a graphical user interface (GUI), the GUI comprising a prompt indicating that the hardware lock has been unlocked, the GUI comprising data identifying the second device.
22. The first device of claim 1 , wherein the instructions are executable to:
present a graphical user interface (GUI), the GUI comprising a prompt indicating that the hardware lock has been unlocked, the prompt specifying that the hardware lock has been unlocked based on the second device coming within the predetermined area of the first device.
23. The first device of claim 1 , comprising the second device.
24. The first device of claim 1 , wherein the instructions are executable to:
responsive to the determination and also based on receiving a hardware key into the hardware lock, unlock the hardware lock controlled by the first device.
25-38. (canceled)
39. The first device of claim 1 , wherein the at least one additional user action comprises putting the second device down on a surface.
40. The first device of claim 1 , wherein the instructions are executable to:
present a settings graphical user interface (GUI), the settings GUI comprising a first option that is selectable to enable unlocking of the hardware lock based on UWB location tracking of the second device.
41. A method, comprising:
tracking, using a first device, a location of a second device different from the first device using ultra-wideband (UWB) communication;
based on at least one additional user action at the second device and based on the tracking of the location of the second device, unlocking a physical lock controlled by the first device, wherein the at least one additional user action comprises powering off a display of the second device.
42. The method of claim 41 , wherein the physical lock is controllable one or more of: electronically, mechanically.
43. The method of claim 41 , comprising:
presenting a settings graphical user interface (GUI), the settings GUI comprising a first option that is selectable to enable unlocking of the physical lock based on UWB location tracking of the second device.
44. The method of claim 41 , comprising:
presenting a graphical user interface (GUI), the GUI comprising a prompt indicating that the physical lock has been unlocked.
45. (canceled)
46. The method of claim 41 , wherein the at least one additional user action comprises putting the second device down on a surface.
47. At least one computer readable storage medium (CRSM) that is not a transitory signal, the computer readable storage medium comprising instructions executable by at least one processor to:
track a location of a first device relative to a second device using ultra-wideband (UWB) communication; and
based on the tracking of the location of the first device and based on at least one additional user action at the first device, unlock a lock of the second device, wherein the at least one additional user action comprises powering off a display of the first device.
48. (canceled)
49. The CRSM of claim 47 , wherein the at least one additional user action comprises putting the first device down on a surface.
50. The CRSM of claim 47 , wherein the instructions are executable to:
present a graphical user interface (GUI), the GUI comprising a prompt indicating that the lock has been unlocked.
51. The CRSM of claim 47 , wherein the instructions are executable to:
based on the tracking, based on the at least one additional user action, and also based on receiving a hardware key into the lock, unlock the lock of the second device.
52. The CRSM of claim 47 , wherein the instructions are executable to:
present a settings graphical user interface (GUI), the settings GUI comprising a first option that is selectable to enable unlocking of the lock based on UWB location tracking of the first device.
53. The first device of claim 1 , wherein the instructions are executable to:
present a graphical user interface (GUI), the GUI comprising a prompt instructing a user to power off the display of the second device to unlock the hardware lock.
54. The method of claim 41 , comprising:
presenting a graphical user interface (GUI), the GUI comprising a prompt instructing a user to power off the display of the second device to unlock the physical lock.
55. The CRSM of claim 47 , wherein the instructions are executable to:
present a graphical user interface (GUI), the GUI comprising a prompt instructing a user to power off the display of the first device to unlock the lock.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/204,617 US11430274B1 (en) | 2021-03-17 | 2021-03-17 | Unlocking lock on device based on ultra-wideband location tracking |
DE102022103095.4A DE102022103095A1 (en) | 2021-03-17 | 2022-02-10 | Unlock a lock on a device based on ultra-wideband location tracking |
GB2203413.6A GB2608218B (en) | 2021-03-17 | 2022-03-11 | Unlocking lock on device based on ultra-wideband location tracking |
CN202210262606.7A CN114980306A (en) | 2021-03-17 | 2022-03-17 | Device lock removal based on ultra-wideband positioning tracking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/204,617 US11430274B1 (en) | 2021-03-17 | 2021-03-17 | Unlocking lock on device based on ultra-wideband location tracking |
Publications (2)
Publication Number | Publication Date |
---|---|
US11430274B1 US11430274B1 (en) | 2022-08-30 |
US20220301369A1 true US20220301369A1 (en) | 2022-09-22 |
Family
ID=81254843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/204,617 Active US11430274B1 (en) | 2021-03-17 | 2021-03-17 | Unlocking lock on device based on ultra-wideband location tracking |
Country Status (4)
Country | Link |
---|---|
US (1) | US11430274B1 (en) |
CN (1) | CN114980306A (en) |
DE (1) | DE102022103095A1 (en) |
GB (1) | GB2608218B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220398302A1 (en) * | 2021-06-10 | 2022-12-15 | Trivver, Inc. | Secure wearable lens apparatus |
US11776382B1 (en) * | 2022-12-23 | 2023-10-03 | The Adt Security Corporation | Premises security system using ultra-wideband (UWB) functionality to initiate at least one action |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112489250B (en) * | 2019-09-12 | 2022-02-18 | 同方威视技术股份有限公司 | Intelligent lock, intelligent supervision system and intelligent supervision method |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070109093A1 (en) * | 2005-11-11 | 2007-05-17 | Fujitsu Ten Limited | Vehicle control system and vehicle control apparatus |
US20100048172A1 (en) * | 2008-08-25 | 2010-02-25 | Jeyhan Karaoguz | Position-based control of access to alternative communication networks |
US20140253288A1 (en) * | 2013-03-08 | 2014-09-11 | Lear Corporation | Vehicle Remote Function System and Method for Determining Vehicle FOB Locations Using Adaptive Filtering |
US20150355708A1 (en) * | 2013-12-31 | 2015-12-10 | Mediatek Inc. | Touch communications device for detecting relative movement status of object close to, or in contact with, touch panel and related movement detection method |
US20200228943A1 (en) * | 2019-01-11 | 2020-07-16 | Sensormatic Electronics, LLC | Power efficient ultra-wideband (uwb) tag for indoor positioning |
US20200314651A1 (en) * | 2019-03-25 | 2020-10-01 | Assa Abloy Ab | Physical access control systems with localization-based intent detection |
US20200327753A1 (en) * | 2019-04-12 | 2020-10-15 | Volkswagen Aktiengesellschaft | Transportation vehicle |
US20210082221A1 (en) * | 2019-09-12 | 2021-03-18 | Nuctech Company Limited | Smart lock, smart monitoring system and smart monitoring method |
US20210185485A1 (en) * | 2018-08-27 | 2021-06-17 | Signify Holding B.V. | Determining a suitability of network nodes for rf-based presence and/or location detection |
US20220026920A1 (en) * | 2020-06-10 | 2022-01-27 | AI Incorporated | Light weight and real time slam for robots |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9571625B2 (en) | 2009-08-11 | 2017-02-14 | Lg Electronics Inc. | Electronic device and control method thereof |
US11269393B2 (en) | 2017-06-02 | 2022-03-08 | Apple Inc. | Techniques for adjusting computing device sleep states |
JP2019083468A (en) * | 2017-10-31 | 2019-05-30 | シャープ株式会社 | Output control device, intercom slave unit, and intercom system |
EP3740630A4 (en) * | 2018-01-19 | 2022-01-26 | Konnex Enterprises Inc. | Systems and methods for controlling access to a secured space |
US10841174B1 (en) | 2018-08-06 | 2020-11-17 | Apple Inc. | Electronic device with intuitive control interface |
KR20200036571A (en) | 2018-09-28 | 2020-04-07 | 삼성전자주식회사 | Mehthod and an electronic device for contorolling a function based on a location and a direction of an objection |
US10984086B1 (en) | 2019-10-18 | 2021-04-20 | Motorola Mobility Llc | Methods and systems for fingerprint sensor triggered voice interaction in an electronic device |
AU2020391236A1 (en) | 2019-11-27 | 2022-07-14 | Schlage Lock Company Llc | Ultra-wideband technologies for seamless access control |
KR20210121547A (en) | 2020-03-30 | 2021-10-08 | 삼성전자주식회사 | Electronic Device And Method Of Providing A Notification Based On Distance Of A Remote Input Device |
-
2021
- 2021-03-17 US US17/204,617 patent/US11430274B1/en active Active
-
2022
- 2022-02-10 DE DE102022103095.4A patent/DE102022103095A1/en active Pending
- 2022-03-11 GB GB2203413.6A patent/GB2608218B/en active Active
- 2022-03-17 CN CN202210262606.7A patent/CN114980306A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070109093A1 (en) * | 2005-11-11 | 2007-05-17 | Fujitsu Ten Limited | Vehicle control system and vehicle control apparatus |
US20100048172A1 (en) * | 2008-08-25 | 2010-02-25 | Jeyhan Karaoguz | Position-based control of access to alternative communication networks |
US20140253288A1 (en) * | 2013-03-08 | 2014-09-11 | Lear Corporation | Vehicle Remote Function System and Method for Determining Vehicle FOB Locations Using Adaptive Filtering |
US20150355708A1 (en) * | 2013-12-31 | 2015-12-10 | Mediatek Inc. | Touch communications device for detecting relative movement status of object close to, or in contact with, touch panel and related movement detection method |
US20210185485A1 (en) * | 2018-08-27 | 2021-06-17 | Signify Holding B.V. | Determining a suitability of network nodes for rf-based presence and/or location detection |
US20200228943A1 (en) * | 2019-01-11 | 2020-07-16 | Sensormatic Electronics, LLC | Power efficient ultra-wideband (uwb) tag for indoor positioning |
US20200314651A1 (en) * | 2019-03-25 | 2020-10-01 | Assa Abloy Ab | Physical access control systems with localization-based intent detection |
US20200327753A1 (en) * | 2019-04-12 | 2020-10-15 | Volkswagen Aktiengesellschaft | Transportation vehicle |
US20210082221A1 (en) * | 2019-09-12 | 2021-03-18 | Nuctech Company Limited | Smart lock, smart monitoring system and smart monitoring method |
US20220026920A1 (en) * | 2020-06-10 | 2022-01-27 | AI Incorporated | Light weight and real time slam for robots |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220398302A1 (en) * | 2021-06-10 | 2022-12-15 | Trivver, Inc. | Secure wearable lens apparatus |
US11776382B1 (en) * | 2022-12-23 | 2023-10-03 | The Adt Security Corporation | Premises security system using ultra-wideband (UWB) functionality to initiate at least one action |
US11900789B1 (en) | 2022-12-23 | 2024-02-13 | The Adt Security Corporation | Premises security system using ultra-wideband (UWB) functionality to initiate at least one action |
Also Published As
Publication number | Publication date |
---|---|
GB2608218B (en) | 2023-10-18 |
GB202203413D0 (en) | 2022-04-27 |
GB2608218A (en) | 2022-12-28 |
DE102022103095A1 (en) | 2022-09-22 |
US11430274B1 (en) | 2022-08-30 |
CN114980306A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11430274B1 (en) | Unlocking lock on device based on ultra-wideband location tracking | |
US10306443B2 (en) | Providing access to and enabling functionality of first device based on communication with second device | |
US9936385B2 (en) | Initial access to network that is permitted from within a threshold distance | |
US9607140B2 (en) | Authenticating a user of a system via an authentication image mechanism | |
US20180060562A1 (en) | Systems and methods to permit an attempt at authentication using one or more forms of authentication | |
TWI604328B (en) | Method and apparatus for dynamic modification of authentication requirements of a processing system | |
US20150370350A1 (en) | Determining a stylus orientation to provide input to a touch enabled device | |
US10540489B2 (en) | Authentication using multiple images of user from different angles | |
US10621431B2 (en) | Camera that uses light from plural light sources disposed on a device | |
US11432143B2 (en) | Authentication based on network connection history | |
US20160273908A1 (en) | Prevention of light from exterior to a device having a camera from being used to generate an image using the camera based on the distance of a user to the device | |
US20220108000A1 (en) | Permitting device use based on location recognized from camera input | |
US9647755B1 (en) | Light augmented system and method for secure device pairing | |
GB2606447A (en) | Ultra-wideband to identify and control other device | |
WO2017045511A1 (en) | Top layer floating window control method and apparatus, and mobile terminal | |
US11532182B2 (en) | Authentication of RGB video based on infrared and depth sensing | |
US11334138B1 (en) | Unlocking and/or awakening device based on ultra-wideband location tracking | |
US10845842B2 (en) | Systems and methods for presentation of input elements based on direction to a user | |
US9477272B2 (en) | Prevention of removal of solid state drive from computer housing with data being accessible thereon | |
US11556487B1 (en) | Apparatus to monitor whether another device has been compromised | |
US11705124B2 (en) | Ultra-wideband location tracking to perform voice input operation | |
US20220303281A1 (en) | Ultra-wideband-based device use restrictions | |
US20220180010A1 (en) | Screw removal detection to determine device tampering | |
US20240045941A1 (en) | Interaction-based authentication and user interface adjustment | |
CN111868721A (en) | Electronic device and operation method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |