Sign In to Follow Application
View All Documents & Correspondence

Smart Lock And Key Arrangement

Abstract: A smart lock and key arrangement (100) is disclosed. The arrangement comprises a smart key unit (102) comprising a key (106) and an identity storage element (108). The identity storage element (108) comprises a unique ID associated with an individual. The arrangement further comprises a smart lock apparatus (104) comprising a plurality of locking components (110), a key hole (114), and an identity reader (116) to obtain the unique ID from the identity storage element (108) of the smart key unit (102). The apparatus further comprises a processor (118) coupled to the identity reader (116) to obtain the unique ID from the identity reader (116) and authenticate the individual based on the unique ID and pre-stored authentication data. The processor (118) further is to implement a set of access control permissions corresponding to the individual when the authentication is successful and trigger retraction of a blocking pin (112) from a first position to a second position based on the set of access control permissions.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
19 October 2019
Publication Number
17/2021
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
mail@lexorbis.com
Parent Application

Applicants

Panasonic Life Solutions India Private Limited
3rd Floor, B wing I- Think Techno Campus Pokhran, Road No 2 Thane (West), Thane, Maharashtra 400607, India

Inventors

1. PATIL, Pravin
Unit 1(A), 5th Floor, Discoverer Building, ITPL, Whitefield, Bangalore - 560066, Karnataka, India

Specification

DESC:Field of the Invention
[0001] The present disclosure relates to a smart lock and key arrangement for controlling access to environments and spaces.

Background
[0002] Spaces or environments, such as households, typically have a single type of door lock on all doors within the environment. The advantage of such a scenario is that such door locks can be opened using a single key only. While it may appear to be convenient when thought in terms of key management, i.e., the user only has to manage a single key, such a situation poses serious security risks. For instance, an unauthorized user, upon gaining access to the key, may gain access to all the sub-spaces within the space. Furthermore, easy of duplicity of such keys is also a challenge. Thus, various security related risks exist.
[0003] Digital door locks implemented nowadays provide for a relatively secure mechanism when it comes to ensuring security of the environments. However, such digital door locks are known to implement complex authentication techniques. Accordingly, such digital door locks are cumbersome to install and operate, and are costly to implement. Hence, such digital door locks haven’t gained much popularity with the population. Furthermore, these digital door locks implement electronics based door unlocking systems, which increases energy consumption resulting in frequent battery replacements.
[0004] Therefore, there is a need for solution to address at least one of the aforementioned deficiencies.

Summary
[0005] This summary is provided to introduce a selection of concepts, in a simplified format, that are further described in the detailed description of the invention. This summary is neither intended to identify key or essential inventive concepts of the invention and nor is it intended for determining the scope of the invention.
[0006] In an embodiment, a smart lock and key arrangement is disclosed. The arrangement comprises a smart key unit comprising a key and an identity storage element. The identity storage element comprises a unique ID associated with an individual. The arrangement further comprises a smart lock apparatus comprising a plurality of locking components, a key hole, and an identity reader to obtain the unique ID from the identity storage element of the smart key. The apparatus further comprises a processor coupled to the identity reader to obtain the unique ID from the identity reader and authenticate the individual based on the unique ID and pre-stored authentication data. The processor further is to implement a set of access control permissions corresponding to the individual when the authentication is successful and trigger retraction of a blocking pin from a first position to a second position based on the set of access control permissions.
[0007] In an embodiment, a smart lock apparatus is disclosed. The smart lock apparatus comprises a plurality of locking components, a key hole for accepting a portion of a smart key unit, an identity reader to obtain the unique ID from the identity storage element of the smart key. The smart lock apparatus further comprises a processor coupled to the identity reader. The processor is to obtain the unique ID from the identity reader. The processor is to authenticate the individual based on the unique ID and pre-stored authentication data comprising list of authorized individuals and corresponding unique ids. The processor further is to implement a set of access control permissions corresponding to the individual when the authentication is successful and trigger retraction of a blocking pin from a first position to a second position based on the set of access control permissions.
[0008] To further clarify the advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.

Brief Description of the Drawings
[0009] These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
[0010] FIG. 1A illustrates a smart lock and key arrangement, according to an embodiment of the present disclosure;
[0011] FIG. 1B and FIG. 1C illustrate operation of the smart lock and key arrangement, according to an embodiment of the present disclosure.
[0012] FIG. 2 illustrates a smart access system, according to an embodiment of the present disclosure; and
[0013] FIGs. 3A-3C illustrate example notifications and GUIs, according to an embodiment of the present disclosure.
[0014] Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.

Detailed Description of Figures
[0015] For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skilled in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
[0016] The term “some” as used herein is defined as “none, or one, or more than one, or all.” Accordingly, the terms “none,” “one,” “more than one,” “more than one, but not all” or “all” would all fall under the definition of “some.” The term “some embodiments” may refer to no embodiments or to one embodiment or to several embodiments or to all embodiments. Accordingly, the term “some embodiments” is defined as meaning “no embodiment, or one embodiment, or more than one embodiment, or all embodiments.”
[0017] The terminology and structure employed herein is for describing, teaching and illuminating some embodiments and their specific features and elements and does not limit, restrict or reduce the spirit and scope of the claims or their equivalents.
[0018] More specifically, any terms used herein such as but not limited to “includes,” “comprises,” “has,” “consists,” and grammatical variants thereof do NOT specify an exact limitation or restriction and certainly do NOT exclude the possible addition of one or more features or elements, unless otherwise stated, and furthermore must NOT be taken to exclude the possible removal of one or more of the listed features and elements, unless otherwise stated with the limiting language “MUST comprise” or “NEEDS TO include.”
[0019] Whether or not a certain feature or element was limited to being used only once, either way, it may still be referred to as “one or more features” or “one or more elements” or “at least one feature” or “at least one element.” Furthermore, the use of the terms “one or more” or “at least one” feature or element do NOT preclude there being none of that feature or element, unless otherwise specified by limiting language such as “there NEEDS to be one or more . . . ” or “one or more element is REQUIRED.”
[0020] Unless otherwise defined, all terms, and especially any technical and/or scientific terms, used herein may be taken to have the same meaning as commonly understood by one having ordinary skills in the art.
[0021] Reference is made herein to some “embodiments.” It should be understood that an embodiment is an example of a possible implementation of any features and/or elements presented in the attached claims. Some embodiments have been described for the purpose of illuminating one or more of the potential ways in which the specific features and/or elements of the attached claims fulfil the requirements of uniqueness, utility and non-obviousness.
[0022] Use of the phrases and/or terms such as but not limited to “a first embodiment,” “a further embodiment,” “an alternate embodiment,” “one embodiment,” “an embodiment,” “multiple embodiments,” “some embodiments,” “other embodiments,” “further embodiment”, “furthermore embodiment”, “additional embodiment” or variants thereof do NOT necessarily refer to the same embodiments. Unless otherwise specified, one or more particular features and/or elements described in connection with one or more embodiments may be found in one embodiment, or may be found in more than one embodiment, or may be found in all embodiments, or may be found in no embodiments. Although one or more features and/or elements may be described herein in the context of only a single embodiment, or alternatively in the context of more than one embodiment, or further alternatively in the context of all embodiments, the features and/or elements may instead be provided separately or in any appropriate combination or not at all. Conversely, any features and/or elements described in the context of separate embodiments may alternatively be realized as existing together in the context of a single embodiment.
[0023] Any particular and all details set forth herein are used in the context of some embodiments and therefore should NOT be necessarily taken as limiting factors to the attached claims. The attached claims and their legal equivalents can be realized in the context of embodiments other than the ones used as illustrative examples in the description below.
[0024] Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
[0025] FIG. 1A illustrates a smart lock and key arrangement 100, according to an embodiment of the present disclosure. According to aspects of the present disclosure, the smart lock and key arrangement 100 may be implemented to control access of a user to an environment or a space.
[0026] In an example embodiment, the smart lock and key arrangement 100 comprises a smart key unit 102 and a smart lock apparatus 104. In an example, the smart key unit 102 may comprise a key 106 and an identity storage element, such as, for example, a Radio-Frequency Identification (RFID) chip 108. The RFID chip 108, in an example, comprises a unique identity (ID) associated with an individual. In an implementation, the unique ID stored on the RFID chip 108 may be in an encrypted form so as to enhance the security of the unique ID and prevent malicious persons from duplicating the unique ID. Other examples of the identity storage element may include a QR code. Furthermore, other electromagnetic based and/or optical based identification mechanism may be implemented according to the aspects of the present subject matter. Accordingly, the identity storage element may be selected based on the electromagnetic and/or electromagnetic mechanism implemented.
[0027] In an implementation, the RFID chip 108 may be integral to the key 106. In another implementation, the RFID chip 108 may be provided in a casing, wherein the casing is adapted to be attached to the key 106. As an example, the casing may be of very little thickness and may be flexible, so as to cover a set of conical dimples provided on the key 106, when the casing is attached to the key 106. The conical dimples may be understood as mechanical structures provided on a key for aligning with locking components, for example, locking cylinders, of a corresponding lock apparatus. On proper alignment, the locking components can then be moved, for example rotated, for unlocking the lock apparatus.
[0028] Continuing with the above embodiment, the smart lock apparatus 104 may include a plurality of locking components 110, a blocking pin 112, a key hole 114, an identity reader, such as, for example, an RFID reader 116, a processor 118, a control circuit 120, a solenoid 122, and a wireless communication unit 124. Other examples of the identity reader may include, for example, a QR scanner. As mentioned above, other electromagnetic based and/or optical based identification mechanism may be implemented according to the aspects of the present subject matter. Accordingly, the identity reader may be selected based on the electromagnetic and/or electromagnetic mechanism implemented.
[0029] In an example, the locking components 110 may be of cylindrical shape or any other geometrical shape, as appropriate, and may be configured to align with the conical dimples of the key 106, when a portion of the smart key unit 102 is inserted into the key hole 114 of the smart lock apparatus 104. The blocking pin 112, in an example, may be disposed within the smart lock apparatus 104 in a manner such that at a first predetermined position, the blocking pin 112 blocks a movement of the locking components 110. This means, when blocking pin 112 is in the first predetermined position and the smart key unit 104 is inserted into the key hole 114, a user may still not be able to turn the smart key unit 102 for unlocking the smart lock apparatus 104, as the movement of the locking components 110 is blocked by the blocking pin 112. Furthermore, the disposition of the blocking pin 112 is such that when the blocking pin 112 is at a second predetermined position, the blocking pin 112 does not hinder the movement of the locking components 110.
[0030] In an example, the solenoid 122 is configured to control the movement of the blocking pin 112. For instance, when the solenoid 122 is in a charged state, a retraction of the blocking 112 may be caused from the first predetermined position to the second predetermined position. In an example, the control circuit 120 may be configured for controlling the charging of the solenoid 122 based on control data received from the processor 118. On receiving the control data, the control circuit 120 may be configured to actuate the charging of the solenoid 122.
[0031] The key hole 114, as mentioned above, is adapted to receive a portion of the smart key unit 104. Herein, the portion of the smart key unit 104 may comprise the RFID chip 108, in an example.
[0032] In an example, the RFID reader 116 may be configured to obtain the unique ID from the RFID chip 108. To that end, the RFID reader 116 may query the RFID chip 108 for the unique ID and may receive the unique ID in return from the RFID chip 108.
[0033] The received unique ID is subsequently obtained and decrypted by the processor 118. Thereafter, the processor 118 may be configured to authenticate the individual based on the unique ID and a pre-stored authentication data. The authentication data comprises a list of individuals who are authorized to unlock the smart lock apparatus 104 along with their corresponding unique IDs.
[0034] In an example where the user is successfully authenticated, the processor 118 is configured to trigger retraction of the blocking pin 112 from the first position to the second position. To that end, the processor 118 may be configured to transmit the control data to the control circuit 120. On receiving the control data, as mentioned above, the control circuit 120 is configured to actuate charging of the solenoid 122. Accordingly, when charged, the solenoid 122 causes retraction of the blocking pin 112 from the first predetermined position to the second predetermined position. As a result, the locking components 110 are now free to move.
[0035] Once the blocking pin 112 is retracted, the user may be notified, for example, by way of an audio/visual notification. For example, a sound may be played or an LED may be switched ON. Subsequently, the user may then unlock the smart lock apparatus 104 by turning the smart key unit 102 for causing a movement, for example, a rotation of the locking components 110. Accordingly, the smart lock 104 apparatus is unlocked.
[0036] In another example where the authentication of the user is not successful, the processor 118 may trigger a notification. Examples of the notification may include, but are not limited to, an audio notification, a video notification, and a communication message notification. In an example, the audio notification may be provided through an audio played through a connected device, for example, a speaker. Herein, the smart lock and key arrangement 100 may be connected to the speaker through communication protocols supported by an Internet of Things (IoT) environment. Accordingly, the processor 118 may transmit an audio message to the speaker using the wireless communication unit 124. Accordingly, the speaker may play an audio upon receiving the audio message thereby alerting users in vicinity. Furthermore, the video notification, in an example, may be provided as a display message on the smartphone of a registered master user’s User Equipment. In another example, a camera present in the IoT environment may be used to capture a video of the particular door and accordingly an image may be sent to the registered master user’s User Equipment. Furthermore, the communication message may be transmitted by the processor 108 to the User Equipment using the wireless communication unit 124.
[0037] Continuing with the above embodiment, in the example where the individual is successfully authenticated, the processor 118 may be further configured to implement a set of access control permissions corresponding to the authenticated individual. In a non-limiting manner, the set of access control permissions may define the individual’s accessibility to the smart lock apparatus 104 and, in turn, the environment or space guarded by the smart lock apparatus 104. In an example embodiment, the access control permissions may be location bound or may be time bound or both. In other words, the permissions may be set based on the locations that are to be guarded. For instance, a house maid may be allowed access to only lobby and not to user’s bedroom. Similarly, in another example, unrestricted access to all locations may be given for a limited time. In another example, limited location based access for a predefined time may be given.
[0038] Referring to the time bound access, consider a case where the set of access control permissions permits the individual with access to an environment/location/space for a preset time period, say 4 hours, starting from 10 AM to 2 PM. Now, in case the individual attempts to unlock the smart lock apparatus 104 any time after 2 PM, say, at 3 PM, although the individual may be authenticated successfully, the individual may not be permitted access to unlock the smart lock apparatus 104. In said example, the retraction of the blocking pin 112 is subject to the access control permissions. That is, if the access control permissions are complied, only then the processor 118 sends the control data to retract the blocking pin 112. In an example, the access control permissions may be stored in an internal database (not shown in the figure) of the smart lock apparatus 104 and may be editable, as shall be explained in detail later in conjunction with the description of FIG. 2. In another example, the access control permissions may also be stored in a gateway, as explained later in the following figures.
[0039] Typically digital door locks implement a system whereby unlocking of the door locks is performed using electronic means. Accordingly, such digital door locks suffer with the drawback of frequent battery replacements and shorter battery life. As the smart lock and key arrangement disclosed herein implements mechanism whereby the unlocking of the door is performed by the mechanical operation of the rotation of the key unit, energy wastage associated with digital locks is reduced. Furthermore, conventional digital door locks permit users with access to all premises and spaces once the user has the key in the form of RFID card. Such digital door locks do not provide for restricted access, as may be desired in an environment. Furthermore, few of the conventional digital door locks solutions operate on category-based access. That is, a user falling in a particular category is allowed access to permitted locations within that category only. The aspects of the present subject matter provide for a more customized and user-specific access based solution.
[0040] FIG. 1B and FIG. 1C illustrate operation of the smart lock and key arrangement 100, according to an embodiment of the present disclosure. Referring to FIG. 1B, a scenario where the user is not yet authenticated or where the user is not an authorized user, is shown. As can be seen, as the user is not authenticated, the solenoid 122 is not charged and hence, the blocking pin 122 continues to remain in the first predetermined position. Referring to FIG. 1B, a scenario where the user is successfully authenticated is shown. Herein, once the user is authenticated successfully, the solenoid 122 is charged up and accordingly, the blocking pin 122 is retracted to the second predetermined position. Accordingly, the locking components 110 are now free to move. The user may subsequently rotate the smart key unit 102 for unlocking the smart lock apparatus 104.
[0041] Referring to FIG. 2, in an example embodiment and, the smart lock and key arrangement 100 may be a part of a smart access system 200. The smart access system 200 may be implemented in an environment, such as a home, an office space, clubs, and the like. As may be understood, such environments may include sub-environments, for example, rooms or cabins or game rooms. Accordingly, in an example, the environment may comprise a room 1 having a door 1, room 2 having a door 2, room 3 having a door 3, and a door 4, which may be a main entrance door. Each of the doors 1, 2, 3, and 4 may include a smart lock and key arrangement 100-1, 100-2, 100-3, and 100-4, respectively.
[0042] In an example embodiment, the smart access system 200 comprises the smart lock and key arrangement 100-1, 100-2, 100-3, 100-4, and a gateway 202. Herein, the plurality of smart lock and key arrangements 100 may be interconnected with each other using the gateway 202. Furthermore, each of the plurality of smart lock and key arrangements 100 may maintain access control permissions corresponding to registered users, such as a user 304-1 and a user 304-2. Accordingly, each of the smart lock and key arrangement 100 may implement the access control permissions on successfully authenticating an individual seeking access thereto. In another example, the access control permissions may be maintained at the gateway 202. Herein, a master user may connect to the gateway 202 using an application on his/her User Equipment, for example, a smartphone, and may accordingly define the access control permissions for different users.
[0043] In an example, the smart lock and key arrangement 100-4 may be designated as a master node as it corresponds to the main entrance, i.e., door 4. Accordingly, in an example embodiment, when an individual is successfully authenticated by the smart lock and key arrangement 100-4, the processor 118 may be configured to transmit a permission implementation message to all the other smart lock and key arrangements 100, for example, through the gateway 202. The permission implementation message may be understood as a trigger to implement the access control permissions for the individual across all theplurality of smart lock and key arrangements 100. Accordingly, the permission control message includes an identity of the individual. In an example, this ID may be determined by the processor 118 based on the unique ID stored in the RFID chip 108. In an example, the each of the smart lock and key arrangements 100 may maintain a database in an internal memory (not shown). This database may include a list of registered users with their IDs, for example, names, and corresponding unique IDs. These unique IDs, as explained above are the IDs stored on the RFID chips 108 of their respective smart key unit 102. Thus, the processor 108 determines the identity of the individual based on this database. This database is also maintained at the gateway 202, in an example. As and when new users are registered or old user’s are removed using the UE of the master user, the database is updated and the updated database is transmitted by the gateway 202 to all the smart lock and key arrangements 100.
[0044] In an implementation, the permission control message is transmitted by the processor 118 using the wireless communication unit 124 to the gateway. On receiving the permission implementation message, the gateway 202 may obtain the access control permissions corresponding to the identity of the individual from the internal database. Subsequently, the gateway 202 may transmit the access control permissions to each of the other smart lock and key arrangement 100 and the may implement the access control permissions for the individual. An example set of access control permissions for users 304-1 and 304-2 is shown below.
Example Access Control Permissions
Permissions
User Door 1 Door 2 Door 3 Door 4 Time Period
User 204-1 Allowed Allowed Allowed Allowed 2 Days
User 204-2 Not Allowed Not Allowed Not Allowed Allowed Always

[0045] In an example, a user 204-1 may seek to enter the environment from the door 4 using a smart key unit assigned to him. In case the user 204-1 is successfully authenticated, the smart lock and key arrangement 100-4 may implement the access control permissions corresponding to the user 204-1. As may be seen from the example above, the user 204-1 is permitted to access all the doors only for a preset time period of two days. Thus, the user 204-1 may be able to unlock any of the doors, 1, 2, 3, and 4 for 2 days. Thereafter, the user 204-1 may not be permitted to access the locations guarded by said doors.
[0046] Similarly, the user 204-2 is always permitted to access the door 4, but is denied permission to enter other doors, or rooms. By way of example, such access control permissions may be set for a house maid, thereby ensuring safety of household items and goods.
[0047] In an example embodiment, the processor 118 may be configured to generate an entry record in the internal database when the individual is successfully authenticated. In an example, the entry record comprises an identity of the smart lock apparatus, an identity of the smart key unit, a user identity of the individual, and a time stamp. Subsequently, the processor 118 may transmit, using the wireless communication unit 124, a notification to a user device 206 of a master user, such as a user 204-3. An example access notification 302 is shown in Fig. 3A. The notification may include details, such as the identity of the individual and time stamp, of the entry record. The user device 206 may be a smart phone, a tablet, a laptop, a desktop, and the like.
[0048] In an example embodiment, the gateway 202 may be configured to receive a user input to update the access control permissions corresponding to the individuals. The user input, in an example, may be an input to update accessibility time period associated with the individual, as shown in a graphical user interface (GUI) 304 of FIG. 3B. The user input, in another example, may be an input to control accessibility to the plurality of smart lock and key arrangements 100, as shown in GUI 306 of FIG. 3C. Based on the input, the gateway 202 may update the access control permissions for the individual. Accordingly, the gateway 202 may transmit the updated access control permissions to all the smart lock and key arrangements 100. In another embodiment, a direct wireless connection may exist between the UE of the master user and the plurality of smart lock and key arrangements 100. Herein, the UE may be used to update the database in all the smart lock and key arrangements 100. Herein, the processor 118 may be configured to implement the updates received from the UE.
[0049] While specific language has been used to describe the present subject matter, any limitations arising on account thereto, are not intended. As would be apparent to a person in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein. The drawings and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment.
,CLAIMS:1. A smart lock and key arrangement (100), comprising:
a smart key unit (102) comprising a key (106) and an identity storage element (108), the identity storage element (108) comprising a unique identity (ID) associated with an individual; and
a smart lock apparatus (104), comprising:
a plurality of locking components (110);
a key hole (114) for accepting a portion of the smart key unit (102); and
an identity reader (116) to obtain the unique ID from the identity storage element (108) of the smart key unit (102);
a processor (118) coupled to the identity reader (116), the processor (118) is to:
obtain the unique ID from the identity reader (116);
authenticate the individual based on the unique ID and pre-stored authentication data comprising list of authorized individuals and corresponding unique ids;
implement a set of access control permissions corresponding to the individual when the authentication is successful, wherein the set of access control permissions define the individual’s accessibility to the smart lock apparatus (104); and
trigger retraction of a blocking pin (112) from a first predetermined position to a second predetermined position based on the set of access control permissions corresponding to the individual, for unlocking the smart lock apparatus (104).

2. The smart lock and key arrangement (100) as claimed in claim 1, wherein the smart lock and key arrangement (100) forms part of a smart access system, the smart access system comprising:
a gateway; and
a plurality of smart lock and key arrangements (100) interconnected with each other using the gateway, wherein a smart lock apparatus (104) of each of the plurality of smart lock and key arrangements (100) comprises a wireless communication unit for exchanging data with each other, wherein:
the processor (118) further is to:
determine an identity of the individual based on the unique ID and an internal database comprising a list comprising a plurality of individuals mapped with a plurality of identities and a plurality of unique IDs; and
transmit, using the wireless communication unit, a permission implementation message to the other smart lock and key arrangements (100) for implementation of the access control permissions, wherein the permission implementation message comprises the identity of the individual; and
the gateway is configured to transmit the permission implementation message to therein.

3. The smart lock and key arrangement (100) as claimed in claim 2, wherein the processor (118) further is to transmit the permission implementation message to the gateway, and wherein the gateway is configured to transmit the permission implementation message to the other smart lock and key arrangements (100) for implementation of the access control permissions.

4. The smart lock and key arrangement (100) as claimed in claim 2, wherein the gateway is configured to:
receive a user input to update the access control permissions corresponding to the individual;
update the access control permissions based on the user input; and
transmit the access control permissions to the plurality of smart lock and key arrangements (100).

5. The smart lock and key arrangement (100) as claimed in claim 4, wherein the user input is one of:
an input to update an accessibility time period associated with the individual; and
an input to control accessibility to the plurality of smart lock and key arrangements (100).

6. The smart lock and key arrangement (100) as claimed in claim 1, wherein the processor (118) further is to:
generate an entry record when the individual is successfully authenticated, wherein the entry record comprises an identity of the smart lock apparatus (104), an identity of the smart key unit (102), a user identity of the individual, and a time stamp; and
transmit a notification to a User Equipment of a user, wherein the notification comprises the information based on the entry record.

7. The smart lock and key arrangement (100) as claimed in claim 1, wherein the smart lock apparatus (104) further comprises:
a solenoid for controlling a movement of the blocking pin (112), wherein the solenoid causes a retraction of the blocking pin (112) when in a charged state; and
a control circuit for controlling charging of the solenoid, wherein:
the processor (118) is to transmit control data to the control circuit to actuate the charging of the solenoid, based on the access control permission corresponding to the individual.

8. The smart lock and key arrangement (100) as claimed in claim 1, wherein the blocking pin (112) blocks a movement of the plurality of locking components (110) position in the first predetermined position, and wherein the blocking pin (112) does not hinder the movement of the plurality of locking components (110) in the predetermined second position.

9. A smart lock apparatus (104), comprising:
a plurality of locking components (110);
a key hole (114) for accepting a portion of a smart key unit (102) comprising a key (106) and an identity storage element (108), the identity storage element (108) comprising a unique identity (ID) associated with an individual;
an identity reader (116) to obtain the unique ID from the identity storage element (108) of the smart key unit (102);
a processor (118) coupled to the identity reader (116), the processor (118) is to:
obtain the unique ID from the identity reader (116);
authenticate the individual based on the unique ID and pre-stored authentication data comprising list of authorized individuals and corresponding unique ids;
implement a set of access control permissions corresponding to the individual when the authentication is successful, wherein the set of access control permissions define the individual’s accessibility to the smart lock apparatus (104); and
trigger retraction of a blocking pin (112) from a first predetermined position to a second predetermined position based on the set of access control permissions corresponding to the individual, for unlocking the smart lock apparatus (104).

10. The smart lock apparatus (104) as claimed in claim 10, wherein the processor (118) further is to:
generate an entry record when the individual is successfully authenticated, wherein the entry record comprises an identity of the smart lock apparatus (104), an identity of the smart key unit (102), a user identity of the individual, and a time stamp; and
transmit a notification to a User Equipment of a user, wherein the notification comprises the information based on the entry record.

11. The smart lock apparatus (104) as claimed in claim 10, wherein the smart lock apparatus (104) further comprises:
a solenoid for controlling a movement of the blocking pin (112), wherein the solenoid causes a retraction of the blocking pin (112) when in a charged state; and
a control circuit for controlling charging of the solenoid, wherein:
the processor (118) is to transmit control data to the control circuit to actuate the charging of the solenoid, based on the access control permission corresponding to the individual.

12. The smart lock apparatus (104) as claimed in claim 10, wherein the blocking pin (112) blocks a movement of the plurality of locking components (110) position in the first predetermined position, and wherein the blocking pin (112) does not hinder the movement of the plurality of locking components (110) in the predetermined second position.

13. The smart lock apparatus (104) as claimed in claim 10, wherein the smart lock apparatus (104) further comprises:
a solenoid for controlling a movement of the blocking pin (112), wherein the solenoid causes a retraction of the blocking pin (112) when in a charged state; and
a control circuit for controlling charging of the solenoid, wherein:
the processor (118) is to transmit control data to the control circuit to actuate the charging of the solenoid, when the authentication of the individual is successful.

Documents

Application Documents

# Name Date
1 201921042535-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [19-10-2019(online)].pdf 2019-10-19
1 Abstract1.jpg 2021-10-19
2 201921042535-STATEMENT OF UNDERTAKING (FORM 3) [19-10-2019(online)].pdf 2019-10-19
2 201921042535-COMPLETE SPECIFICATION [16-10-2020(online)].pdf 2020-10-16
3 201921042535-PROVISIONAL SPECIFICATION [19-10-2019(online)].pdf 2019-10-19
3 201921042535-CORRESPONDENCE-OTHERS [16-10-2020(online)].pdf 2020-10-16
4 201921042535-POWER OF AUTHORITY [19-10-2019(online)].pdf 2019-10-19
4 201921042535-DRAWING [16-10-2020(online)].pdf 2020-10-16
5 201921042535-FORM 1 [19-10-2019(online)].pdf 2019-10-19
5 201921042535-Proof of Right [03-02-2020(online)].pdf 2020-02-03
6 201921042535-DECLARATION OF INVENTORSHIP (FORM 5) [19-10-2019(online)].pdf 2019-10-19
6 201921042535-DRAWINGS [19-10-2019(online)].pdf 2019-10-19
7 201921042535-DECLARATION OF INVENTORSHIP (FORM 5) [19-10-2019(online)].pdf 2019-10-19
7 201921042535-DRAWINGS [19-10-2019(online)].pdf 2019-10-19
8 201921042535-FORM 1 [19-10-2019(online)].pdf 2019-10-19
8 201921042535-Proof of Right [03-02-2020(online)].pdf 2020-02-03
9 201921042535-DRAWING [16-10-2020(online)].pdf 2020-10-16
9 201921042535-POWER OF AUTHORITY [19-10-2019(online)].pdf 2019-10-19
10 201921042535-PROVISIONAL SPECIFICATION [19-10-2019(online)].pdf 2019-10-19
10 201921042535-CORRESPONDENCE-OTHERS [16-10-2020(online)].pdf 2020-10-16
11 201921042535-STATEMENT OF UNDERTAKING (FORM 3) [19-10-2019(online)].pdf 2019-10-19
11 201921042535-COMPLETE SPECIFICATION [16-10-2020(online)].pdf 2020-10-16
12 Abstract1.jpg 2021-10-19
12 201921042535-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [19-10-2019(online)].pdf 2019-10-19