Sign In to Follow Application
View All Documents & Correspondence

System And Method For Locking And Unlocking Electo Mechanical Lock

Abstract: A system and method for locking and unlocking an electro-mechanical lock. The system includes the electro-mechanical lock with a locking member that is configured to move between a first position and a second position; a switch operatively coupled to the locking member and adapted to move the locking member between first position and second position; and a computing unit that includes one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors to: receive command signals from computing devices, and the received command signals include either locking signals or unlocking signals. The one or more processors transmit first signal or second signal to the switch to enable movement of the locking member between first position and second position respectively based on the received command signals. FIG. 1 FIG. 3

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
09 May 2019
Publication Number
27/2019
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
info@khuranaandkhurana.com
Parent Application
Patent Number
Legal Status
Grant Date
2020-06-05
Renewal Date

Applicants

KIASA INTERNATIONAL PRIVATE LIMITED
802, Sovereign 4, Vatika City, Sohna Road, Sector 49, Gurgaon 122018, Haryana, India.

Inventors

1. TAKSALI, Anu
802, Sovereign 4, Vatika City, Sohna Road, Sector 49, Gurgaon 122018, Haryana, India.
2. DHANUKA, Gunjan
802, Sovereign 4, Vatika City, Sohna Road, Sector 49, Gurgaon 122018, Haryana, India.

Specification

TECHNICAL FIELD
[0001] The present invention relates to the technical field of locksets for safety purposes. In particular, the present disclosure pertains to a system and method to lock and unlock electro-mechanical lock arranged with a container to provide security to materials present in the container.
BACKGROUND OF INVENTION
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Conventionally, many people use locks for locking and/or unlocking doors, containers, vehicles etc. to improve safety and security of valuable items of the people. In today's world of commerce, materials and/or items are constantly moving in containers or in any other closed enclosures nationally and internationally. Many of these containers carrying materials need to be either controlled or monitored. It is useful to those that are burdened with the responsibility to securely control or monitor these containers in order to have real-time information about the status and location of the materials, and the containers that house/carry those materials. The container can be any enclosure to carry cash, oil or any petrochemicals etc. and the containers can be transported in a vehicle, bus, rails, ships, airplanes etc. For example, it is useful to know the location of the container, condition of the container, and the status, if the container is accessed or tampered with by unauthorized parties such as thieves etc. These materials usually include things such as high value items, jewels, diamonds, cash, weapons, strategic or conventional; hazardous materials; medical or biological related materials; and materials those are time or condition sensitive in nature such as fuel, petroleum, food etc. A variety of means is now employed to attempt this level of control, monitoring and providing security to the materials.
[0004] The oldest of the means is to place the materials in the containers and lock with key at the sending point, and then later unlock the items from the containers at the point of

delivery. This method has limited commercial success as it does not provide any security to the materials and information of the container carrying materials during transport, or if the cargo is taken on a detour. Nor is any indication given if a duplicate key is used to gain access to the materials during transit, and then reseal the container to conceal that access. [0005] Efforts have been made in the art to provide security and safety to the materials and to the containers carrying materials, to mitigate theft by unauthorized people, and to avoid mishap or damage caused to the materials during transit. There are many conventional systems and methods that implement various electronic locks and/or mechanical locks to secure containers during transit.
[0006] The conventional systems implement electronic and/or mechanical locks to an outer wall of the container fitted from outside of the container in order to provide security and safety to the materials and/or items placed inside the container that is used for transport or transit. The implemented mechanical locks can be any traditional mechanical locks such as seal locks, pad locks etc. The implemented electronic locks can be any digital lock with a keypad and a screen to provide secure personal identification number (PIN), password etc. as an input on the keypad to lock and/or unlock the electronic lock in order to close and/or open the container respectively. A few of the conventional systems provide an electro-mechanical lock that is arranged from outside to the container, by embedding both the electronic and mechanical locks as the electro-mechanical lock to provide much more security and safety to the materials transported in the container.
[0007] However, even after implementing the electro-mechanical locks to provide much more security, reliability and safety to the materials, many unauthorized parties may try to unlock, break or tamper the electro-mechanical lock and/or the container carrying materials. After tampering the lock and/or the container, the unauthorized parties may try to steal and/or damage the materials transported in the container during transit. Sometimes, the electro¬mechanical locks that lock the container may break due to rough handling of the container during transit as those locks are installed and/or welded from outside of the container. Many hackers may easily hack the PIN and/or other secured information related to the electro¬mechanical lock in order to steal the materials from the container. There is no any end-to-end security to the containers and there is no proper solution to provide complete security to the container. The traditional systems do not notify/alert authorized users in real-time if any attempt of stealing of the materials or tampering of the container is performed.

[0008] There is, therefore, a need in the art, for a simple, cost-effective and efficient electro-mechanical locking system to provide complete security and safety to materials and to container carrying materials during transit, and provide real-time alerts and/or notifications to users in case of any damage caused to the container.
[0009] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art through comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and with reference to the drawings.
[0010] In some embodiments, the numbers expressing quantities or dimensions of items, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term "about." Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0011] As used in the description herein and throughout the claims that follow, the meaning of "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.
[0012] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. "such as") provided with respect to certain embodiments herein is intended merely to better illuminate the

invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0013] Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any or a combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.
OBJECTS OF THE INVENTION
[0014] A general object of the present disclosure is to provide a system and method for locking and unlocking an electro-mechanical lock.
[0015] An object of the present disclosure is to provide a reliable, simple and cost-effective system for locking and unlocking an electro-mechanical lock. [0016] Another object of the present disclosure is to provide a system and method for locking and unlocking an electro-mechanical lock arranged with a container carrying materials to close and open the container respectively.
[0017] Another object of the present disclosure is to provide a system and method for locking and unlocking an electro-mechanical lock arranged with a container carrying materials to close and open the container respectively in a secure and safety manner. [0018] Another object of the present disclosure is to provide a system and method to lock and unlock an electro-mechanical lock arranged with a container carrying materials to close and open the container respectively in an authorized/authenticated manner. [0019] Yet another object of the present disclosure is to provide a system and method to lock and unlock an electro-mechanical lock arranged with a container carrying materials to close and open the container respectively without tampering and damaging the electro¬mechanical lock.
[0020] These and other objects of the present disclosure will become readily apparent from the following detailed description taken in conjunction with the accompanying drawings.

SUMMARY
[0021] The present invention relates to the technical field of locksets for safety purposes. In particular, the present disclosure pertains to a system and method to lock and unlock electro-mechanical lock arranged with a container to provide security to materials present in the container.
[0022] An aspect of the present disclosure pertains to a system for locking and unlocking an electro-mechanical lock, the system including: the electro-mechanical lock that may include a locking member, the locking member may be configured to move between a first position and a second position; and a switch may be operatively coupled to the locking member, the switch may be adapted to move the locking member between the first position and the second position. The system may include a computing unit that may include one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors to: receive command signals from one or more computing devices of an authorized user, the command signals may include either locking signals or unlocking signals; and transmit a first signal or a second signal to the switch to enable movement of the locking member between the first position and the second position respectively based on the received command signals. The computing unit may transmit the first signal to the switch when the received command signals are the locking signals, in order to move the locking member to the first position to allow locking of the electro-mechanical lock. The computing unit may transmit the second signal to the switch, when the received command signals are the unlocking signals, in order to move the locking member to the second position to allow unlocking of the electro-mechanical lock.
[0023] In an aspect, the electro-mechanical lock may be arranged with a wall of a container from inside of the container for locking and unlocking the electro-mechanical lock to allow closing and opening of the container respectively.
[0024] In another aspect, movement of the locking member to the first position may enable closing of the container to prevent unauthorized access to the container, and movement of the locking member to the second position may enable opening of the container to allow access to the container.

[0025] In another aspect, the computing unit may be configured to send alert signals in real-time to the one or more computing devices of the authorized user when the container is tampered to have an unauthorized access, or when the container is damaged during transit etc. [0026] In another aspect, the system may include a communication module selected from WIFI module, BLUETOOTH module or any other peer-to-peer communication module, and the communication module may be operatively coupled to the computing unit to enable receiving of the command signals from the one or more computing devices of the authorized user and sending of the alert signals to the one or more computing devices. [0027] In another aspect, the system may include a general packet radio service (GPRS) module or any other mobile communication module, and the communication module may be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices. The GPRS module may enable communication between the computing unit and the one or more computing devices through internet. The command signals and alert signals may be stored in a database server operatively coupled to the one or more computing devices.
[0028] In another aspect, the system may include radio frequency identification (RFID) module or any other wireless communication module, and the communication module may be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices.
[0029] In another aspect, the system may include any wired or wireless communication module other than the above-mentioned communication modules, and the communication module may be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices. The one or more computing devices of the authorized user may be installed with mobile application interfaces respectively to communicate with the computing unit using the communication module.
[0030] In yet another aspect, timings and durations of all the signals, timings corresponding to the locking and unlocking of the electro-mechanical lock, timings corresponding to the closing and opening of the container, durations corresponding to the locking and unlocking of the electro-mechanical lock, durations corresponding to the closing

and opening of the container, number of failed tampering attempts of the container, types of items or materials present in the container etc. information may be stored in the database server and/or in a local database operatively coupled to the computing unit. [0031] Another aspect of the present disclosure pertains to a method for locking and unlocking an electro-mechanical lock, the method including the steps of: providing the electro-mechanical lock with a locking member configured to move between a first position and a second position; providing a switch operatively coupled to the locking member, the switch may be configured to move the locking member between the first position and the second position; receiving, by one or more processors, command signals from one or more computing devices of an authorized user, the command signals may include either locking signals or unlocking signals; and transmitting, by the one or more processors, a first signal or a second signal to the switch to enable movement of the locking member between the first position and the second position respectively based on the received command signals. At the step of transmitting, the one or more processors may transmit the first signal to the switch, when the received command signals are the locking signals, in order to move the locking member to the first position to allow locking of the electro-mechanical lock, and the one or more processors may transmit the second signal to the switch, when the received command signals are the unlocking signals, in order to move the locking member to the second position to allow unlocking of the electro-mechanical lock.
[0032] In an aspect, the method may include a step of arranging the electro-mechanical lock with a wall of a container from inside of the container for locking and unlocking the electro-mechanical lock to allow closing and opening of the container respectively. A movement of the locking member to the first position may enable closing of the container to prevent unauthorized access to the container and a movement of the locking member to the second position may enable opening of the container to allow access to the container. [0033] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features. [0034] Within the scope of this application it is expressly envisaged that the various aspects, embodiments, examples and alternatives set out in the preceding paragraphs, in the claims and/or in the following description and drawings, and in particular the individual features thereof, may be taken independently or in any or a combination . Features described

in connection with one embodiment are applicable to all embodiments, unless such features are incompatible.
BRIEF DESCRIPTION OF THE DRAWINGS
[0035] The accompanying drawings are included to provide a further understanding of
the present disclosure, and are incorporated in and constitute a part of this specification. The
drawings illustrate exemplary embodiments of the present disclosure and, together with the
description, serve to explain the principles of the present disclosure.
[0036] FIG. 1 illustrates an exemplary module diagram representation of the system for
locking and unlocking the electro-mechanical lock, in accordance with an embodiment of the
present disclosure.
[0037] FIG. 2 illustrates an exemplary flow diagram representation of the method for
locking and unlocking the electro-mechanical lock, in accordance with an embodiment of the
present disclosure.
[0038] FIG. 3 illustrate an exemplary design representation of the electro-mechanical
locking unit arranged within the container, in accordance with an embodiment of the present
disclosure
[0039] FIG. 4 illustrates a computer system in which or with which embodiments of the
present invention can be utilized in accordance with embodiments of the present disclosure.
DETAILED DESCRIPTION
[0040] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0041] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.

[0042] Embodiments of the present invention include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, and firmware and/or by human operators.
[0043] Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present invention with appropriate standard computer hardware to execute the code contained therein. An apparatus for practicing various embodiments of the present invention may involve one or more computers (or one or more processors within a single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the invention could be accomplished by modules, routines, subroutines, or subparts of a computer program product. [0044] The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth in the appended claims. [0045] Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments. [0046] Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. These exemplary embodiments are provided only for illustrative purposes and so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. The invention disclosed may, however, be embodied in many

different forms and should not be construed as limited to the embodiments set forth herein. Various modifications will be readily apparent to persons skilled in the art. The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure). Also, the terminology and phraseology used is for the purpose of describing exemplary embodiments and should not be considered limiting. Thus, the present invention is to be accorded the widest scope encompassing numerous alternatives, modifications and equivalents consistent with the principles and features disclosed. For purpose of clarity, details relating to technical material that is known in the technical fields related to the invention have not been described in detail so as not to unnecessarily obscure the present invention.
[0047] Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named element.
[0048] Embodiments of the present invention may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The term "machine-readable storage medium" or "computer-readable storage medium" includes, but is not limited to, fixed (hard) drives, magnetic tape, floppy

diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).A machine-readable medium may include a non-transitory medium in which data may be stored and that does not include carrier waves and/or transitory electronic signals propagating wirelessly or over wired connections. Examples of a non-transitory medium may include, but are not limited to, a magnetic disk or tape, optical storage media such as compact disk (CD) or digital versatile disk (DVD), flash memory, memory or memory devices. A computer-program product may include code and/or machine-executable instructions that may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
[0049] Furthermore, embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks (e.g., a computer-program product) may be stored in a machine-readable medium. A processor(s) may perform the necessary tasks.
[0050] Various terms as used herein are shown below. To the extent a term used in a claim is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.
[0051] Embodiments explained herein relate to the technical field of locksets for safety purposes. In particular, the present disclosure pertains to a system and method to lock and unlock electro-mechanical lock arranged with a container to provide security to materials present in the container.

[0052] In an aspect, the present disclosure pertains to a system for locking and unlocking an electro-mechanical lock, the system including: the electro-mechanical lock that can include a locking member, the locking member can be configured to move between a first position and a second position; and a switch can be operatively coupled to the locking member, the switch can be adapted to move the locking member between the first position and the second position. The system can include a computing unit that can include one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors to: receive command signals from one or more computing devices of an authorized user, the command signals can include either locking signals or unlocking signals; and transmit a first signal or a second signal to the switch to enable movement of the locking member between the first position and the second position respectively based on the received command signals. The computing unit can transmit the first signal to the switch when the received command signals are the locking signals, in order to move the locking member to the first position to allow locking of the electro-mechanical lock. The computing device can transmit the second signal to the switch when the received command signals are the unlocking signals, in order to move the locking member to the second position to allow unlocking of the electro-mechanical lock.
[0053] In an embodiment, the switch can be any or a combination of electronic switch, mechanical switch etc. and the locking member can be any mechanical locking member such as mechanical locking bar etc. that can move between the first position and the second position. The switch can be configured to actuate the locking member and retract the locking member for locking and unlocking the electro-mechanical lock.
[0054] In an embodiment, the electro-mechanical lock can be arranged with a wall of a container from inside of the container for locking and unlocking the electro-mechanical lock to allow closing and opening respectively of the container. This can prevent the tampering and/or breaking of the electro-mechanical lock, causing damage to the electro-mechanical lock, stealing of the electro-mechanical lock etc.
[0055] In an embodiment, movement of the locking member to the first position can enable closing of the container to prevent unauthorized access to the container, and movement of the locking member to the second position can enable opening of the container to allow access to the container.

[0056] In an embodiment, the computing unit can be configured to transmit alert signals in real-time to the one or more computing devices of the authorized user when the container is tampered to have an unauthorized access, or when the container is damaged during transit etc.
[0057] In an embodiment, the system can include a communication module selected from wireless fidelity (WIFI) module, BLUETOOTH module or any other peer-to-peer communication module, and the communication module can be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices. [0058] In an embodiment, the system can include a general packet radio service (GPRS) module or any other mobile communication module, and the communication module can be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices. The GPRS module can enable communication between the computing unit and the one or more computing devices through internet. The command signals can be stored in a database server operatively coupled to the one or more computing devices. [0059] In an embodiment, the system can include radio frequency identification (RFID) module or any other wireless communication module, and the communication module can be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices.
[0060] In an embodiment, the system can include any wired or wireless communication module other than the above-mentioned modules, and the module can be operatively coupled to the computing unit to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices. The one or more computing devices of the authorized user can be installed with mobile application interfaces respectively to communicate with the computing unit using the communication module.
[0061] In an embodiment, timings and durations of all the signals, timings corresponding to the locking and unlocking of the electro-mechanical lock, timings corresponding to the closing and opening of the container, durations corresponding to the locking and unlocking of the electro-mechanical lock, durations corresponding to the closing and opening of the

container, number of failed tampering attempts of the container, types of items or materials present in the container etc. information can be stored in the database server and/or in a local database operatively coupled to the computing unit.
[0062] In an aspect, the present disclosure pertains to a method for locking and unlocking an electro-mechanical lock, the method including the steps of: providing the electro¬mechanical lock with a locking member configured to move between a first position and a second position; providing a switch operatively coupled to the locking member, the switch can be configured to move the locking member between the first position and the second position; receiving, by one or more processors, command signals from one or more computing devices of an authorized user, the command signals can include either locking signals or unlocking signals; and transmitting, by the one or more processors, a first signal or a second signal to the switch to enable movement of the locking member between the first position and the second position respectively based on the received command signals. In an embodiment, at the step of transmitting, the one or more processors can transmit the first signal to the switch when the received command signals are the locking signals, in order to move the locking member to the first position to allow locking of the electro-mechanical lock, and the one or more processors can transmit the second signal to the switch when the received command signals are the unlocking signals, in order to move the locking member to the second position to allow unlocking of the electro-mechanical lock. [0063] In an embodiment, the method can include a step of arranging the electro¬mechanical lock with a wall of a container from inside of the container for locking and unlocking the electro-mechanical lock to allow closing and opening of the container respectively. A movement of the locking member to the first position can enable closing of the container to prevent unauthorized access to the container and a movement of the locking member to the second position can enable opening of the container to allow access to the container.
[0064] In an embodiment, the method can include a step of transmitting, by the one or more processors, alert signals in real-time to the one or more computing devices of the authorized user when the container is tampered to have an unauthorized access or when the container is damaged during transit etc.
[0065] In an embodiment, the one or more processors can be configured to receive the command signals from the one or more computing devices of the authorized user and send

the alert signals to the one or more computing devices using a communication module, and the communication module can be any or a combination of WIFI module, BLUETOOTH module, GPRS module, RFTD module etc.
[0066] FIG. 1 illustrates an exemplary module diagram representation of the system for locking and unlocking the electro-mechanical lock, in accordance with an embodiment of the present disclosure.
[0067] According to an embodiment, the system 100 can include one or more processor(s) 102. The one or more processor(s) 102 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) 102 are configured to fetch and execute computer-readable instructions stored in a memory 104 of the system 100. The memory 104 can store one or more computer-readable instructions or routines, which can be fetched and executed to create or share the data units over a network service. The memory 104 can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0068] Various components/units of the proposed system 100 can be implemented as a combination of hardware and programming (for example, programmable instructions) to implement their one or more functionalities as elaborated further themselves or using one or more processors 102. In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the units may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for units may include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implements the various units. In such examples, the system 100 may include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to system 100 and the processing resource. In other examples, the units may be implemented by electronic circuitry. Database 116 may include data that is either stored or

generated as a result of functionalities implemented by any of the other components /units of
the proposed system 100.
[0069] In an embodiment, the system 100 can include the electro-mechanical locking
unit 106. The electro-mechanical locking unit 106 can include a locking member, and the
locking member can be configured to move between a first position and a second position.
[0070] In an embodiment, the system 100 can include a switching unit 108 operatively
coupled to the locking member. The switching unit 108 can include a switch that can be
adapted to move the locking member between the first position and the second position. The
switch can be any or a combination of electronic switch, mechanical switch etc.
[0071] In an embodiment, the system 100 can include one or more computing devices
110 of an authorized user and the one or more computing devices 110 can be configured to
enable transmission of command signals by the authorized user using a mobile application
interface.
[0072] In an embodiment, the system 100 can include a computing unit 112 that can be
configured to control the one or more processor 102 to receive the command signals from the
one or more computing devices 110 of the authorized user and the command signals can
include either locking signals and/or unlocking signals. The computing unit 112 in
combination with the one or more processors 102, the memory 104 and data bus to
interconnect them can be fabricated as an embedded system in order to reduce space of the
system 100 and can make the system 100 portable in order to place the system 100 for
locking any other place other than containers.
[0073] In an embodiment, the computing unit 112 can control the one or more processors
102 to transmit a first signal or a second signal to the switching unit 108 to enable movement
of the locking member between the first position and the second position respectively based
on the received command signals.
[0074] In an embodiment, when the received command signals are the locking signals,
the computing unit 112 can control the one or more processors 102 to transmit the first signal
to the switching unit 108 in order to move the locking member to the first position to allow
locking of the electro-mechanical locking unit 106.
[0075] In an embodiment, when the received command signals are the unlocking signals,
the computing unit 112 can control the one or more processors 102 to transmit the second

signal to the switching unit 108 in order to move the locking member to the second position to allow unlocking of the electro-mechanical locking unit 106.
[0076] In an embodiment, the electro-mechanical locking unit 106 can be arranged with a wall of a container from inside of the container for locking and unlocking the electro-mechanical locking unit 106 to allow closing and opening of the container respectively. This can prevent the tampering/breaking of the electro-mechanical locking unit 106, causing damage to the electro-mechanical locking unit 106, stealing of the electro-mechanical locking unit 106 etc.
[0077] In an embodiment, the movement of the locking member to the first position can enable closing of the container to prevent unauthorized access to the container, and movement of the locking member to the second position can enable opening of the container to allow access to the container.
[0078] In an embodiment, the container can be any enclosure for holding or transporting receptacles. The container can be selected from any or a combination of an oil/petrochemical tanker, a cash enclosure or locker, a jewellery enclosure, a containerized vehicle, a railway wagon, a shipping container etc. The container can carry and/or transport many valuable items or materials such as cash oil, jewellery, food items etc.
[0079] In an exemplary embodiment, the system 100 can be implemented in locking and unlocking doors, vehicles, airplanes etc. other than containers.
[0080] In an embodiment, the computing unit 112 can be configured to transmit alert signals in real-time to the one or more computing devices 110 of the authorized user when the container is tampered to have an unauthorized access, when the container is damaged during transit etc.
[0081] In an embodiment, the system 100 can include a communication module 114 selected from WIFI module, BLUETOOTH module, GPRS module, RFID module or any other wired/wireless communication modules. The communication module 114 can be operatively coupled to the computing unit 112 to receive the command signals from the one or more computing devices 110 of the authorized user and send the alert signals to the one or more computing devices 110.
[0082] In an embodiment, the one or more computing devices 110 can be installed with mobile application interfaces or any other user interfaces to enable communication between the one or more computing devices 110 and the computing unit 112.

[0083] In an embodiment, the system 100 can include the database 116 to store data related to timings and durations of all the signals, timings corresponding to the locking and unlocking of the electro-mechanical locking unit 106, timings corresponding to the opening and closing of the container, durations corresponding to the locking and unlocking of the electro-mechanical locking unit 106, durations corresponding to the closing and opening of the container, number of failed tampering attempts of the container, types of items and/or materials present in the container etc. The database 116 can be a database server and/or a local database coupled to the computing unit 112. The data can also be transmitted to the one or more computing devices 110 of the authorized user or to any other remote control unit through the communication module 114.
[0084] In an embodiment, the system 100 can enable any second user to open or close the container using a key or any other means after authorizing the permission from the authorized user to the second user. This can improve the safety and security to the items and/or materials present in the container.
[0085] It would be appreciated that although the proposed system 100 has been elaborated as above to include all the main units, it is conceivable that actual implementations are well within the scope of the present disclosure, which can include without any limitation, only a part of the proposed units or a combination of those or a division of those into sub-units in various combinations across multiple devices that can be operatively coupled with each other, including in the cloud. Further, the units can be configured in any sequence to achieve objectives elaborated. Also, it can be appreciated that proposed system 100 can be configured in or with a computing device or across a plurality of computing devices operatively connected with each other, wherein the computing devices can be any of a computer, a laptop, a smart phone, an Internet enabled mobile device and the like. Therefore, all possible modifications, implementations and embodiments of where and how the proposed system 100 is configured are well within the scope of the present invention. [0086] FIG. 2 illustrates an exemplary flow diagram representation of the proposed method for locking and unlocking the electro-mechanical lock, in accordance with an embodiment of the present disclosure.
[0087] In an aspect, the proposed method 200 as elaborated hereunder can be described in general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures,

modules, functions, etc., that perform particular functions or implement particular abstract data types. The method 200 can also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[0088] According to an embodiment, the method 200 can include the steps of: at a step 202, providing the electro-mechanical lock with a locking member configured to move between a first position and a second position; at a step 204, providing a switch operatively coupled to the locking member, and the switch can be configured to move the locking member between the first position and the second position; and at a step 206, receiving, by one or more processors, command signals from one or more computing devices of an authorized user, wherein the command signals can include either locking signals or unlocking signals.
[0089] In an embodiment, the method 200 can include at a step 208, transmitting, by the one or more processors, a first signal or a second signal to the switch to enable movement of the locking member between the first position and the second position respectively based on the received command signals
[0090] In an embodiment, at the step 208, when the received command signals are the locking signals, the one or more processors can be configured to transmit the first signal to the switch in order to move the locking member to the first position to allow locking of the electro-mechanical lock.
[0091] In an embodiment, at the step 208, when the received command signals are the unlocking signals, the one or more processors can transmit the second signal to the switch in order to move the locking member to the second position to allow unlocking of the electro-mechanical lock.
[0092] In an embodiment, the method 200 can include a step of arranging the electro-mechanical lock with a wall of a container from inside of the container for locking and unlocking the electro-mechanical lock to allow closing and opening of the container respectively. This can prevent the tampering/breaking of the electro-mechanical lock, causing damage to the electro-mechanical lock, stealing of the electro-mechanical lock etc.

[0093] In an embodiment, movement of the locking member to the first position can enable closing of the container to prevent unauthorized access to the container, and movement of the locking member to the second position can enable opening of the container to allow access to the container.
[0094] In an embodiment, the method 200 can include a step of transmitting, by the one or more processors, alert signals in real-time to the one or more computing devices of the authorized user when the container is tampered to have an unauthorized access or when the container is damaged during transit etc.
[0095] In an embodiment, the one or more processors can be configured to receive the command signals from the one or more computing devices of the authorized user and send the alert signals to the one or more computing devices using a communication module, and the communication module can be any or a combination of WIFI module, BLUETOOTH module, GPRS module, RFID module etc.
[0096] FIG. 3 illustrates an exemplary design representation of the electro-mechanical locking unit arranged within the container, in accordance with an embodiment of the present disclosure.
[0097] In an embodiment, the electro-mechanical locking unit can include a mechanical locking unit and an electronic locking unit coupled with the mechanical locking unit. The mechanical locking unit can include a mechanical locking member such as a locking bar that can be configured to move between locking position and unlocking position. The electro¬mechanical locking unit can be coupled to the inner wall of the container to enhance safety and security to the electro-mechanical locking unit from being tampered or damaged during transit.
[0098] In an embodiment, the electro-mechanical locking unit can include a lever arm that can be arranged to the inner wall of the container using pivot mechanism. The lever arm can be coupled with the electronic locking unit and the locking bar to move the locking bar between the locking position and the unlocking position.
[0099] In an embodiment, the electro-mechanical locking unit can include a locking bar guide to secure the locking bar, and a slider pin bolt. In an exemplary embodiment, the electro-mechanical locking unit can be designed in any other configuration as well to prevent wear and tear of the electro-mechanical locking unit.

[00100] FIG. 4 illustrates a computer system in which or with which embodiments of the present invention can be utilized in accordance with embodiments of the present disclosure. [00101] As shown in FIG. 4, the computer system includes an external storage device 410, a bus 420, a main memory 430, a read only memory 440, a mass storage device 450, communication port 460, and a processor 470. A person skilled in the art will appreciate that computer system may include more than one processor and communication ports. Examples of processor 470 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on a chip processors or other future processors. Processor 470 may include various modules associated with embodiments of the present invention. Communication port 460 can be any of an RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fibre, a serial port, a parallel port, or other existing or future ports. Communication port 460 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[00102] Memory 430 can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. Read only memory 440 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 470. Mass storage 450 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7200 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[00103] Bus 420 communicatively couples processor(s) 470 with the other memory, storage and communication blocks. Bus 420 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI),

USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor 470 to software system. [00104] Optionally, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to bus 420 to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 460. External storage device 410 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[00105] It is noted that the embodiment of the proposed system described herein in detail for exemplary purposes is of course subject to many different variations in structure, design, application and methodology. Because many varying and different embodiments may be made within the scope of the inventive concept(s) herein taught, and because many modifications may be made in the embodiment herein detailed in accordance with the descriptive requirements of the law, it is to be understood that the details herein are to be interpreted as illustrative and not in a limiting sense.
[00106] The various illustrative logical blocks, modules, circuits, and algorithm steps described herein may be implemented or performed as electronic hardware, software, or combinations of both. To clearly illustrate this interchange-ability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. It is noted that the configurations may be described as a process that is depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re¬arranged. A process is terminated when its operations are completed. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.

[00107] When implemented in hardware, various examples may employ a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array signal (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core or any other such configuration.
[00108] When implemented in software, various examples may employ firmware, middleware or microcode. The program code or code segments to perform the necessary tasks may be stored in a computer-readable medium or processor-readable medium such as a storage medium or other storage(s). A processor may perform the necessary tasks. A code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
[00109] As used in this application, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal

having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal).
[00110] In one or more examples herein, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium or processor-readable medium. A processor- readable media and/or computer-readable media include both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer- readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium or processor-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blue-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media. Software may comprise a single instruction, or many instructions, and may be distributed over several different code segments, among different programs and across multiple storage media. An exemplary storage medium may be coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
[00111] One or more of the components, steps, and/or functions illustrated in the Figures may be rearranged and/or combined into a single component, step, or function or embodied in several components, steps, or functions. Additional elements, components, steps, and/or

functions may also be added without departing from the invention. The novel algorithms described herein may be efficiently implemented in software and/or embedded hardware. [00112] The above specific embodiments of the present invention only but are not intended to limit the present invention, any modifications within the principle of the present invention, equivalent substitutions and improvements should be included in the scope of the present invention within.
[00113] In the above, the present invention has been shown and described with respect to certain preferred embodiments. However, the present invention can vary as many without departing from the subject matter of the technical features of the present invention described in the claims below Those of ordinary skill in the belonging to the present is not limited to the above-described embodiment invention art It will be able to change performed. [00114] Finally, it should be noted that the above embodiments are intended to illustrate the present invention, not to limit the scope of the present invention, although the preferred embodiments are described in detail with reference to the description of the present invention, those of ordinary skill in the art should be understood, may be made to the present invention modifications or equivalent replacements without departing from the scope of the technical solutions of the present invention.
[00115] The foregoing object, features and advantages will be able to easily carry out self-technical features of the present invention one of ordinary skill in the art are described later in detail with reference to the accompanying drawings, accordingly. If the detailed description of the known art related to the invention In the following description of the present invention that are determined to unnecessarily obscure the subject matter of the present invention, and detailed description thereof will not be given. It will be described in the following, a preferred embodiment according to the present invention with reference to the accompanying drawings, for example, in detail. Like reference numerals in the drawings, it is used to refer to same or similar elements.
[00116] It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the scope of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to

elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C ... .and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc. The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the scope of the appended claims.
[00117] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art. [00118] In the description of the present specification, reference to the term "one embodiment," "an embodiments", "an example", "an instance", or "some examples" and the description is meant in connection with the embodiment or example described The particular feature, structure, material, or characteristic included in the present invention, at least one embodiment or example. In the present specification, the term of the above schematic representation is not necessarily for the same embodiment or example. Furthermore, the particular features structures, materials, or characteristics described in any one or more embodiments or examples in proper manner. Moreover, those skilled in the art can be described in the specification of different embodiments or examples are joined and combinations thereof.

[00119] All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and/or all of the steps of any method or process so disclosed, may be combined in any combination, except combinations where at least some of such features and/or steps are mutually exclusive.
[00120] Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. Thus, unless expressly stated otherwise, each feature disclosed is one example only of a generic series of equivalent or similar features.
[00121] The invention is not restricted to the details of the foregoing embodiment(s). The invention extends to any novel one, or any novel combination, of the features disclosed in this specification (including any accompanying claims, abstract and drawings), or to any novel one, or any novel combination, of the steps of any method or process so disclosed. [00122] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES
[00123] The present disclosure provides a system and method for locking and unlocking
an electro-mechanical lock.
[00124] The present disclosure provides a reliable, simple and cost-effective system for
locking and unlocking an electro-mechanical lock.
[00125] The present disclosure provides a system and method for locking and unlocking
an electro-mechanical lock arranged with a container carrying materials to close and open the
container respectively.
[00126] The present disclosure provides a system and method for locking and unlocking
an electro-mechanical lock arranged with a container carrying materials to close and open the
container respectively in a secure and safety manner.

[00127] The present disclosure provides a system and method to lock and unlock an electro-mechanical lock arranged with a container carrying materials to close and open the container respectively in an authorized/authenticated manner.
[00128] The present disclosure provides a system and method to lock and unlock an electro-mechanical lock arranged with a container carrying materials to close and open the container respectively without tampering and damaging the electro-mechanical lock.

We Claim:
1. A system for locking and unlocking an electro-mechanical lock, the system comprising:
the electro-mechanical lock comprising a locking member, the locking member configured to move between a first position and a second position;
a switch operatively coupled to the locking member, the switch adapted to move the locking member between the first position and the second position; and
a computing unit comprising one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors to:
receive command signals from one or more computing devices of an authorized user, wherein the received command signals comprise either locking signals or unlocking signals; and
transmit a first signal or a second signal to the switch to enable movement of the locking member between the first position and the second position, respectively, based on the received command signals,
wherein the computing unit transmits the first signal to the switch, when the received command signals are the locking signals, to move the locking member to the first position to allow locking of the electro-mechanical lock, and
wherein the computing unit transmits the second signal to the switch, when the received command signals are the unlocking signals, to move the locking member to the second position to allow unlocking of the electro-mechanical lock.
2. The system as claimed in claim 1, wherein the electro-mechanical lock is arranged with a wall of a container from inside of the container for locking and unlocking the electro-mechanical lock to allow closing and opening of the container respectively, and wherein movement of the locking member to the first position enables closing of the container to prevent unauthorized access to the container, and movement of the locking member to the second position enables opening of the container to allow access to the container.
3. The system as claimed in claim 2, wherein the computing unit is configured to transmit an alert signal in real-time to the one or more computing devices of the authorized user when the container is tampered to have an unauthorized access.

The system as claimed in claim 1, wherein the system comprises a communication
module selected from WIFI module, BLUETOOTH module or any other peer-to-peer
communication module, wherein the communication module is operatively coupled to
the computing unit to receive the command signals from the one or more computing
devices of the authorized user and send the alert signal to the one or more computing
devices.
The system as claimed in claim 1, wherein the system comprises a general packet radio
service (GPRS) module or any other mobile communication module, wherein the
communication module is operatively coupled to the computing unit to receive the
command signals from the one or more computing devices of the authorized user and
send the alert signal to the one or more computing devices.
The system as claimed in claim 1, wherein the system comprises a Radio Frequency
Identification (RFID) module or any other near-field communication module, wherein
the communication module is operatively coupled to the computing unit to receive the
command signals from the one or more computing devices of the authorized user and
send the alert signal to the one or more computing devices.
A method for locking and unlocking an electro-mechanical lock, the method comprising
the steps of:
providing the electro-mechanical lock with a locking member configured to move
between a first position and a second position;
providing a switch operatively coupled to the locking member, the switch is
configured to move the locking member between the first position and the second
position;
receiving, by one or more processors, command signals from one or more
computing devices of an authorized user, wherein the received command signals
comprise either locking signals or unlocking signals; and
transmitting, by the one or more processors, a first signal or a second signal to the
switch to enable movement of the locking member between the first position and the
second position, respectively, based on the received command signals,
wherein the one or more processors transmit the first signal to the switch, when
the received command signals are the locking signals, to move the locking member to
the first position to allow locking of the electro-mechanical lock, and

wherein the one or more processors transmit the second signal to the switch, when
the received command signals are the unlocking signals, to move the locking member
to the second position to allow unlocking of the electro-mechanical lock.
8. The method as claimed in claim 7, wherein the method comprises a step of arranging the
electro-mechanical lock with a wall of a container from inside of the container for
locking and unlocking the electro-mechanical lock to allow closing and opening,
respectively, of the container, and wherein movement of the locking member to the first
position enables closing of the container to prevent unauthorized access to the container,
and movement of the locking member to the second position enables opening of the
container to allow access to the container.

Documents

Application Documents

# Name Date
1 201911018652-IntimationOfGrant05-06-2020.pdf 2020-06-05
1 201911018652-STATEMENT OF UNDERTAKING (FORM 3) [09-05-2019(online)].pdf 2019-05-09
2 201911018652-FORM FOR STARTUP [09-05-2019(online)].pdf 2019-05-09
2 201911018652-PatentCertificate05-06-2020.pdf 2020-06-05
3 201911018652-FORM FOR SMALL ENTITY(FORM-28) [09-05-2019(online)].pdf 2019-05-09
3 201911018652-Annexure [20-03-2020(online)].pdf 2020-03-20
4 201911018652-Written submissions and relevant documents [20-03-2020(online)].pdf 2020-03-20
4 201911018652-FORM 1 [09-05-2019(online)].pdf 2019-05-09
5 201911018652-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [09-05-2019(online)].pdf 2019-05-09
5 201911018652-Correspondence to notify the Controller [29-02-2020(online)].pdf 2020-02-29
6 201911018652-FORM-26 [29-02-2020(online)].pdf 2020-02-29
6 201911018652-EVIDENCE FOR REGISTRATION UNDER SSI [09-05-2019(online)].pdf 2019-05-09
7 201911018652-HearingNoticeLetter-(DateOfHearing-05-03-2020).pdf 2020-02-12
7 201911018652-DRAWINGS [09-05-2019(online)].pdf 2019-05-09
8 201911018652-DECLARATION OF INVENTORSHIP (FORM 5) [09-05-2019(online)].pdf 2019-05-09
8 201911018652-ABSTRACT [03-12-2019(online)].pdf 2019-12-03
9 201911018652-CLAIMS [03-12-2019(online)].pdf 2019-12-03
9 201911018652-COMPLETE SPECIFICATION [09-05-2019(online)].pdf 2019-05-09
10 201911018652-COMPLETE SPECIFICATION [03-12-2019(online)].pdf 2019-12-03
10 201911018652-Proof of Right (MANDATORY) [21-05-2019(online)].pdf 2019-05-21
11 201911018652-CORRESPONDENCE [03-12-2019(online)].pdf 2019-12-03
11 201911018652-FORM-26 [21-05-2019(online)].pdf 2019-05-21
12 201911018652-DRAWING [03-12-2019(online)].pdf 2019-12-03
12 201911018652-Power of Attorney-230519.pdf 2019-05-28
13 201911018652-FER_SER_REPLY [03-12-2019(online)].pdf 2019-12-03
13 201911018652-OTHERS-230519.pdf 2019-05-28
14 201911018652-Correspondence-230519.pdf 2019-05-28
14 201911018652-FER.pdf 2019-09-09
15 201911018652-FORM 18A [10-07-2019(online)].pdf 2019-07-10
15 abstract.jpg 2019-06-18
16 201911018652-FORM-9 [19-06-2019(online)].pdf 2019-06-19
17 abstract.jpg 2019-06-18
17 201911018652-FORM 18A [10-07-2019(online)].pdf 2019-07-10
18 201911018652-FER.pdf 2019-09-09
18 201911018652-Correspondence-230519.pdf 2019-05-28
19 201911018652-FER_SER_REPLY [03-12-2019(online)].pdf 2019-12-03
19 201911018652-OTHERS-230519.pdf 2019-05-28
20 201911018652-DRAWING [03-12-2019(online)].pdf 2019-12-03
20 201911018652-Power of Attorney-230519.pdf 2019-05-28
21 201911018652-CORRESPONDENCE [03-12-2019(online)].pdf 2019-12-03
21 201911018652-FORM-26 [21-05-2019(online)].pdf 2019-05-21
22 201911018652-COMPLETE SPECIFICATION [03-12-2019(online)].pdf 2019-12-03
22 201911018652-Proof of Right (MANDATORY) [21-05-2019(online)].pdf 2019-05-21
23 201911018652-CLAIMS [03-12-2019(online)].pdf 2019-12-03
23 201911018652-COMPLETE SPECIFICATION [09-05-2019(online)].pdf 2019-05-09
24 201911018652-DECLARATION OF INVENTORSHIP (FORM 5) [09-05-2019(online)].pdf 2019-05-09
24 201911018652-ABSTRACT [03-12-2019(online)].pdf 2019-12-03
25 201911018652-HearingNoticeLetter-(DateOfHearing-05-03-2020).pdf 2020-02-12
25 201911018652-DRAWINGS [09-05-2019(online)].pdf 2019-05-09
26 201911018652-FORM-26 [29-02-2020(online)].pdf 2020-02-29
26 201911018652-EVIDENCE FOR REGISTRATION UNDER SSI [09-05-2019(online)].pdf 2019-05-09
27 201911018652-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [09-05-2019(online)].pdf 2019-05-09
27 201911018652-Correspondence to notify the Controller [29-02-2020(online)].pdf 2020-02-29
28 201911018652-Written submissions and relevant documents [20-03-2020(online)].pdf 2020-03-20
28 201911018652-FORM 1 [09-05-2019(online)].pdf 2019-05-09
29 201911018652-FORM FOR SMALL ENTITY(FORM-28) [09-05-2019(online)].pdf 2019-05-09
29 201911018652-Annexure [20-03-2020(online)].pdf 2020-03-20
30 201911018652-PatentCertificate05-06-2020.pdf 2020-06-05
30 201911018652-FORM FOR STARTUP [09-05-2019(online)].pdf 2019-05-09
31 201911018652-IntimationOfGrant05-06-2020.pdf 2020-06-05
31 201911018652-STATEMENT OF UNDERTAKING (FORM 3) [09-05-2019(online)].pdf 2019-05-09
32 201911018652-Response to office action [29-09-2025(online)].pdf 2025-09-29

Search Strategy

1 201911018652_09-08-2019.pdf

ERegister / Renewals

3rd: 09 Jun 2020

From 09/05/2021 - To 09/05/2022

4th: 09 Jun 2020

From 09/05/2022 - To 09/05/2023

5th: 17 Apr 2023

From 09/05/2023 - To 09/05/2024

6th: 25 Apr 2024

From 09/05/2024 - To 09/05/2025

7th: 11 Apr 2025

From 09/05/2025 - To 09/05/2026