Lock control method

ABSTRACT

An activate signal is sent out from a remote controller via a first channel. An authorization process is activated after the activate signal is received by an access control terminal. A control signal is sent out from the remote controller via a second channel to the access control terminal. The access control terminal is unlocked if the control signal received by the access control terminal is verified by the authorization process to be consistent with a predetermined rule. The first channel is different from the second channel.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present application relates to a lock control method, and more particularly, a lock control method using multiple channels for controlling a lock.

2. Description of the Prior Art

According to the prior art, a user operates a remote controller to lock or unlock an anti-theft lock such as a garage lock. When unlocking a lock, a user sends an unlock control signal from a remote controller to the lock to perform an unlock operation such as opening a rolling door. The garage lock of the prior art is always power supplied by a socket and allows the door to be opened when being unlocked. According to the method of the prior art, the said lock/unlock control signal is sent with a single channel.

The lock described above is insecure. When operating a remote controller to send a control signal to lock or unlock, a thief can steal the adopted frequency by a frequency scanning method, and then use the stolen frequency to send a signal for unlocking the door. Hence, the lock of the prior art is easily cracked, and crimes of this sort are quite common. It is necessary to develop a lock control method to improve the anti-theft capability of the locks.

SUMMARY OF THE INVENTION

An embodiment of the present invention discloses a lock control method. The lock control method includes a remote controller sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the remote controller sending a set of control signals sequentially to the access control terminal via a set of second channels by using the telecommunication technology; the access control terminal receiving the set of control signals via the set of second channels; and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule; wherein the first channel is different from the set of second channels.

Another embodiment of the present application discloses a lock control method. The lock control method includes a remote controller selecting a first channel by a first channel selector according to time so as to send an activate signal via the first channel by using a telecommunication technology; an access control terminal selecting the first channel by a second channel selector according to time so as to receive the activate signal via the first channel; the access control terminal activating an authorization process when receiving the activate signal via the first channel; the remote controller selecting a set of second channels by the first channel selector according to time so as to send a set of control signals sequentially to the access control terminal via the set of second channel; the access control terminal selecting the set of second channels by the second channel selector according to time so as to receive the set of control signals sequentially via the set of second channels; and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule.

An additional embodiment of the present application discloses a lock control method. The lock control method includes a remote controller sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the access control terminal sending a rolling code key to the remote controller via a second channel; the remote controller inputting the rolling code key in a rolling code generator so as to generate a rolling code by the rolling code generator; the remote controller sending a control signal including the rolling code to the access control terminal via a third channel by using the telecommunication technology; the access control terminal receiving the control signal via the third channel by using the telecommunication technology; and the access control terminal unlocking a switch and/or a lock when the control signal and the rolling code are verified by the authorization process to be consistent with a predetermined rule.

An additional embodiment of the present application discloses a lock control method. The lock control method includes a remote control module sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the access control terminal sending a rolling code key to a remote controller of the remote control module via a second channel by using the telecommunication technology; the remote controller inputting the rolling code key in a rolling code generator of the remote control module so as to generate a rolling code by the rolling code generator; a signal transmitter of the remote control module sending a control signal including the rolling code to the access control terminal via a third channel by using the telecommunication technology; the access control terminal receiving the control signal via the third channel by using the telecommunication technology; and the access control terminal unlocking a switch and/or a lock when the control signal and the rolling code are verified by the authorization process to be consistent with a predetermined rule.

These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a lock system according to a first embodiment of the present application.

FIG. 2 illustrates a flowchart of a lock control method for controlling the lock system shown in FIG. 1.

FIG. 3 illustrates a lock system according to a second embodiment of the present application.

FIG. 4 illustrates a flow chart of a lock control method for controlling the lock system shown in FIG. 3.

FIG. 5 illustrates a lock system according to a third embodiment of the present application.

FIG. 6 illustrates a flow chart of a lock control method for controlling the lock system shown in FIG. 5.

FIG. 7 illustrates a lock system according to a fourth embodiment of the present application.

FIG. 8 illustrates a flow chart of a lock control method for controlling the lock system shown in FIG. 7.

FIG. 9 illustrates another lock system according to the fourth embodiment of the present application.

DETAILED DESCRIPTION A First Embodiment

FIG. 1 illustrates a lock system 100 according to a first embodiment of the present application. The lock system 100 may include a remote controller 102 and an access control terminal (e.g. a door terminal). The remote controller 102 may include a key 1022 for controlling the remote controller 102. When a user triggers the key 1022, the remote controller 102 may send out a signal including an activate signal 1091 and a control signal 1092. The key 1022 may be any kind of key such as a graphic user interface (GUI) on a touch screen or a mechanical button. The remote controller 102 may include a signal transmitter 1024 for generating and transmitting signals. The access control terminal 104 may include a signal process unit 106 for performing an authorization process used to process and authorize the signals transmitted from the remote controller 102. The signal transmitter 1024 may transmit signals via a single channel or a plurality of channels. The access control terminal 104 may be an anti-theft lock terminal installed at home, office, car or other applications. When the access control terminal 104 is unlocked, a door or an anti-theft equipment of a house or a car is correspondingly unlocked. The communication between the remote controller 102 and the access control terminal 104 may be built by using infra-red technology, radio frequency technology, near field communication (NFC) technology, Wi-Fi technology, Zigbee technology, UHF radio technology, internet network technology, email technology, browser interactive interface technology, instant messaging (IM) technology and/or a mobile phone texting technology.

FIG. 2 illustrates a flowchart of a lock control method 200 for controlling the lock system 100 shown in FIG. 1. The lock control method 200 may include the following steps:

Step 202: the remote controller 102 sends an activate signal 1091 via an activate channel (i.e. a first channel);

Step 204: the access control terminal 104 activates the authorization process when receiving the activate signal 1091 via the activate channel;

Step 206: the remote controller 102 sends a set of control signals 1092 sequentially to the access control terminal 104 via a set of control channels (i.e. second channels);

Step 208: the access control terminal 104 receives the set of control signals 1092 via the set of control channels;

Step 210: the authorization process verifies if the set of control signals 1092 are consistent with a predetermined rule? If yes, go to step 220; if no, go to step 240;

Step 220: the access control terminal 104 unlocks a switch and/or a lock; end; and

Step 240: the access control terminal 104 does not unlock the switch and/or the lock.

According to the lock control method 200, the set of control channels is different from the activate channel. For example, the activate channel may be a channel of 433 megahertz (MHz) frequency while the control channel may be a channel of 868 MHz frequency. Hence, even if a thief hides behind a user's house and uses a frequency scan equipment to recognize that two channels of 433 Mhz and 868 Mhz are adopted around this area, the thief cannot know that the two channels are used in a same lock system because a lock system of the prior art only uses one channel of single frequency. Besides, the set of control channels may further be of one or more frequencies. When the set of control channels are of multiple frequencies, the adopted frequencies may be different from one another. For another example, if the set of control channels includes three control channels for sending a control signal A, a control signal B and a control signal C separately, the frequencies of the three control channels may be 433 MHz, 868 Mhz and 916 MHz separately, and the said activate channel may be with 315 MHz frequency (for sending the activate signal 1091 shown in FIG. 1). The channels and signals are shown in the following table.

sort of channel frequency usage activate 315 MHz sending active channel signal control 433 MHz sending control channel signal A 868 MHz sending control signal B 916 MHz sending control signal C

Referring to FIGS. 1 and 2, in step 202 the remote controller 102 sends the activate signal 1091 to the access control terminal 104 via the activate channel with 315 MHz frequency so that the access control terminal 104 activates an authorization process. In step 206, the control signals A, B and C are sent to the access control terminal 104 via the control channels with 433 MHz, 868 MHz and 916 MHz frequencies separately. In step 210, the signal process unit 106 may verify if the control signals A, B and C are consistent with a predetermined rule such as a predetermined rule set in a lookup table of the authorization process. If the control signals A, B and C are verified to be correct, a switch and/or a door of the access control terminal 104 (e.g. a garage door) is unlocked.

According to the embodiment described above, the access control terminal 104 may be unlocked only when the control signals A, B and C are correct, and (the frequencies of) the channels for the control signals A, B and C are correct. In this way, even if a thief uses a frequency scanner to get several channels and the corresponding frequencies, it is still difficult to know the correct sequence and the sent control signals of those channels. Hence, the lock control method 200 may lead to an anti-theft effect by using multiple channels with different frequencies.

A Second Embodiment

FIG. 3 illustrates a lock system 300 according to a second embodiment of the present application. The lock system 300 includes a remote controller 302 having a signal transmitter 3024, and an access control terminal 304 (e.g. a door terminal) having a signal process unit 306. The signal transmitter 3024 includes a first channel selector 3026, and the signal process unit 306 includes a second channel selector 3062.

FIG. 4 illustrates a flow chart of a lock control method 400 for controlling the lock system 300 shown in FIG. 3. The lock control method 400 may include the following steps.

Step 402: the remote controller 302 selects an activate channel (i.e. a first channel) by the first channel selector 3026 according to time so as to send an activate signal 3091 via the activate channel by using a telecommunication technology;

Step 404: the access control terminal 304 selects the activate channel by the second channel selector 3062 according to time so as to receive the activate signal 3091 via the activate channel;

Step 406: the access control terminal 304 activates an authorization process when receiving the activate signal 3091 via the activate channel;

Step 408: the remote controller 302 selects a set of control channels (i.e. a set of second channels) by the first channel selector 3026 according to time so as to send a set of control signals 3092 sequentially to the access control terminal 304 via the set of control channels;

Step 410: the access control terminal 304 selects the set of control channels by the second channel selector 3062 according to time so as to receive the set of control signals 3092 sequentially via the set of control channels;

Step 412: The authorization process verifies if the set of control signals 3092 are consistent with a predetermined rule? If yes, go to step 414; if no, go to step 416;

Step 414: A switch and/or a door of the access control terminal 304 is unlocked; end; and

Step 416: The switch and/or the door of the access control terminal 304 keeps being locked.

Comparing the lock control method 400 with the said lock control method 300, according to the lock control method 400, the activate channel also differs from the set of the control channels in frequency as the lock control method 300, that is to say, multiple frequencies are also adopted. According to the method 400, the frequency of the activate channel is further selected according to time by the first channel selector 3026 for sending the activate signal 3091 in step 402, and the frequency of the activate channel is selected according to time by the second channel selector 3062 for receiving the activate signal 3091 in step 404. Hence, even if a thief uses a frequency scanner to crack and know the adopted channels, because the adopted channels vary according to time, the cracked channels determined by the thief become invalid after a predetermined period. Similarly, the first channel selector 3026 of the remote controller 302 selects a set of control channels according to time for sending the set of control signals 3092 in step 408, and the second channel selector 3062 of the access control terminal 304 selects the same set of control channels for receiving the set of control signals 3092 in step 410. The used activate channel and the control channel(s) may vary depending on the time at which a user operates the lock system. For example, when a user leaves for office at 7:55 A.M. and comes back home at 8:20 P.M., the activate channel and the control channel(s) selected in the morning may differs from what is selected in the evening in frequency and channel combinations. Hence, the lock system and lock control method may have a good anti-theft effect. The channels and corresponding frequencies may be shown as the following table.

operation time 7:55 A.M. sort of frequency usage channel activate 315 MHz sending active channel signal control 433 MHz sending control channel signal A 868 MHz sending control signal B 916 MHz sending control signal C

operation 8:20 P.M. time sort of channel frequency usage activate 433 MHz sending active channel signal control 868 MHz sending control channel signal A 916 MHz sending control signal B 315 MHz sending control signal C

Hence, the frequencies of the selected activate channel and control channel(s) may vary by time so that the anti-theft effect is improved.

In order for the channels selected by the first channel selector 3026 (of the remote controller 302) to match the channels selected by the second channel selector 3062 (of the access control terminal 304) so as to transmit and receive signals correctly, the first channel selector 3026 and the second channel selector 3062 need to synchronize to one another for the clocks of the two selectors to be synchronous. The remote controller 302 and the access control terminal 304 may sense one another to synchronize via a near-field-communication (NFC) or Bluetooth way. The remote controller 302 and the access control terminal 304 may be embedded radio clocks/watches to be automatically synchronized by time-code signals transmitted by a radio station connected to a time standard such as anatomic clock so that the first and second channel selectors 3026 and 3062 may be synchronized with one another. According to an embodiment of the present application, the tolerance between times measured by the remote controller 302 and the access control terminal 304 may be a predetermined value (e.g. plus-minus 3 seconds) for the channels selected by the first and second channel selectors to match one another without false error so as to transmit/receive the active/control signals correctly.

According to another embodiment of the present application, the channels selected by the first and the second channel selectors may be not limited to radio channels with operating frequencies. The selected channels may be of multiple communication technologies. For example, the selected activate channel may be a UHF radio channel at a first time period and an internet channel accessed by instant massages (IM) at a second time period so as to adopt multiple channels for better security. Furthermore, according to another embodiment of the present application, if using different accounts to send/receive instant massages for transmitting/receiving signals via an internet between the remote controller and the access control terminal (e.g. a garage door terminal), this may be regarded as using different channels (i.e. multiple channels) to transmit/receive signals.

A Third Embodiment

FIG. 5 illustrates a lock system 500 according to a third embodiment of the present application. The lock system 500 includes a remote controller 502 having a signal transmitter 5024 including a rolling code generator 5026, and an access control terminal 504 having a signal process unit 506. The remote controller 502 is configured to send an activate signal 5091, send a control signal 5092 and receive a rolling code key 5099. The access control terminal 504 is configured to receive the activate signal 5091, receive the control signal 5092 and send the rolling code key 5099. The rolling code generator 5026 is configured to generate a rolling code 5094 according to the received rolling code key 5099. The signal process unit 506 is configured to process the activate signal 5091 and the control signal 5092 received from the remote controller 502, and generate the rolling code key 5099. As shown in FIG. 5, the rolling code 5094 is carried by the control signal 5092.

FIG. 6 illustrates a flow chart of a lock control method 600 for controlling the lock system 500 in FIG. 5. The lock control method 600 includes the following steps.

Step 602: the remote controller 502 sends the activate signal 5091 via an activate channel (first channel) by using a telecommunication technology;

Step 604: the access control terminal 504 activates an authorization process when receiving the activate signal 5091 via the activate channel;

Step 606: the access control terminal 504 sends the rolling code key 5099 to the remote controller 502 via a first control channel (a second channel);

Step 608: the remote controller 502 inputs the rolling code key 5099 in the rolling code generator 5026 so as to generate the rolling code 5094 by the rolling code generator 5026;

Step 610: the remote controller 502 sends the control signal 5092 including the rolling code 5094 to the access control terminal 504 via a second control channel (a third channel) by using the telecommunication technology;

Step 612: the access control terminal 504 receives the control signal 5092 via the second control channel by using the telecommunication technology;

Step 614: the authorization process verifies if the control signal 5092 and the rolling code 5094 are consistent with a predetermined rule? If yes, go to step 616; if no, go to step 618;

Step 616: the access control terminal 504 unlocks a switch and/or a lock when the control signal 5092 and the rolling code 5094 are verified by the authorization process to be consistent with a predetermined rule; end; and

Step 618: the access control terminal 504 does not unlock the switch and/or the lock when the control signal 5092 and the rolling code 5094 are verified by the authorization process to be not consistent with the predetermined rule.

In the lock control method 500, the activate channel for sending the activate signal 5091, the first channel for sending the rolling code key 5099 and the second control channel for sending the control signal 5092 may differ from one another. In steps 606 and 608, the access control terminal 504 sends the rolling code key 5099 to the remote controller 502 for the rolling code generator 5026 to generate the rolling code 5094. According to an embodiment of the present application, the rolling code generator 5026 may include a mathematical function and/or a decode table used for generate the rolling code 5094 according to the rolling code key 5099. The rolling code 5094 is a non-fixed secret code used to increase the difficulty of cracking the lock system. The said rolling code key 5099 may be a seed parameter for generating the non-fixed secret code (i.e. the rolling code 5094).

Multiple algorithms or means may be used to generate the rolling code 5094 according to the rolling code key 5099. One of them is shown in the following table.

Signal name Content of signal Rolling code key 5099 1 3 5 A table included in the 2 4 rolling code generator 5026 for generating the rolling code 5094 The rolling code 5094 1 2 3 4 5 generated by the rolling code generator 5026 according to the rolling code key 5099 The predetermined rule 1 2 3 4 5 used by the signal process unit 506 for verifying the rolling code 5094

According to this embodiment, the rolling code 5094 is generated by filling the rolling code key 5099 into blanks of a table used to generate the rolling code 5094. When the access control terminal 504 (e.g. a door terminal) sends the rolling code key 5099 (e.g.

shown in the above table), the authorization process has set a verification code (e.g.

shown in the above table) corresponding to the rolling code key 5099 as the predetermined rule for verifying the received control signal. Hence, when a thief just uses a frequency scanner to know the used channels without knowing the mechanism of generating the rolling code 5094 by using the rolling code key 5099 and the rolling code generator 5026, it is difficult to crack the lock system. The table shown above is merely an example for describing the generation and verification of the rolling code 5094 by using the rolling code key 5099, other algorisms and means (e.g. mathematical functions) may be used to generate the rolling code 5094 with the rolling code key 5099 according to another embodiment of the present application.

A Fourth Embodiment

FIG. 7 illustrates a lock system 700 according to a fourth embodiment of the present application. The lock system 700 includes a remote control module 702 and an access control terminal 704. The remote control module 702 is configured to transmit an activate signal 7091, transmit a control signal 7091 and receive a rolling code key 7099. The remote control module 702 includes a remote controller 7021 and a signal transmitter 7024. The remote controller 7021 is configured to transmit the activate signal 7091 and receive and transmit the rolling code key 7099. The signal transmitter 7024 includes a rolling code generator 7026. The rolling code generator 7026 is configured to generate a rolling code 7094 according to the rolling code key 7099. The access control terminal 704 (e.g. a door terminal) includes a signal process unit 706. The signal process unit 706 is configured to process the activate signal 7091 and a control signal 7092 received by the access control terminal and generate the rolling code key 7099. As shown in FIG. 7, the rolling code 7094 may be carried in the control signal 7092.

FIG. 8 illustrates a flow chart of a lock control method 800 for controlling the lock system 700 shown in FIG. 7. The lock control method 800 includes the following steps.

Step 802: The remote control module 702 sends the activate signal 7091 via an activate channel (a first channel) by using a telecommunication technology;

Step 804: the access control terminal 704 activates an authorization process when receiving the activate signal 7091 via the activate channel;

Step 806: the access control terminal 704 sends a rolling code key 7099 to the remote controller 7021 of the remote control module 702 via a first control channel (a second channel) by using the telecommunication technology;

Step 808: the remote controller 7021 inputs the rolling code key 7099 in the rolling code generator 7026 of the remote control module 702 so as to generate the rolling code 7094 by the rolling code generator 7026;

Step 810: the signal transmitter 7024 of the remote control module 702 sends the control signal 7092 including the rolling code 7092 to the access control terminal 704 via a second control channel (a third channel) by using the telecommunication technology;

Step 812: the access control terminal 704 receives the control signal 7092 via the second control channel by using the telecommunication technology;

Step 814: the signal process unit 706 verifies if the control signal 7092 and the rolling code carried by the control signal 7092 are consistent with a predetermined rule? If yes, go to step 816; if no, go to step 818;

Step 816: the access control unit 804 unlocks a switch and/or a lock; end; and

Step 818: the access control unit 804 does not unlock the switch and/or the lock.

According to the fourth embodiment of the present application shown in FIGS. 7 and 8, the remote controller shown in FIG. 1, 3 or 5 is replaced by the remote control module 702. The said remote controller 7021 may be a mobile phone; the signal transmitter 7024 may be an automotive electronic device or a security alarm device. Taking the access control terminal 704 which is a garage door for example, when a user arrives home, the user may operate the remote controller 7021 (e.g. a mobile phone) to send the activate signal 7091 to the access control terminal 704 via a telecommunication technology such as UHS radio, Wi-Fi, text message and/or instant message tool (e.g. Skype®, WhatsApp®). When receiving the activate signal, the access control terminal 704 may send back the rolling code key 7099 to the remote controller 7021 (e.g. a mobile phone). For example, the rolling code key 7099 may be a one-time password (OTP) sent by a text message. The remote controller 7021 may send the rolling code key 7099 to the signal transmitter 7024 (e.g. a signal transmitter installed in a car) via a rolling code key path (e.g. a Bluetooth channel, an NFC channel, or being entered manually by the user). The rolling code generator 7026 of the signal transmitter 7024 may generate the rolling code 7094 according the rolling code key 7099. The signal transmitter 7024 may send the control signal 7094 carrying the rolling code 7094 (e.g. by using carrier wave) to the access control terminal 704 for the authorization process activated by the access control terminal 704 to verify if the control signal 7092 and the rolling code 7094 are consistent with the predetermined rule.

According to an embodiment of the present application, when the remote controller 7021 is a smart phone, a user may download a mobile application (aka app) provided by a vendor of the lock system for using the lock system and the lock control method shown in FIGS. 7 and 8. Although the signal transmitter 7024 is included in the remote control module 702 along with the remote controller 7021, the signal transmitter 7024 may also installed with the access control terminal 704 (e.g. a door terminal). For example, when the access control terminal 704 is a door of a strongbox, the signal transmitter 7024 may be installed on the strongbox. When a user attempts to open the strongbox, the user may send the activate signal 7091 by the remote controller 7021 (e.g. a smart phone or a dedicated remote controller), the remote controller 7021 may then receive the rolling code key 7099 (e.g. a set of OTP expired in 30 seconds). The user may input the received rolling code key 7099 in the signal transmitter 7024, for example, by keying in the rolling code key 7099 via a number pad of the signal transmitter 7024 installed on the strongbox. The rolling code 7094 may be generated by the rolling code generator 7026 and sent out by being carried by the control signal 7092 to the access control terminal 704 from the signal transmitter 7024 for unlocking the access control terminal 704 (e.g. opening the strongbox) safely if the rolling code 7094 and the control signal 7092 are consistent with the predetermined rule. The way of generating the rolling code 7094 according to the rolling code key 7099 and verifying the rolling code 7094 and the control signal 7092 (e.g. by using a lookup table) may be similar to what described above according to the third embodiment, so it is not repeated again.

FIG. 9 illustrates another lock system 900 according to the fourth embodiment of the present application. The lock system 900 is similar to the lock system 700, however, when a user of the lock system 900 attempts to unlock the access control terminal 704, the user may send an inform signal 990 to the signal transmitter 7024 via an third control channel (i.e. an inform channel) for the signal transmitter 7024 to send the activate signal 7091 to the access control terminal 704. When the remote controller 7099 receives the rolling code key 7099, the rolling code 7094 is generated by the rolling code generator 7026 included in the remote controller 7021 instead of being included in the signal transmitter 7024 as shown in FIG. 7. The remote controller 7021 (e.g. a smart phone) may thus generate the rolling code 7094 and send the rolling code 7094 to the signal transmitter 7024 (e.g. an automotive electronic device) for transmitting the control signal 7092 carrying the rolling code 7094 (e.g. by using carrier wave) to the access control terminal 704, and the authorization process may verify the control signal 7092 and the rolling code 7094 carried by the control signal 7092. The described rolling code generator may be integrated in the remote controller or the signal transmitter of the remote control module according to the fourth embodiment of the present application. The described activate signal may be sent to the access control terminal by the remote controller or the signal transmitter of the remote control module according to the fourth embodiment of the present application.

CONCLUSION

According to the described embodiments of the present application, the activate channel and a set of control channels different from the activate channel (i.e. multiple channels) may be adopted for better anti-theft effects. The said activate channel and the set of control channels may be fixed or vary by time. A non-fixed rolling code may be carried by the control signal for increasing the difficulty of cracking the lock system. According to the third and fourth embodiments, the rolling code may be generated further according to the rolling code key sent from the access control terminal to further increase the burden of cracking the lock system.

The said rolling code key may be generated by time of operating when the remote controller or the remote control module is well synchronized with the access control terminal. Taking the following tables for example, each rolling code is generated according to a corresponding rolling code key, and the rolling code varies with time of generation. For example, the rolling code generated at 9:36 A.M. is different from the rolling code generated at 8:14 P.M. That is to say, the rolling code is generated according to time and the rolling code key, so it is more difficult to crack the lock system.

Operating time 9:36 A.M. Signal name Content of signal The rolling code key of the 3 3 3 operating time The table of the rolling code 2 4 generator used for generating the rolling code of the operating time The rolling code generated 3 2 3 4 3 according to the rolling code key The predetermined rule of the 3 2 3 4 3 operating time for the authorization process of the access control terminal to verify the rolling code

Operating time 8:14 PM Signal name Content of signal The rolling code key of the 5 7 7 operating time The table of the rolling code 3 3 generator used for generating the rolling code of the operating time The rolling code generated 5 3 7 3 7 according to the rolling code key The predetermined rule of the 5 3 7 3 7 operating time for the authorization process of the access control terminal to verify the rolling code

According to the first to fourth embodiments described above, the access control terminal activating the authorization process when receiving the activate signal via the activate channel may be the access control terminal being turned on and activating the authorization process when receiving the activate signal. In other words, according to an embodiment of the present application, the electrical power supplying the signal process unit of the access control terminal may not be turned on before receiving the activate signal, and the lock system may not be unlocked even receiving correct control signals if not receiving the activate signal. Hence, the security is improved.

In FIG. 1, a key 1022 on the remote controller 102 is shown for a user to control (e.g. touch or press) to send signal, however, the key 1022 may be replaced with a graphic user interface (GUI), a voice control interface or other means. According to embodiments of the present application, the remote controller may be, inter alia, a button controller, a voice control device, a smart phone, a tablet computer, a laptop computer and/or a wearable device. The remote controller may include an identity recognition device such as a fingerprint recognition unit, a voiceprint recognition unit, a facial recognition device and/or an iris recognition device. The said telecommunication technology may be an infra-red technology, a radio frequency technology, a near field communication technology, a Wi-Fi technology, a Zigbee technology, a UHF radio technology, an internet network technology, an email technology, a browser interactive interface technology, an instant messaging (IM) technology and/or a mobile phone texting technology. The described multiple channels (also known as multi-channel) may be implemented not only by multiple channels with different frequencies respectively but also by channels of different communication technologies. For example, it may be regarded as using the said multiple channels when sending the activate signal via a UHF radio channel, receiving the rolling code key via a text message and transmitting the control signal via an NFC path. Furthermore, sending/receiving different signals with different IP addresses and/or different internet ports may be regarded as communicating with multiple channels. For example, a first port 127.0.0.1:8000 and a second port 127.0.0.1:8080 may be regarded as two different channels according to an embodiments of the present application.

In summary, the lock control method disclosed according to embodiments of the present application may increase the difficulty of cracking an anti-theft lock system by using multiple channels and the rolling codes, and the adopted multiple channels and rolling codes may be selected or generated by time so as to vary by time rather than staying fixed. The rolling code may be generated according to the rolling key for preventing a thief to duplicate a fake rolling code generator. Therefore, the lock system and the lock control method disclosed according to the present application can improve the security of the lock system greatly.

Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims. 

What is claimed is:
 1. A lock control method comprising: a remote controller sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the remote controller sending a set of control signals sequentially to the access control terminal via a set of second channels by using the telecommunication technology; the access control terminal receiving the set of control signals via the set of second channels; and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule; wherein the first channel is different from the set of second channels.
 2. The method of claim 1, wherein each control signal of the set of control signals comprises a rolling code generated by the remote controller by time, and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule is: the access control terminal unlocking the switch and/or the lock when the rolling codes of the set of control signals are verified by the authorization process to be consistent with a predetermined rule.
 3. The method of claim 1, wherein the first channel and the set of second channels are recorded in the remote controller and the access control terminal in advance.
 4. The method of claim 1, wherein the access control terminal activating the authorization process when receiving the activate signal via the first channel is: the access control terminal turning on a signal process unit and activating the authorization process of the signal process unit when receiving the activate signal via the first channel.
 5. The method of claim 1, wherein the telecommunication technology is: an infra-red technology, a radio frequency technology, a near field communication technology, a Wi-Fi technology, a Zigbee technology, a UHF radio technology, an internet network technology, an email technology, a browser interactive interface technology, an instant messaging (IM) technology, and/or a mobile phone texting technology.
 6. A lock control method, comprising: a remote controller selecting a first channel by a first channel selector according to time so as to send an activate signal via the first channel by using a telecommunication technology; an access control terminal selecting the first channel by a second channel selector according to time so as to receive the activate signal via the first channel; the access control terminal activating an authorization process when receiving the activate signal via the first channel; the remote controller selecting a set of second channels by the first channel selector according to time so as to send a set of control signals sequentially to the access control terminal via the set of second channels; the access control terminal selecting the set of second channels by the second channel selector according to time so as to receive the set of control signals sequentially via the set of second channels; and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule.
 7. The method of claim 6, wherein the first channel selector and the second channel selector are synchronized with one another so that time measured by the first channel selector is synchronous with time measured by the second channel selector when selecting the first channel and the set of second channels.
 8. The method of claim 6, wherein each control signal of the set of control signals comprises a rolling code generated by the remote controller by time, and the access control terminal unlocking a switch and/or a lock when the set of control signals is verified by the authorization process to be consistent with a predetermined rule is: the access control terminal unlocking the switch and/or the lock when the rolling codes included in the set of control signals are verified by the authorization process to be consistent with a predetermined rule.
 9. The method of claim 6, wherein the access control terminal activating the authorization process when receiving the activate signal via the first channel is: the access control terminal turning on a signal process unit and activating the authorization process of the signal process unit when receiving the activate signal via the first channel.
 10. The method of claim 6, the telecommunication technology is: an infra-red technology, a radio frequency technology, a near field communication technology, a Wi-Fi technology, a Zigbee technology, a UHF radio technology, an internet network technology, an email technology, a browser interactive interface technology, an instant messaging (IM) technology, and/or a mobile phone texting technology.
 11. A lock control method, comprising: a remote controller sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the access control terminal sending a rolling code key to the remote controller via a second channel; the remote controller inputting the rolling code key in a rolling code generator so as to generate a rolling code by the rolling code generator; the remote controller sending a control signal including the rolling code to the access control terminal via a third channel by using the telecommunication technology; the access control terminal receiving the control signal via the third channel by using the telecommunication technology; and the access control terminal unlocking a switch and/or a lock when the control signal and the rolling code are verified by the authorization process to be consistent with a predetermined rule.
 12. The method of claim 11, wherein the remote controller inputting the rolling code key in the rolling code generator of the remote control module so as to generate the rolling code by the rolling code generator is: the remote controller inputting the rolling code key in the rolling code generator of the remote control module so as to generate the rolling code according to time and the rolling code key.
 13. The method of claim 11, wherein the access control terminal activating the authorization process when receiving the activate signal via the first channel is: the access control terminal turning on a signal process unit and activating the authorization process of the signal process unit when receiving the activate signal via the first channel.
 14. A lock control method, comprising: a remote control module sending an activate signal via a first channel by using a telecommunication technology; an access control terminal activating an authorization process when receiving the activate signal via the first channel; the access control terminal sending a rolling code key to a remote controller of the remote control module via a second channel by using the telecommunication technology; the remote controller inputting the rolling code key in a rolling code generator of the remote control module so as to generate a rolling code by the rolling code generator; a signal transmitter of the remote control module sending a control signal including the rolling code to the access control terminal via a third channel by using the telecommunication technology; the access control terminal receiving the control signal via the third channel by using the telecommunication technology; and the access control terminal unlocking a switch and/or a lock when the control signal and the rolling code are verified by the authorization process to be consistent with a predetermined rule.
 15. The method of claim 14, wherein the remote control module sending the activate signal via the first channel by using the telecommunication technology is: the remote controller of the remote control module sending the activate signal via the first channel by using the telecommunication technology.
 16. The method of claim 14, wherein the remote control module sending the activate signal via the first channel by using the telecommunication technology is: the remote controller of the remote control module informing the signal transmitter of the remote control module via a fourth channel to send the activate signal via the first channel by using the telecommunication technology.
 17. The method of claim 14, wherein the remote controller inputting the rolling code key in the rolling code generator of the remote control module so as to generate the rolling code by the rolling code generator is: the remote controller inputting the rolling code key in the rolling code generator of the remote controller so as to generate the rolling code by the rolling code generator; and the remote controller sending the rolling code to the signal transmitter via a fourth channel.
 18. The method of claim 14, wherein the remote controller inputting the rolling code key in the rolling code generator of the remote control module so as to generate the rolling code by the rolling code generator is: the remote controller sending the rolling code key to the signal transmitter via a fourth channel; and the rolling code generator of the signal transmitter generating the rolling code according to the rolling code key.
 19. The method of claim 14, wherein the remote controller inputting the rolling code key in a rolling code generator of the remote control module so as to generate a rolling code by the rolling code generator is: the remote controller inputting the rolling code key in a rolling code generator of the remote control module so as to generate a rolling code according to time and the rolling code key.
 20. The method of claim 14, wherein the access control terminal activating the authorization process when receiving the activate signal via the first channel is: the access control terminal turning on a signal process unit and activating the authorization process of the signal process unit when receiving the activate signal via the first channel. 