Wireless lock

ABSTRACT

A network lock system and a method for operating the network lock system. The network lock system includes a lock mechanism and a device adapter for applying a power signal to a lock mechanism in which a bolt and a latch are locked together. The lock mechanism includes an electromagnet and a compressible spring. The power signal provides power to the electromagnet which causes the bolt to be attracted into the electromagnet by an electromagnetic force exceeding a compression force of a spring which causes the bolt to be released from the latch and causes the bolt to be surrounded by the electromagnet. Withdrawing the power signal from the lock mechanism removes the power provided to the lock mechanism which removes the electromagnetic force resulting in the compression force of the spring pushing the bolt into the latch causing the bolt and the latch to be locked together.

This application is a continuation application claiming priority to Ser.No. 15/258,516, filed Sep. 7, 2016, now U.S. Pat. No. 10,354,464, issuedJul. 16, 2019, which is a continuation of Ser. No. 14/947,170, filedNov. 20, 2015, U.S. Pat. No. 9,483,891, issued Nov. 1, 2016.

TECHNICAL FIELD

The present invention relates to a wireless lock, and more specificallyto a locking mechanism that can work with mobile devices to providedigital access to restricted areas.

BACKGROUND

It is known to use existing Wi-Fi networks to provide power tobattery-free devices at a range of up to 20 feet.

SUMMARY

Embodiments of the present invention provide a network lock system and amethod for operating the network lock system. The method includes:receiving a wireless signal from a wireless network device; convertingthe wireless signal into a power signal; and locking together a firstlock part to a second lock part, or unlocking the first lock part lockedto the second lock part, on application of the power signal to a lockmechanism that includes the first lock part and the second lock part.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present invention will now be described, by way ofexample only, with reference to the following drawings.

FIG. 1 is a diagram of an apparatus including a network lock system, inaccordance with embodiments of the present invention.

FIG. 2 is a diagram of a Wi-Fi locking module, in accordance withembodiments of the present invention.

FIG. 3 is a flow diagram of a Wi-Fi pairing method, in accordance withembodiments of the present invention.

FIG. 4 is a flow diagram of a Wi-Fi lock method, in accordance withembodiments of the present invention.

FIGS. 5A, 5B and 5C are schematic state diagrams of exemplary lockmechanisms, in accordance with embodiments of the present invention.

DETAILED DESCRIPTION

FIG. 1 is a diagram of an apparatus including a network lock system 10,in accordance with embodiments of the present invention. The networklock system 10 is operational with respect to a microcontroller 12, butwould be operational with numerous other general purpose or specialpurpose computing system environments or configurations.

Network lock system 10 includes: microcontroller 12; lock volume 14;lock mechanism 15; and switches 16. Network lock system 10 is connectedto a wireless network via Wi-Fi aerial 17. The lock volume 14 includesthe lock mechanism 15 and the switches 16. A Wi-Fi device 11 is not partof the defined network lock system 10 but is operative in oneembodiment; for example, a mobile phone that is capable of creating aWi-Fi network hotspot on a specific wireless channel with a networkidentifier and an authentication PIN.

In one embodiment, lock volume 14 is a safe with a door having lockmechanism 15 adapted to lock and unlock the door. Switches 16 areadapted to be accessible in the safe with the safe door unlocked andopen, but to be inaccessible in the safe with the safe door closed andlocked. In other embodiments, the switches 16 could be positioned in adoor edge or elsewhere that is inaccessible except when the lock isunlocked and the safe door is open.

Lock mechanism 15 includes a first lock part and second lock part thatmay be locked together. In one embodiment, one part of the lock partsincludes an electrically controllable bolt to engage in locking andunlocking and another part of the lock parts is a latch that is lockablewith the bolt. In one embodiment, the controllable bolt includes anelectromagnetic bolt that engages a latch on application of the powersignal to a corresponding electromagnetic circuit (see example in FIGS.5A, 5B and SC). In another embodiment, the controllable bolt includes anelectroactive polymer bolt that engages a latch on application of thepower signal. In one embodiment, the lock parts are locked together orunlocked from each other after a threshold amount of energy has built upfrom the power signal. The energy is stored in battery 25.

Switches 16 include: channel switch 16A; network ID switch 16B; andauthentication PIN switch 16C. Channel switch 16A is a set ofmicro-switches used by a user to set a Wi-Fi channel for a wirelesssignal to operate the network lock system 10. Network ID switch 16B is aset of micro-switches used by the user to set a Wi-Fi network for awireless signal to operate the network lock system 10. AuthenticationPIN switch 16C is a set of micro-switches used by the user to set anauthentication PIN for a wireless signal to operate the network locksystem 10.

Wi-Fi aerial 17 comprises a loop antenna for receiving Wi-Fi signals. Inone embodiment, the wireless signal is a Wi-Fi signal, and the Wi-Fisignal is converted into a power signal.

Microcontroller 12 may be described in the general context of computersystem executable instructions, such as program modules, being executedby a computer processor. Generally, program modules may include:routines; programs; objects; components; logic; and data structures thatperform particular tasks or implement particular data types.

Microcontroller 12 includes: central processing unit (CPU) 22; harvester24; battery 25; battery controller 26; device adapter 27; bus 28 andmemory 30.

CPU 22 loads machine instructions from memory 30 and performs machineoperations in response to the instructions. Such machine operationsinclude: incrementing or decrementing a value in a register;transferring a value from memory 30 to a register or vice versa;branching to a different location in memory if a condition is true orfalse (also known as a conditional branch instruction); and adding orsubtracting the values in two different registers and loading the resultin another register. A typical CPU can perform many different machineoperations. A set of machine instructions is called a machine codeprogram, the machine instructions are written in a machine code languagewhich is referred to a low level language. A computer program written ina high level language needs to be compiled to a machine code programbefore it can be run. Alternatively a machine code program such as avirtual machine or an interpreter can interpret a high level language interms of machine operations.

Harvester 24 is for receiving a wireless signal and also for convertinga wireless signal into a power signal. Harvester 24 includes: a wirelesssignal receiver; a rectifier; and a direct current convertor. In oneembodiment, harvester 24 can analyse a received wireless signal andconvert the received wireless signal into a power signal at the sametime. The rectifier is for converting a radio frequency signal (theWi-Fi signal) into a direct current (a DC electrical current as opposedto an alternating current (AC)). The direct current convertor, forexample a transformer, is for converting the rectified direct current toa voltage compatible with battery 25, microcontroller 12 and lockmechanism 15. Harvester 24 operates independently of the microcontroller12 and is operational for converting wireless signals into power signalseven when microcontroller 12 is turned off and not operating.

Battery 25 is for storing electricity from the power signal of harvester24.

Battery controller 26 is for turning the microcontroller 12 on and offand can independently monitor battery 25 to determine if there is enoughpower and for turning on microcontroller 12 to enable the fullfunctionality of network lock system 10. When there is enough power inthe battery, the battery controller periodically turns onmicrocontroller 12.

Device adapter 27 is connected to lock mechanism 15 and switches 16 toenable communication among lock mechanism 15, switches 16, andmicrocontroller 12. For example, microcontroller 12 activates deviceadapter 27 with a lock signal and device adapter 27 applies a powersignal to lock mechanism 15.

Bus 28 couples the main system components together including memory 30to CPU 22.

Memory 30 includes computer system readable media in the form ofvolatile memory 32 and non-volatile or persistent memory 34. Examples ofvolatile memory 32 are random access memory (RAM) 36 and cache memory38. Examples of persistent memory 34 are read only memory (ROM) anderasable programmable read only memory (EPROM). Generally, volatilememory is used because volatile memory is faster than non-volatile orpersistent memory, and generally non-volatile memory or persistentmemory is used because non-volatile memory or persistent memory willhold the data for longer periods of time than volatile memory. Networklock system 10 may further include other removable and/or non-removable,volatile and/or non-volatile computer system storage media. By way ofexample only, persistent memory 34 can be provided for reading from andwriting to a non-removable, non-volatile magnetic media (not shown and,in some embodiments, a magnetic hard disk or solid-state drive). As willbe further depicted and described below, memory 30 may include at leastone program product having a set (for example, at least one) of programmodules that are configured to carry out the functions of embodiments ofthe invention.

The program module configured to carry out the functions of embodimentsof the present invention includes Wi-Fi locking module 200. In oneembodiment, ROM in the memory 30 stores Wi-Fi locking module 200 thatenables the microcontroller 12 to function as a special purpose computerspecific to the Wi-Fi locking module 200. Further program modules thatsupport embodiments of the present invention, but are not shown in FIG.1, include firmware, boot strap program, operating system, and supportapplications.

FIG. 2 is a diagram of a Wi-Fi locking module 200, in accordance withembodiments of the present invention. The Wi-Fi locking module 200includes: Wi-Fi controller 202; and Wi-Fi lock method 400. The Wi-Filock method 400 is depicted in FIG. 4, described infra.

Wi-Fi controller 202 is for receiving and decrypting the wirelesssignal. Wi-Fi controller 202 uses the value stored in the channel switch16A to tune itself to receive a Wi-Fi signal on the correct channel.Wi-Fi controller 202 uses the value on network ID switch 16B to locateand receive an identified Wi-Fi signal. If there is an identified butencrypted Wi-Fi signal, then Wi-Fi controller 202 uses theauthentication PIN from authentication PIN switch 16C to decrypt andreceive the encrypted Wi-Fi signal. In response to the identified Wi-Fisignal having been successfully decoded, a lock signal is generated toactivate the device adapter 27 and switch the lock mechanism 15 fromlocked to unlocked. To switch the lock mechanism 15 from unlocked tolocked, the lock signal is withdrawn from the device adapter 27, and thepower signal is withdrawn from the lock mechanism 15.

FIG. 3 is a flow diagram of a Wi-Fi pairing method 300, in accordancewith embodiments of the present invention. The Wi-Fi pairing method 300of FIG. 3 includes steps 302 to 314. Wi-Fi pairing method 300 is a usermethod and is not directly part of the network lock system 10. In orderto ensure that only a restricted set of devices are able to unlocknetwork lock system 10, a pairing state must be available thatconfigures network lock system 10 and Wi-Fi device 11 to communicatewith each other. Information is set in both network lock system 10 andWi-Fi device 11, which can be done in a number of ways, and in oneembodiment, by a user setting manual micro-switches on the inside of thelock volume 14 that are only accessible if lock mechanism 15 is opened.The shared information includes: wireless channel, wireless network ID;and an authentication PIN that will act as the ‘key’ to unlock the door.

Step 302 is the start of the pairing method when initiated by a user.

Step 304 is for making the switches accessible. One example of makingthe switches accessible is for the user to unlock network lock system 10(if network lock system 10 is locked) to make switches on the inside oflock volume 14 accessible. In order to pair network lock system 10 witha Wi-Fi device 11, network lock system 10 needs to be open and theswitches 16 made accessible. For example, the switches 16 can be on theinside of a door that opens when the lock is unlocked.

Step 306 is for the user to set channel switch 16A to a pre-determinedchannel.

Step 308 is for the user to set the network ID switch 16B to apre-determined network ID.

Step 310 is for the user to set the authentication PIN switch 16C to apre-determined authentication PIN.

Step 312 is for the user to set Wi-Fi device 11 settings to thepre-determined settings of switches 16A, 16B and 16C.

Step 314 is the end of the pairing process.

FIG. 4 is a flow diagram of a Wi-Fi lock method 400, in accordance withembodiments of the present invention. The Wi-Fi lock method 400 includeslogical process steps 402 to 408. In Wi-Fi lock method 400, a userdesires to unlock or lock the lock mechanism 15.

Step 401 is the start of the unlock or lock process.

Step 402 is for receiving a wireless signal from Wi-Fi device 11.

Step 404 is for listening to the wireless signal while harvester 24 isconverting the wireless signal into a power signal. In one embodiment,the harvester 24 independently converts the Wi-Fi signal into a powersignal and forwards the power signal to the battery 25. If themicrocontroller 12 is on, the microcontroller 12 monitors the powersignal and waits for a wireless signal that might be intended for thelock mechanism 15 before moving to the next step 406. In one embodiment,if the wireless signal is on the pre-determined channel and thepre-determined network, then the process moves to the next step 406.

Step 406 is for decrypting the wireless signal and generating a locksignal in response to successful decrypting. In one embodiment, theauthentication PIN is used to decrypt the wireless signal on thepre-determined channel and pre-determined network. In response tosuccessful decrypting, a lock signal is generated to lock or unlock thelock mechanism 15. The lock signal could be considered a power signalfor direct application to the lock mechanism 15.

In one embodiment, Wi-Fi device 11 broadcasts a wireless signal on thepredetermined channel and pre-determined network and encrypted with thepre-determined authentication PIN to switch the lock mechanism 15 fromlocked to unlocked and vice versa. The authentication PIN is not visibleto other wireless devices on the same channel, because theauthentication PIN is only used to encrypt and decrypt the wirelesssignal. In other embodiments, different authentication PINs can be usedto specify locking and unlocking.

The pre-determined channel limits other wireless devices or network locksystems from being affected. In one embodiment, both the pre-determinednetwork ID and pre-determined authentication PIN are used for moresecure authentication, but in other embodiments, only the network IDneed be used for less security. An embodiment is possible where nopre-determined switches are required, which would not be secure andwould lock and unlock for any Wi-Fi signal.

Therefore, if the Wi-Fi signal is on a different channel, then there isno activation of the lock mechanism 15; the wireless signal is onlyconverted into a power signal and stored. There is no activation of thelock mechanism 15 if the network is not on the pre-determined network orencrypted with the pre-determined authentication PIN. In one embodiment,the network is not used for any other network purposes (unlike that of aWi-Fi router), and Wi-Fi device 11 can transmit at the fastest ratepossible without impacting performance implications which will increasethe power in the transmitted wireless signal and decrease the timeneeded for the lock to gain enough power.

In some embodiments, the power needed by the network lock system 10 willbe larger than the power signal converted from the wireless signal, sothe power signal charges the battery 25 without operating themicrocontroller 12 and activating the lock mechanism 15. After a periodof time, the battery 25 will have enough power to be able to startperforming operations in network lock system 10.

The limited range of power over Wi-Fi and the default locked state meansthat it would not be trivial to hack the network lock system 10remotely.

Step 408 is the end of Wi-Fi locking method 400.

FIGS. 5A, 5B and 5C are schematic state diagrams of exemplary lockmechanisms 15, in accordance with embodiments of the present invention.Lock mechanism 15 includes: electromagnet 500, bolt 502; latch 504; andspring 506. Wi-Fi aerial 17 is only represented as connected directly toelectromagnet 500 for the purpose of illustrating when wireless power isapplied to the lock mechanism 15. In one embodiment, bolt 502 is pushedout by spring 506 when no current is applied to the electromagnet 500such that the electromagnet 500 engages latch 504 and locks for lateralmovement. If lock mechanism 15 is embedded in a door, then the doorwould be locked when no power is applied. In response to current beingapplied to the electromagnet 500, bolt 502 is pulled back against spring506 which compresses the spring 506 and disengages bolt 502 from latch504.

In FIG. 5A, lock mechanism 15 is in an unlocked and open state. Awireless signal is being received and converted into a power signal forapplication to the electromagnet 500 as represented by the thick linearound Wi-Fi aerial 17 and electromagnet 500. The activatedelectromagnet 500 attracts bolt 502 back into the electromagnet 500 andagainst a biasing force of compressed spring 506. This disengages bolt502 from latch 504 and unlocks the lock mechanism 15 whereby the lockcan be opened as shown by the separation of the latch 504 from theelectromagnet part of the lock.

In FIG. 5B, lock mechanism 15 is in an unlocked and closed state. Latch504 and the electromagnet part of the lock are shown together. Thewireless signal is still being received and converted into a powersignal for application to the electromagnet 500 as represented by thethick line around Wi-Fi aerial 17 and electromagnet 500.

In FIG. 5C, lock mechanism 15 is shown in a locked and closed state.Latch 504 and the electromagnet part of the lock are shown together.Bolt 502 is now extended into the latch 504 to form a lock as forced byexpanded spring 506 because there is no longer an electromagnetic force.The wireless signal is no longer being received and converted into apower signal for application to the electromagnet 500 as represented bythe dashed line around Wi-Fi aerial 17 and electromagnet 500.

Further embodiments of the invention are now described. It will be clearto one of ordinary skill in the art that all or part of the logicalprocess steps of the preferred embodiment may be alternatively embodiedin a logic apparatus, or a plurality of logic apparatus, comprisinglogic elements arranged to perform the logical process steps of themethod and that such logic elements may comprise hardware components,firmware components or a combination thereof.

It will be equally clear to one of skill in the art that all or part ofthe logic components of the preferred embodiment may be alternativelyembodied in logic apparatus comprising logic elements to perform thesteps of the method, and that such logic elements may comprisecomponents such as logic gates in, for example, a programmable logicarray or application-specific integrated circuit. Such a logicarrangement may further be embodied in enabling elements for temporarilyor permanently establishing logic structures in such an array or circuitusing, for example, a virtual hardware descriptor language, which may bestored and transmitted using fixed or transmittable carrier media.

In a further alternative embodiment, the present invention may berealized in the form of a computer implemented method of deploying aservice comprising steps of deploying computer program code operable to,when deployed into a computer infrastructure and executed thereon, causethe computer system to perform all the steps of the method.

Although embodiments of the present invention are described in terms ofa microcontroller 12 in FIG. 1, many other computer systemconfigurations are possible.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

A computer program product of the present invention comprises a computerreadable hardware storage device having computer readable program codestored therein, said program code containing instructions executable bya processor of a computer system to implement the methods of the presentinvention.

A computer system of the present invention comprises a processor, amemory, and a computer readable hardware storage device, said storagedevice containing program code executable by the processor via thememory to implement the methods of the present invention.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers or ordinary skill in the art to understand the embodimentsdisclosed herein.

It will be clear to one skilled in the art that many improvements andmodifications can be made to the foregoing exemplary embodiment withoutdeparting from the scope of the present invention.

What is claimed is:
 1. A method for operating a network lock system,said method comprising: applying, by a device adapter, a power signal toa lock mechanism in which a bolt and a latch are locked together, inresponse to the device adapter having been activated by a lock signal,wherein the lock mechanism comprises an electromagnet and a compressiblespring having a compression force configured to push the bolt into thelatch, wherein the power signal provides power to the electromagnetwhich causes the bolt to be attracted into the electromagnet by anelectromagnetic force that exceeds the compression force of the springwhich causes the bolt to be released from the latch and causes the boltto be surrounded by the electromagnet; and withdrawing the power signalfrom the lock mechanism, which removes the power provided to the lockmechanism, said removal of the power provided to the lock mechanismremoving the electromagnetic force resulting in the compression force ofthe spring pushing the bolt into the latch causing the bolt and thelatch to be locked together.
 2. The method of claim 1, said methodfurther comprising: generating, by a microcontroller, a lock signal toactivate the device adapter.
 3. The method of claim 2, said methodfurther comprising: prior to said generating the lock signal, turningon, by a battery controller using power in a battery, themicrocontroller.
 4. The method of claim 3, said method furthercomprising: converting, by a harvester, a first signal received from anetwork device into a second signal that inserts power into the battery,wherein the harvester operates independently of the microcontroller. 5.The method of claim 3, wherein the microcontroller comprises the deviceadapter, the battery controller, and the battery, and wherein the deviceadapter and the battery controller are distinct components within themicrocontroller.
 6. The method of claim 1, wherein the bolt comprises anelectroactive polymer bolt.
 7. The method of claim 1, said methodfurther comprising: authenticating a wireless signal before applying thepower signal to the lock mechanism, wherein said authenticating thewireless signal comprises decrypting an encrypted PIN from the wirelesssignal and matching the decrypted PIN with an authenticated PINassociated with the network lock system that comprises the lockmechanism.
 8. A computer program product, comprising a computer readablehardware storage device having computer readable program code storedtherein, said program code executable by a computer processor toimplement a method for operating a network lock system, said methodcomprising: applying, by a device adapter, a power signal to a lockmechanism in which a bolt and a latch are locked together, in responseto the device adapter having been activated by a lock signal, whereinthe lock mechanism comprises an electromagnet and a compressible springhaving a compression force configured to push the bolt into the latch,wherein the power signal provides power to the electromagnet whichcauses the bolt to be attracted into the electromagnet by anelectromagnetic force that exceeds the compression force of the springwhich causes the bolt to be released from the latch and causes the boltto be surrounded by the electromagnet; and withdrawing the power signalfrom the lock mechanism, which removes the power provided to the lockmechanism, said removal of the power provided to the lock mechanismremoving the electromagnetic force resulting in the compression force ofthe spring pushing the bolt into the latch causing the bolt and thelatch to be locked together.
 9. The computer program product of claim 8,said method further comprising: generating, by a microcontroller, a locksignal to activate the device adapter.
 10. The computer program productof claim 9, said method further comprising: prior to said generating thelock signal, turning on, by a battery controller using power in abattery, the microcontroller.
 11. The computer program product of claim10, said method further comprising: converting, by a harvester, a firstsignal received from a network device into a second signal that insertspower into the battery, wherein the harvester operates independently ofthe microcontroller.
 12. The computer program product of claim 10,wherein the microcontroller comprises the device adapter, the batterycontroller, and the battery, and wherein the device adapter and thebattery controller are distinct components within the microcontroller.13. The computer program product of claim 8, wherein the bolt comprisesan electroactive polymer bolt.
 14. The computer program product of claim8, said method further comprising: authenticating a wireless signalbefore applying the power signal to the lock mechanism, wherein saidauthenticating the wireless signal comprises decrypting an encrypted PINfrom the wireless signal and matching the decrypted PIN with anauthenticated PIN associated with the network lock system that comprisesthe lock mechanism.
 15. A network lock system, comprising: a lockmechanism; and a device adapter for applying a power signal to a lockmechanism in which a bolt and a latch are locked together, in responseto the device adapter having been activated by a lock signal, whereinthe lock mechanism comprises an electromagnet and a compressible springhaving a compression force configured to push the bolt into the latch,and wherein the power signal provides power to the electromagnet whichcauses the bolt to be attracted into the electromagnet by anelectromagnetic force that exceeds the compression force of the springwhich causes the bolt to be released from the latch and causes the boltto be surrounded by the electromagnet, and wherein withdrawing the powersignal from the lock mechanism removes the power provided to the lockmechanism, said removal of the power provided to the lock mechanismremoving the electromagnetic force resulting in the compression force ofthe spring pushing the bolt into the latch causing the bolt and thelatch to be locked together.
 16. The network lock system of claim 15,further comprising: a microcontroller configured to generate a locksignal to activate the device adapter.
 17. The network lock system ofclaim 16, further comprising: a battery controller configured to turnon, using power in a battery, the microcontroller.
 18. The network locksystem of claim 17, further comprising: a harvester for converting afirst signal received from a network device into a second signal thatinserts power into the battery, wherein the harvester operatesindependently of the microcontroller.
 19. The network lock system ofclaim 17, wherein the microcontroller comprises the device adapter, thebattery controller, and the battery, and wherein the device adapter andthe battery controller are distinct components within themicrocontroller.
 20. The network lock system of claim 15, wherein thebolt comprises an electroactive polymer bolt.