Method for unlocking a lock using real-time wireless power supply

ABSTRACT

A method for unlocking the lock using real-time wireless power supply includes proceeding with authentication identification of a powerless lock by an electronic key after pairing. Power is wirelessly supplied from the electronic key to the lock when the authentication identification starts or the authentication identification passes. The lock obtains the power wirelessly supplied from the lock to operate. When the authentication identification is identified as being successful, the electronic key outputs an unlocking command to the lock. The lock receiving the unlocking command proceeds with an unlocking operation using the power supplied wirelessly.

BACKGROUND OF THE INVENTION

The present invention relates to a method for unlocking a lock usingreal-time wireless power supply and, more particularly, to a powerlesslock that can be wirelessly supplied with power required for operationthrough an electronic key comprised of a smart mobile device or thelike.

With the development of technology, conventional mechanical locks havebeen evolved into electronic locks of electromechanical integrationtype. Operation of a portion of the electronic locks replies on powerand generally requires a detachable battery for suppling power for anunlocking authentication identification procedure, a procedure ofinputting unlocking authentication information, and operation of a motoror an electromagnetic valve. The electronic locks of this typeencounters problems in use. For example, the electronic locks cannotoperate when the detachable battery runs out of power. Furthermore, theelectronic locks with power could still be decrypted, even though thepossibility is not high.

BRIEF SUMMARY OF THE INVENTION

To solve the above problems, in an aspect, the present inventionprovides a method for unlocking a lock using real-time wireless powersupply, comprising:

remaining an offline state between an electronic key and a lock when theelectronic key is not used to execute an authentication identificationprocedure;

executing the authentication identification procedure using theelectronic key, wherein the electronic key and the lock remain in theoffline state when authentication identification is identified as beingunsuccessful by the electronic key;

identifying whether a distance between the electronic key and the lockare in a communication range when the authentication identification isidentified as being successful by the electronic key, wherein theelectronic key and the lock remain in the offline state when thedistance between the electronic key and the lock exceeds thecommunication range;

wirelessly supplying power from the electronic key to the lock when thedistance between the electronic key and the lock is in the communicationrange and when the authentication identification is identified as beingsuccessful by the electronic key, permitting the lock to use thewirelessly supplied power to operate;

outputting an unlocking command from the electronic key to the lockduring or after wireless power supply from the electronic key to thelock;

unlocking the lock with the power wirelessly suppled from the electronickey when the lock receives the unlocking command from the electronickey;

identifying whether a pre-set period of time has expired after the lockis unlocked or after the electronic key outputs the unlocking command,wherein the electronic key keeps wirelessly supplying power to the lockwhen the pre-set period of time has not expired;

locking the lock using the power wirelessly supplied from the electronickey to the lock when the pre-set period of time has expired; and

cutting off wireless power supply from the electronic key to the lockafter the lock is locked.

Thus, the lock used in the method for unlocking a lock using real-timewireless power supply of each of the first and second embodimentsaccording to the present invention is not provided with a power source,such that operation of the lock requires wireless power supply which iscarried out after pairing. Thus, it is difficult to decrypt the lock.Furthermore, a repeatedly rechargeable electronic key can be used towirelessly supply power, such that it is not necessary to worry aboutpower shortage of the lock.

In an example, the method further comprises detecting whether the lockis operated by an external force after the lock is unlocked. Theelectronic key keeps wirelessly supplying power to the lock when it isdetected that no external force is applied to the lock. When it isdetected that the external force is applied to operate the lock, thelock uses the power wirelessly suppled from the electronic key toproceed with locking of the lock, and the wirelessly power supply isthen cut off.

In an example, the method further comprises using the lock to increase avoltage of the power wirelessly supplied from the electronic key toenable operation of the lock.

In an example, the pre-set period of time is in a range of 5-30 seconds.

In an example, the unlocking command is outputted after the lock isenabled to operate after the wireless power supply from the electronickey.

In an example, countdown of the pre-set period of time begins from amoment the lock is unlocked.

In another example, countdown of the pre-set period of time begins froma moment the electronic key outputs the unlocking command.

In an example, the authentication identification includes inputting areal-time authentication identification information into the electronickey. The authentication identification is identified as being successfulwhen the real-time authentication identification information isidentified as being correct. The authentication identification isidentified as being unsuccessful when the real-time authenticationidentification information is identified as being incorrect.

In an example, inputting the real-time authentication identificationinformation includes inputting a fingerprint or a face image of a holderof the electronic key.

In an example, the electronic key is comprised of a repeatedlyrechargeable smart mobile device.

In a second aspect, a method for unlocking a lock using real-timewireless power supply comprises:

remaining an offline state between an electronic key and a lock when theelectronic key is not used to execute an authentication identificationprocedure;

identifying whether a distance between the electronic key and the lockare in a communication range while undergoing the authenticationidentification procedure, wherein the electronic key and the lock remainin the offline state when the distance between the electronic key andthe lock exceeds the communication range;

wirelessly supplying power from the electronic key to the lock when thedistance between the electronic key and the lock is in the communicationrange while undergoing the authentication identification, wherein theelectronic key does not output an unlocking command when theauthentication identification procedure is identified as beingunsuccessful by the electronic key;

outputting an unlocking command from the electronic key to the lock whenthe authentication identification by the electronic key is identified asbeing successful;

unlocking the lock with the power wirelessly suppled from the electronickey when the lock receives the unlocking command from the electronickey;

identifying whether a pre-set period of time has expired after the lockis unlocked or after the electronic key outputs the unlocking command,wherein the electronic key keeps wirelessly supplying power to the lockwhen the pre-set period of time has not expired;

locking the lock using the power wirelessly supplied from the electronickey to the lock when the pre-set period of time has expired; and

cutting off wireless power supply from the electronic key to the lockafter the lock is locked.

Thus, wireless power supply to the lock is carried out when the holderof the electronic key proceeds with the authentication identification.Thus, the lock has sufficient time to respond to the wireless powersupply to permit subsequent execution of the unlocking command aftersuccessful authentication identification.

In an example, the method further comprises detecting whether the lockis operated by an external force after the lock is unlocked. Theelectronic key keeps wirelessly supplying power to the lock when it isdetected that no external force is applied to the lock. When it isdetected that the external force is applied to operate the lock, thelock uses the power wirelessly suppled from the electronic key toproceed with locking of the lock, and the wirelessly power supply isthen cut off.

In an example, the method further comprises using the lock to increase avoltage of the power wirelessly supplied from the electronic key toenable operation of the lock.

In an example, the pre-set period of time is in a range of 5-30 seconds.

In an example, countdown of the pre-set period of time begins from themoment the lock is unlocked.

In another example, countdown of the pre-set period of time begins fromthe moment the electronic key outputs the unlocking command.

In an example, the authentication identification includes inputting areal-time authentication identification information into the electronickey. The authentication identification is identified as being successfulwhen the real-time authentication identification information isidentified as being correct. The authentication identification isidentified as being unsuccessful when the real-time authenticationidentification information is identified as being incorrect.

In an example, inputting the real-time authentication identificationinformation includes inputting a fingerprint or a face image of a holderof the electronic key.

In an example, the electronic key is comprised of a repeatedlyrechargeable smart mobile device.

The present invention will become clearer in light of the followingdetailed description of illustrative embodiments of this inventiondescribed in connection with the drawings.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flowchart illustrating a method for unlocking a lock usingreal-time wireless power supply of a first embodiment according to thepresent invention.

FIG. 2 is a flowchart illustrating a method for unlocking a lock usingreal-time wireless power supply of a second embodiment according to thepresent invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention relates to a method for unlocking a lock usingreal-time wireless power supply. FIG. 1 shows a method for unlocking alock using real-time wireless power supply of a first embodimentaccording to the present invention. The method of the first embodimentincludes identifying whether to execute an authentication identificationprocedure or not (S211). When an electronic key is not used to executethe authentication identification procedure, the electronic key and apaired lock (hereinafter referred to as “the lock”) are in an offlinestate (S213). Specifically, the electronic key is paired with a lock ofelectronic type in advance. The electronic key can be, but not limitedto, a smart mobile device (such as a smart phone, a smart watch, etc.)which can be repeatedly recharged and on which a control APP isinstalled. Alternatively, the electronic key can be a repeatedlyrechargeable, portable electronic key developed by a manufacture of thelock. Pairing of the electronic key and the lock can be achieved bylogging the lock in a system of the electronic key. Pairing of theelectronic key and the lock can be accomplished by many well-knowntechniques and is not the issue to be solved by the present invention,such that detailed description of the matching is not set forth hereinto avoid redundancy.

In step S215, it is identified whether the authentication identificationis successful. When the authentication identification fails, theelectronic key and the lock remain in the offline state (step S213). Theauthentication identification procedure can be, but not limited to,cooperation of the control APP installed in the smart mobile device witha lens or a fingerprint pick-up device of the smart mobile device. Forexample, the control APP installed on the smart mobile phone is executedand requests a holder of the smart mobile device to input a real-timeface image (a real-time authentication identification information)through the lens of the smart mobile device. The smart mobile deviceidentifies whether the real-time face image is correct. For example, thereal-time face image is compared with an authenticated face image thathas been authenticated by the smart mobile device. When the real-timeface image does not match with the authenticated face image, theelectronic key and the lock remain offline. Namely, there is noconnection (including wireless charging) between the electronic key andthe lock.

When the authentication identification executed by the electronic key issuccessful, it is identified whether the electronic key and the lock arein a communication range (S217). When the distance between theelectronic key and the lock exceeds the communication range, theelectronic key and the lock remain offline (S213). Namely, no matter theauthentication identification of the electronic key is successful ornot, the electronic key and the lock remain offline as long as thedistance between the electronic key and the lock is not in thecommunication range. Note that the communication range is not intendedto restrict the maximum communication range. For example, thecommunication range is not limited to the wireless power supply range.Assume the maximum distance permitting wireless power supply is 3meters, the communication range can be set as 2 meters. Given thissetting, when the distance between the electronic key and the lock is ina range between 2-3 meters, the distance between the electronic key andthe lock will still be considered as exceeding the communication range.

Alternatively, the communication range can be the same as the maximumoperation range of wireless power supply. In this case, the distancebetween the electronic key and the lock must be within the wirelesspower supply range, because the lock is a powerless lock, which is alock without a built-in battery or a lock supplied with power by wiredconnection. In a case that the distance between the electronic key andthe lock exceeds the wireless power supply range, the electronic keycannot wirelessly supply power to the lock, such that the lock cannotoperate. In a case that the maximum operation range for wireless powersupply can be set as the communication range, the communication range(such as within the powerless power supply range) can be different dueto different techniques adopted. For example, the wireless chargingrange of a wireless charging technique of electromagnetic induction typemeeting the requirements of wireless charging is smaller (such as thedistance between the receiver and the transmitter is less than 30 mm),whereas the wireless power supply range of other techniques (such as theWattUp proposed by Energous Corporation and Cota proposed by OssiaCorporation) can be larger (generally larger than 1 meter). It can beappreciated that the wireless power supply techniques used in thepresent invention are not limited in this regard.

When the distance between the electronic key and the lock is in thecommunication range and the authentication identification is successful,the electronic key undergoes wireless power supply to the lock, suchthat the lock can use the power supplied wirelessly (S231).Specifically, since the lock is powerless, the authenticationidentification is carried out by the electronic key. For example, in acase that an authenticated face image is compared with a real-time faceimage inputted through the electronic key, the electronic key wirelesslysupplies power to the lock when the real-time face image matches withthe authenticated face image and when the distance between theelectronic key and the lock is within the wireless power supply range.

In step S235, when the electronic key wirelessly supplies power to thelock, the lock increases the voltage of the power supplied wirelessly,which is required for operation of the lock. Specifically, the lock caninclude a circuit board for control purposes and a motor for locking andunlocking the lock. The voltage and electric current required foroperating the motor may not directly come from the wireless powersupply. For example, given the power of the wireless power supply issmaller than 5 w, the voltage and electric current may not be sufficientto drive the motor. Nevertheless, when the power of the wireless powersupply is higher (such as 10-15 w), the voltage and electric current aresufficient to directly drive the motor. Note that since the lock per seis powerless, the voltage increasing procedure is carried out after thelock receives the power supplied wirelessly. Specifically, the lockincludes a corresponding circuit that operates to increase the voltageof the power supplied wirelessly and that adjusts the electric currentto a magnitude suitable for operation of the motor.

In step S233, during or after wireless power supply from the electronickey to the lock, the electronic key outputs an unlocking command to thelock. For example, after the lock receives power from the electronic keythrough wireless power supply, the lock can receive and handle theunlocking command from the electronic key. Note that the wireless powersupply (step S231) and outputting the unlocking command (step S233) canproceed simultaneously. For example, while the electronic key undergoesthe wireless power supply, the unlocking command is outputted and lastsfor a short period of time (such as 2 seconds) to wait for response ofthe lock to acquire the power required for operation of the lock.Nevertheless, the procedures can be carried out at different times. Forexample, an unlocking command is transmitted to the lock after a periodof time (such as 0.5 seconds), starting from beginning of the wirelesspower supply to the lock from the electronic key, has lapsed.

The lock receiving the unlocking command from the electronic keyproceeds with an unlocking operation using the power wirelessly suppliedfrom the electronic key (S237). Specifically, when the lock receives theunlocking command from the electronic key, the motor of the lock usesthe power wirelessly supplied from the electronic key to drive themechanism inside the lock, thereby achieving the unlocking operation.

After unlocking the lock, it is detected whether the lock is operated byan external force (S239). When no external force is applied to operatethe lock, the electronic lock remains the wireless power supply (S251).On the other hand, when it is detected that the lock is operated by anexternal force, the lock uses the power wirelessly supplied from theelectronic key (S255) to proceed with a locking operation, and thewireless power supply is then cut off (step S257).

In an example, the lock is a door lock installed on a door and is pairedwith the electronic key. When it is intended to unlock the door lock, itis detected whether the door is opened or a handle for opening the dooris rotated. In an embodiment, a first micro switch is mounted in thedoor lock. When the first micro switch in the door lock is notactivated, it is identified that no external force is applied to operatethe door lock. In this case, the electronic key continues the wirelesspower supply (S251), such that the door lock remains in an operablestate or an unlocked state and has power to detect whether the handle ofthe door lock is operated. When the handle of the door lock is operatedand the first micro switch is activated, the door lock uses thewirelessly supplied power to drive the motor to thereby return the doorlock to the locked state. After door lock is locked, a second microswitch can be used for detection. The second micro switch is activatedwhen the door lock is locked. In this case, the door lock transmits asignal (demanding cutting off of the wireless power supply) to theelectronic key, such that the electronic key cuts off the wireless powersupply (S257).

A pre-set period of time is set and is counted down from the moment thelock is unlocked or the electronic key outputs the unlocking command. Instep S253, it is identified whether the pre-set period of time hasexpired. The electronic key continues the wireless power supplyprocedure when the pre-set period of time has not expired (S251).

Namely, in a case that a holder of the electronic key does not operatethe lock at all or does not operate the lock immediately, actual use ofthe lock will be inconvenient if the wireless power supply procedure isnot maintained for a period of time. For example, if the wireless powersupply is cut off before the lock is operated, the motor of the lockcannot be driven to achieve the locking operation due to lack ofelectricity.

When the lock is not operated, continuous wireless supply to the lock bythe electronic key is a waste of the power of the electronic key whereasthe lock remains in the unlocked state, which jeopardizes the safety.Thus, after the lock is unlocked, the wireless power supply must bemaintained for a specific period of time to assure that the lock hassufficient power to set back to the locked state. In an example, thepre-set period of time is set to a value in a range of 5-30 seconds. Forexample, when the pre-set period of time is 10 seconds, a countdown of10 seconds begins immediately after the lock is unlocked. Thus, theelectronic key still wirelessly supplies power to the lock for 10seconds.

Note that the starting time of the countdown of the pre-set period oftime can be varied. For example, the countdown begins when the unlockingcommand is outputted by the electronic key, or when unlocking of thelock is completed.

In step S255, when the pre-set period of time has expired, the lock usesthe power wirelessly supplied from the electronic key to proceed withthe locking operation. Namely, when the lock is operated or thecountdown of the pre-set period of time finishes, the lock will returnto the unlocked state. This assures the lock is normally in the lockedstate to avoid the holder of the electronic key from being unaware ofwireless power supply to the lock (which keeps the lock in the unlockedstate).

After the lock is locked, the communication between the electronic keyand the lock is cut off, and the wireless power supply is stopped(S257). Namely, no matter the lock is locked by an external force orcompletion of the countdown of the pre-set period of time, the lock willuse the wireless supplied power to send a signal (for terminating thewireless power supply) to the electronic key, such that the electronickey cuts off the wireless power supply (S257). Thus, the electronic keycuts off the wireless power supply to the lock, such that the lockbecomes a powerless state and is, thus, difficult to decrypt.

In addition to the first embodiment shown in FIG. 1 , other variants ofthe method according to the present invention are still possible. FIG. 2shows a method for unlocking a lock using real-time wireless powersupply of a second embodiment of the present invention. Specifically,this method includes identifying whether to execute an authenticationidentification procedure or not (S211). When an electronic key is notused to execute the authentication identification procedure, theelectronic key and a paired lock remain offline (S213). Specifically,the electronic key is paired with a lock of electronic type in advance.The electronic key can be, but not limited to, a smart mobile devicewhich can be repeatedly recharged and on which a control APP isinstalled. Alternatively, the electronic key can be a repeatedlyrechargeable, portable electronic key developed by a manufacture of thelock. Pairing of the electronic key and the lock can be achieved bylogging the lock in a system of the electronic key. Pairing of theelectronic key and the lock can be accomplished by many well-knowntechniques and is not the issue to be solved by the present invention,such that detailed description of the matching is not set forth hereinto avoid redundancy.

When the authentication identification executed by the electronic key issuccessful, it is identified whether the electronic key and the lock arein the communication range (S218). When the distance between theelectronic key and the lock exceeds the communication range, theelectronic key does not wirelessly supply power to the lock (S220).Namely, no matter the authentication identification of the electronickey is successful or not, the electronic key and the lock remain offlineas long as the distance between the electronic key and the lock exceedsthe communication range. Note that the communication range is notintended to restrict the maximum communication range. For example, thecommunication range is not limited to the wireless power supply range.Assume the maximum distance permitting wireless power supply is 3meters, the communication range can be set as 2 meters. Given thissetting, when the distance between the electronic key and the lock is ina range between 2-3 meters, the distance between the electronic key andthe lock will still be considered as exceeding the communication range.

Alternatively, the communication range can be the same as the maximumoperation range of wireless power supply. In this case, the distancebetween the electronic key and the lock must be within the wirelesspower supply range, because the lock is a powerless lock, which is alock without a built-in battery or a lock supplied with power by wiredconnection. In a case that the distance between the electronic key andthe lock exceeds the wireless power supply range, the electronic keycannot wirelessly supply power to the lock, such that the lock cannotoperate. In a case that the maximum operation range for wireless powersupply can be set as the communication range, the communication range(such as within the powerless power supply range) can be different dueto different techniques adopted. For example, the wireless chargingrange of a wireless charging technique of electromagnetic induction typemeeting the requirements of wireless charging is smaller (such as thedistance between the receiver and the transmitter is less than 30 mm),whereas the wireless power supply range of other techniques (such as theWattUp proposed by Energous Corporation and Cota proposed by OssiaCorporation) can be larger (generally lager than 1 meter). It can beappreciated that the wireless power supply techniques used in thepresent invention are not limited in this regard.

Paring of the electronic key and the lock includes, but not limited to,conventional pairing techniques, such as Bluetooth pairing technique,Wi-Fi pairing technique, etc. For example, information of the lock islogged into the electronic key, such that the lock is paired with theelectronic key. In another example, the lock is provided with a hardwareidentification number which is registered into the electronic key toachieve successful pairing.

When the distance between the electronic key and the lock is in thecommunication range and the authentication identification is successful,the electronic key undergoes wireless power supply to the lock, suchthat the lock can use the power supplied wirelessly (S231).Specifically, to avoid unnecessary consumption of electricity of theelectronic key, the electronic key wirelessly supplies power to the lockonly when the holder holding the electronic key intends to proceed withthe authentication identification. Note that in this procedure,regardless of the result of the authentication identification, theelectronic key proceeds with wireless wire supply to the lock eventhough the inputting of the authentication identification information isstill undergoing (which is different from the first embodiment). This isadvantageous in providing the lock with sufficient response time to usethe power supplied wirelessly. Thus, the lock enters a state receivingthe wireless power supply, which is helpful in reliably receiving othersignals or commands from the electronic key.

In step S235, when the electronic key wirelessly supplies power to thelock, the lock increases the voltage of the power supplied wirelessly,which is required for operation of the lock. The response time of thelock in the wireless power supply procedure (S231) can be the timerequired for the voltage-increasing step (S235). Specifically, the lockcan include a circuit board for control purposes and a motor for lockingand unlocking the lock. The voltage and electric current required foroperating the motor may not directly come from the wireless powersupply. For example, given the power of the wireless power supply issmaller than 5 w, the voltage and electric current may not be sufficientto drive the motor. Nevertheless, when the power of the wireless powersupply is higher (such as 10-15 w), the voltage and electric current aresufficient to directly drive the motor. Note that since the lock per seis powerless, the voltage increasing procedure is carried out after thelock receives the power supplied wirelessly. Specifically, the lockincludes a corresponding circuit that operates to increase the voltageof the power supplied wirelessly and that adjusts the electric currentto a magnitude suitable for operation of the motor.

In step S215, it is identified whether the authentication identificationis successful. When the authentication identification fails, theelectronic key does not output the unlocking command to the lock (stepS216). The authentication identification procedure can be, but notlimited to, cooperation of the control APP installed in the smart mobiledevice with a lens or a fingerprint pick-up device of the smart mobiledevice. For example, the control APP installed on the smart mobile phoneis executed and requests a holder of the smart mobile device to input areal-time face image through the lens of the smart mobile device. Thesmart mobile device identifies whether the real-time face image iscorrect. For example, the real-time face image is compared with anauthenticated face image that has been authenticated by the smart mobiledevice. When the real-time face image does not match with theauthenticated face image, the electronic key does not output theunlocking command to the lock (step S216).

In step S233, when the authentication identification by the electronickey is successful, the electronic key outputs the unlocking command tothe lock. Specifically, after the lock receives power wirelesslysupplied from the electronic key, the power can receive and handle theunlocking command from the electronic key.

The lock receiving the unlocking command from the electronic keyproceeds with an unlocking operation by using the power wirelesslysupplied from the electronic key (S237). Specifically, when the lockreceives the unlocking command from the electronic key, the motor of thelock uses the power wirelessly supplied from the electronic key to drivethe mechanism inside the lock, thereby achieving the unlockingoperation.

The steps of opening operation (S239), keeping wireless power supply(S251), identification of expiration of the pre-set period of time(S253), locking operation (S255), and cutting off wireless power supply(S257) in the method of the second embodiment illustrated by theflowchart of FIG. 2 are the same as those of the first embodimentdescribed with reference to FIG. 1 . Thus, detailed descriptions are notset forth to avoid redundancy.

The lock used in the method for unlocking a lock using real-timewireless power supply of each of the first and second embodimentsaccording to the present invention is not provided with a power source,such that operation of the lock requires wireless power supply which iscarried out after pairing. Thus, it is difficult to decrypt the lock.

The lock used in the method for unlocking a lock using real-timewireless power supply of each of the first and second embodimentsaccording to the present invention is not provided with a power source,a repeatedly rechargeable electronic key can be used to wirelesslysupply power. Thus, it is not necessary to worry about power shortage ofthe lock.

In the method for unlocking a lock using real-time wireless power supplyof the second embodiment according to the present invention, wirelesspower supply to the lock is carried out when the holder of theelectronic key proceeds with the authentication identification. Thus,the lock has sufficient time to respond to the wireless power supply topermit subsequent execution of the unlocking command after successfulauthentication identification.

Now that the basic teachings of the present invention have beenexplained, many extensions and variations will be obvious to one havingordinary skill in the art. For example, the method of each of the firstand second embodiments does not have to include the voltage increasingstep S235. For example, when the wireless power supply from theelectronic key to the lock has a higher power (such as 10-15 w)sufficient to drive the motor, it is not necessary to increase thevoltage of the power wirelessly supplied to the lock.

Thus since the invention disclosed herein may be embodied in otherspecific forms without departing from the spirit or generalcharacteristics thereof, some of which forms have been indicated, theembodiments described herein are to be considered in all respectsillustrative and not restrictive. The scope of the invention is to beindicated by the appended claims, rather than by the foregoingdescription, and all changes which come within the meaning and range ofequivalency of the claims are intended to be embraced therein.

The invention claimed is:
 1. A method for unlocking a lock usingreal-time wireless power supply, comprising: remaining an offline statebetween an electronic key and a lock when the electronic key is not usedto execute an authentication identification procedure; executing theauthentication identification procedure using the electronic key,wherein the electronic key and the lock remain in the offline state whenauthentication identification is identified as being unsuccessful by theelectronic key; identifying whether a distance between the electronickey and the lock are in a communication range when the authenticationidentification is identified as being successful by the electronic key,wherein the electronic key and the lock remain in the offline state whenthe distance between the electronic key and the lock exceeds thecommunication range; wirelessly supplying power from the electronic keyto the lock when the distance between the electronic key and the lock isin the communication range and when the authentication identification isidentified as being successful by the electronic key, permitting thelock to use the wirelessly supplied power to operate; outputting anunlocking command from the electronic key to the lock during or afterwireless power supply from the electronic key to the lock; unlocking thelock with the power wirelessly suppled from the electronic key when thelock receives the unlocking command from the electronic key; identifyingwhether a pre-set period of time has expired after the lock is unlockedor after the electronic key outputs the unlocking command, wherein theelectronic key keeps wirelessly supplying power to the lock when thepre-set period of time has not expired; locking the lock using the powerwirelessly supplied from the electronic key to the lock when the pre-setperiod of time has expired; and cutting off wireless power supply fromthe electronic key to the lock after the lock is locked.
 2. The methodfor unlocking the lock using real-time wireless power supply as claimedin claim 1, further comprising detecting whether the lock is operated byan external force after the lock is unlocked, wherein the electronic keykeeps wirelessly supplying power to the lock when it is detected that noexternal force is applied to the lock, and wherein when it is detectedthat the external force is applied to operate the lock, the lock usesthe power wirelessly suppled from the electronic key to proceed withlocking of the lock, and the wirelessly power supply is then cut off. 3.The method for unlocking the lock using real-time wireless power supplyas claimed in claim 1, further comprising using the lock to increase avoltage of the power wirelessly supplied from the electronic key toenable operation of the lock.
 4. The method for unlocking the lock usingreal-time wireless power supply as claimed in claim 1, wherein thepre-set period of time is in a range of 5-30 seconds.
 5. The method forunlocking the lock using real-time wireless power supply as claimed inclaim 1, wherein the unlocking command is outputted after the lock isenabled to operate after the wireless power supply from the electronickey.
 6. The method for unlocking the lock using real-time wireless powersupply as claimed in claim 1, wherein countdown of the pre-set period oftime begins from a moment the lock is unlocked.
 7. The method forunlocking the lock using real-time wireless power supply as claimed inclaim 1, wherein countdown of the pre-set period of time begins from amoment the electronic key outputs the unlocking command.
 8. The methodfor unlocking the lock using real-time wireless power supply as claimedin claim 1, wherein the authentication identification includes inputtinga real-time authentication identification information into theelectronic key, wherein the authentication identification is identifiedas being successful when the real-time authentication identificationinformation is identified as being correct, and wherein theauthentication identification is identified as being unsuccessful whenthe real-time authentication identification information is identified asbeing incorrect.
 9. The method for unlocking the lock using real-timewireless power supply as claimed in claim 8, wherein inputting thereal-time authentication identification information includes inputting afingerprint or a face image of a holder of the electronic key.