1. Field of Invention
The present invention relates to an active lock system with methods to authenticate users and provide guidance to operate the lock with security and privacy protection. The active lock is communication enabled using wireless communication technology responding to wireless phone calls to perform user identification verification and convenient and secure operation of the lock.
2. Description of the Art
In a society that security and privacy are important elements of life, people need locks for protecting their properties. Hence, numerous inventions on secured locks have been advanced ranging from mechanic locks, for example, bolt lock and double lock, to electronic locks, based on input device and electronic circuit to control the lock mechanism and to remote-control locks involving transmitter and receivers using coded signal such as those used in the car industry and security industry. Given the world is already equipped with various secured locks, mechanical, electronic and electromagnetic programmable locks; a simple and inexpensive system, based on the double lock concept is a desirable way to add security and privacy protection to a locked property and offer convenient but secure access control to such locked properties by keeping the key or code to the locked property locked up by another lock. This practice has been used in the real estate industry known as a “lock box”. The lock box usually contains a ‘key’ or ‘code’ to the already existing secured lock system but the lock box itself is controlled by another ‘key’ using conventional mechanical locks or controlled by a ‘code’ using resettable keyless locks, such as push button pins, keypads, rotating dials and the like.
This double lock concept protects the integrity of the original permanent lock system by avoiding duplications of many keys to the original lock. An inexpensive and portable lock may be used to provide an access to the key of the original lock system for permitted personnel. However, an operational deficiency of the system often causes inconvenience and security compromise. For example, in the real estate industry, many keys have to be made for a lock box placed on a house for sale since these lock box keys have to be distributed to many real estate agents to allow them to show the house to their clients at different times. This practice definitely causes inconvenience. Any agent wishes to show several houses needs to visit the listing realtor's office to get a key for each lock box placed on each house the agent's clients may be interested in. There are potential security problems with too many keys circulating. A more sophisticated lock box uses a keyless lock system, but it still requires an agent to either go to the office to obtain the code before visiting a house or to call the office when the agent is at the house to obtain the code to open the lock box. The latter scenario presents a security exposure since one can not verify who is at the lock box (house) requesting the code. Requiring all agents to visit the office to get the codes for lock boxes not only causes tremendous inconvenience to the agents but also requires a person sitting at the office seven days a week to respond to the code requests by hundreds of agents for hundreds of houses listed with the office. The face-to-face verification of agent identification is also time consuming. Therefore, it is very desirable to introduce an automated system to manage the lock boxes and to access the locked properties.
This invention relates to an active lock system and its secure operating procedures having remote control capability via wireless communication. A wireless phone receiver and an information display and processing unit are integrated with a conventional keyless lock to provide the necessary functions of communication, information entry, identification verification and automated management of access control in an unique way. Operational methods of the active lock system not only provides security and privacy protection but also offers convenience to owners and users in terms of setup, operation and management of the system. The active lock system can be used as a double lock such as in the real estate application as a lock box as well as a single lock for other applications such as for protecting truck containers, warehouse and storage facilities. The lock mechanism itself in this lock system can be flexibly selected according to the applications desired. The skilled in the design and manufacture of locks can apply the present invention to any existing keyless lock.
The objective of the present invention is to provide a communication enabled lock system that not only fulfills the requirements of a “lock box” or a “lock” application with procedural automation and enhanced functions but also offers more security and privacy protection as a lock system for general property protection.
The lock system comprises of a keyless lock device having a numeric code control for unlocking the lock box or the lock, in the case of a lock box, a compartment for storing objects; a wireless communication receiver with an antenna compliant with cell phone protocols such as G1, G2, G2.5, G3, G3.5, G4 and similar conventions capable of receiving wireless communication; and an alphanumeric and graphical display and information processing unit with a display surface capable of displaying messages, instruction and advertisements. The display device and the communication device share a common processor and a digital memory all powered by a battery. Optionally, the battery is a rechargeable one connected to a solar cell panel mounted on one side of the lock system or to an external battery charger via a connector. The active lock system is loaded with an operating software in a read only memory which supports the information processing unit for functions of capturing of caller-ids, registering time when the lock system is opened or used and transmitting the data to the owner when requested during a communication session. The active lock system performs at least one or more of the following functions: 1. locking and unlocking the lock system. 2. storing an object such as a key to another secure lock. 3. receiving wireless communication. 4. capturing and storing data in memory for access by the owner and user of the lock system. 5. displaying information to callers to the lock system and 6. providing energy to operate the active lock system. The method to operate the lock system by an owner comprises of at least one or more of the following steps: (i) entering lock id, lock box code, user identification and/or cell phone number. (ii) interacting with displayed messages such as instructions, lock code and/or advertisement and/or responding with inputs. (iii) accessing information stored in the lock system such as who and when a user made access to the lock system. (iv) opening lock with code. (v) storing an object such as a key to another lock system. (vi) closing the lock system. The method to operate the lock system by a user comprises of at least one or more of the following steps: (i) obtaining the id number of the communication device, (ii) calling the communication number from a personal cell phone, (iii) the lock communication device receiving call, storing caller identification number, registering time of call, and displaying messages. (iv) caller responding to a message or messages such as instruction, lock code and/or advertisements. (v) confirming response by user and providing instruction to continue and (vi) opening the lock.
Depending on the applications the lock system is used for, the procedures of the operational method can be altered or modified in sequence to provide more security or more efficiency.
This invention provides a secure lock box system taking advantages of existing various lock mechanisms, the conventional mechanical lock mechanisms and the modern wireless communication, information processing and display technologies to serve many industries including real estate such as lock box, transportation such as truck door lock, banking such as cash dispenser, warehousing such as storage lock for locking and storing objects with operational convenience yet with full protection of security and privacy.
As shown in
A owner, 100, of a lock system desires to place the lock system over a property to protect the property. The property may have an existing lock with a key. Then the owner selects a lock system and uses it to store the key to the existing lock. The owner will first program a lock code, for the keyless lock such as selecting a numeric key code as in common practice with many keyless locks such as one manufactured by Schlage, Kaba Ilco, Trilogy and the like. The owner then shall open the lock system and store a key in the compartment. Next the owner activates the communication device with a switch located from the inside of the lock box turning the communication receiver on. Optionally the owner switches on the solar energy panel if the back panel of the lock box contains a solar panel. Now the lock box is ready for use and testing. The owner hangs the lock box handle on premise such as the front door of a house. Then the owner tests the lock box with a cell phone by dialing the communication number of the lock system. The owner observes the lock system responding to the call and reads messages shown on the display screen. The messages are intended for: (1) requesting the owner to assign or enter an lock id and confirm a lock code for the lock system using a series of dial tones generated by the dial keys on the owner's cell phone. (2) entering known users' identification such as license number or personal cell phone number in dial tones which the communication device will store in its memory with the owner's id being designated as super user who can reassign lock-ids, lock code and caller ids. (3) requesting caller to enter cell phone number or caller id for verification of the calling owner before displaying lock box code to the calling owner. The owner responds to the messages and wait for the code to be displayed. The caller then uses the code to open the lock system. When the lock system is open, it indicates that the test is successful.
As a user, 200, he or she will first call the lock system owner or the business office that manages lock systems to obtain the communication number and the id of a particular lock system the user intends to open. The owner or office authenticates the user's identification such as by license number or personal cell phone number which can be verified or by using a video phone when the caller is using a camera phone. Upon verification, the owner or the officer then gives the lock system communication number and lock id to the user. The user then can operate the lock system by dialing the communication number from the user's cell phone and gives the correct lock id during communication. By assigning a lock id to a lock box, it is possible to use a common communication number for several lock systems. Of course, for ultra security purposes, a separate communication number for a separate lock system will provide additional security protection. Upon confirmation, the user reads the messages on the lock system display screen to obtain the keyless lock code, instructions for opening the lock system and any advertisement such as another property for sale nearby. Then the user can use the lock code to open the keyless lock.
For repeat users, 300, who already knew the lock id and the lock communication number, he or she simply can call the lock system and establish communication to get the instruction, any advertisement and lock code to open the lock system as shown in
The above descriptions are merely for illustrating exemplary operations of the lock system presented. For those skilled in the art, the present invention can be recognized as applicable in many applications and as many varied scenarios.
Number | Name | Date | Kind |
---|---|---|---|
6337618 | Craig et al. | Jan 2002 | B1 |
7130401 | Rampey et al. | Oct 2006 | B2 |
7606558 | Despain et al. | Oct 2009 | B2 |
20060236407 | Mergenthaler | Oct 2006 | A1 |
20070096870 | Fisher | May 2007 | A1 |