The present invention generally relates to electronic combination locks, and more specifically to a combination lock system in which the combination code is entered by using a rotatable key.
Lock devices have been used for many years to lock different things. The simplest lock devices are all-mechanical and codeless, and they provide the simple functionality of selecting between “lock” state and “unlock” state without using any “user code” or “lock code”. Electro-mechanical lock devices are another type of lock devices. Some electro-mechanical lock devices are operated by using a secret code that is known only to a certain group of people, and sometimes only to the key owner. A code that must be entered by a user to operate a lock device is referred to as “something you know”, whereas the key is referred to as “something you have”.
In other sophisticated locking mechanisms, the key is an electronic key that exchanges authentication information with the lock device and upon engaging an electronic key with a lock device, such as by attaching the key to, or waving it in front of, the lock device, the lock device inquires the key about its authentication information, which may be, for example, the identification details or serial number of the key. The process by which one device (e.g., the lock device) inquires another device (e.g., the key) for its identity is known as “challenge and response authentication”. In computer security challenge-response authentication is a family of protocols in which one party, for example a lock device, poses a question (“challenge”) and another party, for example a key of a lock device, must provide a valid answer (“response”) to be authenticated. The simplest example of a challenge-response protocol is password authentication, where the challenge is asking a device for a password and the valid response is the correct password. The key user can operate the lock device (i.e., lock or unlock the lock device) only after the key has been authenticated by the lock device. To render to lock systems a higher level of security, in addition to the use of authentication information, the user must use a correct code or some biometric data to operate the lock device; i.e., provided that the authentication process has been concluded successfully.
Electronic combination locks use a combination code that is uniquely associated with a particular lock. A combination code is a mathematical combination of numbers or values that, if entered in the correct order, unlock the involved lock the lock device. To open such a lock, a person has to use a unique combination code that is checked by a lock controller. Electronic combination locks, and other types of conventional lock systems, include a keypad for entering codes. However, using a keypad is problematic because a secret code might be visually intercepted by an unauthorized person while the code is entered by an authorized person. Keypads must be kept exposed to authorized persons, but, at the same time, they are exposed to sabotage. Further, keypads need to be installed on, near, or at, the vicinity of the lock system or protected space or facility, and wired to some kind of a control console. In addition, keypads are bulgy, and therefore unaesthetic. In some prior art locking systems the device (usually an electronic key) that communicates authentication information to the lock system and the device that actually operates the lock system are separate, un-interlocked, devices. In other prior art lock systems the keys are self-powered; i.e., they include an electric battery, which is problematic because a self-powered key will not work if the energy of its battery has decreased below some level. It will, therefore, be beneficial to have a lock system where a single, battery-free, key authenticates itself to the lock system and is used to enter a combination code and, if desired, also for operating a latch of the lock system.
The following embodiments and aspects thereof are described and illustrated in conjunction with systems, tools, and methods, which are meant to be exemplary and illustrative but not limiting in scope.
As part of the present disclosure an electromechanical locking system is provided, which includes a locking mechanism that is switchable between a locked position and an unlocked position, a keyway for receiving a rotatable key, and a latch mechanism or arrangement for locking an object such as a door of a room or safe. The electromechanical locking system also includes an angle detector. The angle detector is operative to detect an angular orientation or position of the rotatable key while the key is in the keyway, and, after detecting a sequence of angular orientations of a key, the angle detector may issue a corresponding angle sequence data. The electromechanical locking system also includes a lock controller for controlling the latch in accordance with an authentication data that has been received from the key, and an angle sequence data that has been issued by the angle detector.
Responsive to the lock controller ascertaining the validity of both the authentication data and angle sequence data, the lock controller may enable operation of the latch. According to some embodiments while the lock controller is in enabling state the latch is operable electromechanically by the lock controller. According to other embodiments the latch is operable manually, by the key operator.
According to some embodiments the key includes a memory device for holding authentication data that pertains to one or more of the keys, to a user of the key, and to the electromechanical locking system; a communication interface for communicating the authentication data to the lock controller; and optionally a light source that is operative to project a light beam in order to provide a visual indication of a current angular orientation of the key. The light source, which may be a laser diode, may be positioned in such a way that it projects a light beam in the general direction of the lock system, at an acute angle (relative to a distal end of the key).
A method of operating an electromechanical locking system is also provided. The method includes issuing, by the angle detector, angle sequence data associated with a sequence of angular orientations of a key mechanically coupled to the locking mechanism. The key contains authentication data and enables, by the lock controller, operation of a latch of the locking mechanism if the authentication data is found by the lock controller to be valid and the sequence of angular orientations matches a predetermined sequence of angular positions of the key.
In addition to the exemplary aspects and embodiments described above, further aspects and embodiments will become apparent by reference to the figures and by study of the following detailed description.
Exemplary embodiments are illustrated in referenced figures. It is intended that the embodiments disclosed herein are illustrative rather than restrictive. The disclosure, however, may better be understood with reference to the following detailed description when read with the accompanying figures, in which:
It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures are not necessarily drawn to scale. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate like, corresponding or analogous elements.
The claims below will be better understood by referring to the present detailed description of example embodiments of the invention. This description is not intended to limit the scope of claims but instead to provide examples of the invention.
People are used to plug a key into a keyway of a locking system and revolve it clockwise (“CW”) and counterclockwise (“CCW”) to lock and unlock their home, car, and so on. According to the present disclosure a key for a locking system includes an authentication data (“something you have”) that, when engaged with the locking system, authenticates the key to the locking system. According to the present disclosure the same key is also used to enter a combination code (“something you know”). The locking system will be operable only if the authentication data and the combination code are both valid. The way a key is used to enter a combination code is described below.
However, according to one example embodiment of the present disclosure the open/close bolt or tab actuated by door handle 102 and the lock/unlock bolt or tab door actuated by a key in door handle 102 are interlocked, as described below In other example embodiments these two functions (locking/unlocking and opening/closing) are executed by the same bolt or tab; i.e., the same locking bolt or tab can be used for locking and unlocking the door, and for opening the door (i.e., after the bolt or tab is unlocked). It is noted that the locking mechanism and the electromechanical control system (both are not shown in
Although key 120 includes electronic components for holding data such as, but not limited to, authentication data, and for communicating with the lock system 100, key 120 is not an electronic card per se; i.e., key 120 electronically holds authentication data but, unlike electronic cards which are used to unlock doors (for example), key 120 has another function, which is entering the combination code by being rotated inside keyway 101 several times to create a combination code that, if entered in the correct sequence, will enable operation of the lock system 100. In some embodiments key 120 is always rotated in the same direction (e.g., CW). In such embodiments, upon reaching a prescribed angular position the key is held, or left stationary, in this position long enough (e.g., between 0.5 second and 1 second) for the lock system to be able to record the key's current position. Alternatively, a depressible button on key 120 (shown at 125) may be depressed by the key operator to signal the lock system that the key's current angular position should be recorded for future check out, or checked out first and recorded if it is a valid key's position whose relative location within the combination code is correct. Then, key 120 can be rotated in the same direction to the next angular position and depressible button 125 can be depressed again, and so on. Reference numeral 126 designates an alternative depressible button for signaling key's positions to the lock system. A depressible button that functions in the way described above is hereinafter referred to as an “angle signaling button”. Although not shown in the drawings, in an alternative embodiment, the lock system 100 of
In other embodiments key 120 is rotated in a given direction to a predetermined angular position and then it is rotated in the opposite direction until key 120 reaches the next predetermined angular position, and so on. In these embodiments the key can be held in a current angular position long enough for the lock system to be able to record the key's position, or, alternatively, the angular position that is recorded is the last angular position that was measured before the rotation direction changed.
To enter a combination code, a user inserts key 120 into keyway 101 and rotates key 120 inside keyway 101 in a first direction (e.g., CW) until key 120 is brought to an angular orientation which corresponds to a first position in a predetermined sequence of angular positions that is derived from, or corresponds to, a combination code (e.g., 11→7→12→3).
To continue the combination code, the user rotates key 120 inside keyway 101 until key 120 is brought to an angular orientation which is a second position in the predetermined sequence of angular positions. As explained above, the user may rotate key 120 to the next angular orientation by rotating key 120 either in the same direction or in the opposite direction, depending on the embodiment.
As long as the correct sequence of angular positions of key 120 has not been detected by lock system 100, key 120 may be allowed to rotate 360 degrees inside keyway 101, or its rotation may be mechanically restricted to a narrower angle (e.g., 135 degrees), without changing the locking status of lock system 100 from the “locked” state to the “unlocked” (or vice versa). However, after rotating key 120 “through” the predetermined sequence of angular positions, the rotation of key 120 may be restricted to an angle that is required to lock or unlock door 110. In other words, lock system 100 may include a clutch mechanism (not shown in
Lock system 400 also includes an angle detector 450 that detects a sequence of angular orientations, on of key 430 in keyway 420. Angle signaling button 425 (or alternative angle signaling button 426) may be depressed by the key operator to signal the lock system that the key's current angular position should be read for check out. Angle detector 450 issues an angle sequence data that corresponds to, represents or reflects the sequence of angular orientations of key 430 as detected by angle detector 450. An angular position of key 430 may be associated with a unique parameter which may be, for example, a function of time, as demonstrated in
Lock system 400 also includes a lock controller 460. Lock controller 460 is provided with random access memory (“RAM”) 462 for making calculations, and with erasable programmable read only memory (“EPROM”) 463 for storing the locking application, various parameters, one or more pre-stored combination codes, and one or more sequence of angular positions of keys that result from previous and current attempts to operate the locking mechanism 410.
When inserted into keyway 420, key 430 communicates with communication interface 470. During communication with communication interface 470 key 430 transmits, or otherwise transfers, authentication data to communication interface 470. Lock controller 460 is functionally connected to communication interface 470 and receives therefrom the authentication data of key 430. Lock controller 460 controls (shown as dashed line 481) latch pin 440, via electromechanical control 480, in accordance with the authentication data received from key 430, and in accordance with an angle sequence data issued by angle detector 450. Lock controller 460 checks the validity of the authentication data and angle sequence data, and if lock controller 460 determines that they are both valid, lock controller 460 enable operation of the locking mechanism 410, automatically or manually. Checking the validity of the authentication data and angle sequence data generally involves comparison of the authentication data to pre-stored authentication data, and the angle sequence data to pre-stored angle sequence data. The pre-stored authentication data and pre-stored angle sequence data may be pre-stored, for example, in EPROM 463. Electromechanical control 480 may be a solenoid, for example, that pulls and pushes latch pin 440 according to control signal or control data that lock controller 460 forwards (shown at 461) to electromechanical control 480. Lock system 400 also includes power source 490 for powering the lock system's electrical components, and also for powering key 430 when key 430 resides within the keyway.
Locking mechanism 410 also includes a clutch disc 441 that is conditionally rotatable by key 430. Clutch disc 441 can, therefore, be used as an angular position sensor from which angle detector 450 receives (shown at 451) raw angle data or raw angle signal as key 430 is rotated in keyway 420 by the key operator. Based on the raw angle data, or raw angle signal, angle detector 450 generates or issues an angle sequence data that is forwarded (shown at 452) to lock controller 460. Lock controller 460 compares the angle sequence data to reference angle sequence data that is stored in EPROM 463, for example, in order to determine whether the angle sequence data, and therefore the entered combination code, are valid. Angle detector 450 may detect the angular orientation of clutch disc optically or mechanically, for example by using a shaft encoder.
Latch disc 442 and clutch disc 441 are shown in
More generally, responsive to lock controller 460 ascertaining the validity of both the key's authentication data and the angle sequence data, lock controller 460 enables operation of the latch disc 442. By “lock controller 460 enables operation of latch disc 442” is meant that lock controller 460 can be configured to enable manual operation of latch disc 442, such as by a person rotating key 430 or using a door handle, or automatic operation of latch disc 442. In the manual mode of operation lock controller 460 causes electromechanical control 480 to push (shown at 481) latch pin 440 into openings 441A and 442A of clutch disc 441 and latch disc 442, respectively, to engage the two discs 441 and 442. While engaged, angular orientations of clutch disc 441, which are caused by the key 430 rotating in the keyway, are transferred to latch disc 442 which, in return, actuate the locking member (not shown in
Keyway 420 is provided with electric power and communication contacts (not shown in
In electrical engineering a slip ring is a method of making an electrical connection through a rotating assembly. Slip rings are commonly found, for example in packaging machinery, cable reels, and wind turbines. Briefly, a slip ring consists of a conductive band mounted on a shaft and insulated from it. Electrical connections from the rotating part of the assembly are made to the stationary slip ring. Electrical power and various signals can be exchanged, via the slip rings, between the rotating part of the assembly and the stationary part of the assembly. Rotating connectors are commercially available, for example from Mercotac, Inc., Kevlin Corp., and Sibley Company.
Key 430 may be identical or similar to electronic keys that are manufactured, for example by Datakey Electronics. Angle detector 450 may detect the angular orientation of key 430 within keyway 420 by using a shaft encoder that is manufactured, for example by RINGDALE Inc. Key 430 may alternatively include a smart USB rotation sensor of the kind manufactured, for example by Toradex AG.
Lock system 400 may further include a timer (not shown in
Key 500 also includes a bidirectional data communication interface 515 for communicating the authentication data, and optionally additional information, to a lock controller such as the lock controller 460 of
Key 500 also includes a power and data communication electrical connector 530 that can be connected to a power source such as power source 490 of
Data communication interface 515 may conform to the universal serial bus (“USB”) protocol. Controller 540 and the lock controller with which controller 540 cooperates may use handshaking process, and the lock controller may use a “challenge and response authentication” protocol to obtain the key's authentication data. In telecommunications and related fields “handshaking” is an automated process of negotiation that dynamically sets parameters of a communication channel that is established between two devices before normal communication there between begins. Handshaking follows the physical establishment of the channel and precedes normal information transfer. Electrical contacts 530 and data communication interface 515 facilitate storage of authentication data, and other types of data or information, in key 500, for example in EPROM 510.
FIG. SC shows two exemplary light source angles in accordance with the present disclosure. By way of example, the area around key 500 is evenly divided into 12 sections to mimic the 12 hours of a clock (shown as “1”, “2”, . . .,“12”). Key 500 is shown in
Since a combination lock consists of N numbers, where N can typically equal 3 or 4, it is checked, at step 606, whether a sequence of N key's positions was detected and recorded. If less than N key's positions were recorded (shown as “N” at step 606), the lock system continues (shown at 616) to monitor the key's orientation. Otherwise (a sequence of N key's positions has already been recorded, shown as “Y” at step 606), it is checked by lock controller 460, at step 607, whether the recorded sequence of N key's positions matches a pre-stored or predetermined sequence of angular orientations. If the newly recorded sequence of key's positions differs from the pre-stored or predetermined sequence of angular orientations (shown as “N” at step 607), the unlocking procedure will be aborted (shown at 604) and key 430 will not be able to transition locking mechanism 410 into the “unlock” state. Otherwise (the two sequences match, shown as “Y” at step 607), the key is authorized to unlock locking mechanism 410, or lock controller 460 may unlock the lock system automatically; that is, if it configured to do so. Alternative methods for unlocking locking mechanism 410 by key 430 and by lock controller 460 are described above.
Instead of recording the entire sequence of key's positions and only then checking the validity of the entire sequence, in an alternative way each key's position is checked first for its validity and the unlocking procedure aborts after detecting the first invalid key position, or after some temporal delay, or after n unsuccessful attempts to enter a correct key position.
At step 701, angle detector 450 issues angle sequence data that is associated with a sequence of angular orientations of key 430 that is mechanically coupled to the locking mechanism 410. At step 702, it is checked by lock controller 460 whether the key's authentication data is valid and the sequence of key's angular orientations matches a pre-stored or predefined sequence of angular positions of the key. If the key's authentication data is valid and the sequence of key's angular orientations matches the pre-stored or predefined sequence of angular positions of the key (shown as “Y” at step 702), lock controller 460 enables operation of the latch of locking mechanism 410. Otherwise (if at least one of the above described conditions is not met, shown as “N” at step 702), the lock system operation process is aborted at step 704. While the lock controller 460 is in enabling state, the latch mechanism may be operable electromechanically by lock controller 460, or manually, in which mode the operator of key 430 can rotate key 430 to thereby cause latch disc 442 to operate the lock member (e.g., a locking bolt or tab).
Key 800 also includes a light source 820, an optional collimating lens 830, and an angle signaling button 850. Light source 820 projects light 840 in acute angle relative to the distal end of key 800, and it generally functions in the same manner as source light 520 of
The two fluids may be two different liquids, in which case a liquid marker will always either float in a liquid bath or sink in it, depending on the involved specific gravities. Alternatively, one fluid may be liquid and the other gas, in which case a gas marker will float in a liquid bath. For example, one fluid may be water and the other oil, in which case an oil marker will float in a water bath, or one fluid may be oil and the other mercury, in which case a mercury marker will sink in an oil bath, and so on. Liquid 1030 and air bubble 1040 may also be replaced with a fluid and solid, where the fluid may be, for example, gas (e.g., air) or liquid, and the solid may be, for example, a metallic ball. As opposed to an air bubble that floats on liquid and provides the highest reference point, a metallic ball sinks in a fluid and provides the lowest reference point. Therefore, in general, any of the following marker-bath alternatives can be used with a ring-shaped tube: a liquid marker in a liquid bath, a gas marker in a liquid bath, a liquid marker in a gas bath, and a solid marker in a fluid bath.
Angle dial 1010 and ring-shaped tube 1020 are jointly rotatable CW and CCW by the key's operator rotating ring-shaped tube 1020. By way of example, angle dial 1010 has imprinted thereon eight dial numbers (i.e., 0, 4, 8, 12, 16, 20, 24, and 28) and ring-shaped tube 1020 has thirty two equidistantly spaced marks on periphery of angle dial 1010, each of which corresponds to one of the numbers ”0” through “31”.
Because of the lighter weight of the air bubble 1040 (or lighter liquid droplet), air bubble 1040 (or lighter liquid droplet) remains at the highest possible location within ring-shaped tube 1020 regardless of the angular orientation of key 100. Therefore, air bubble 1040 (or lighter liquid droplet) is used as a convenient fiducial indicia, or reference point, to which the key's operator aligns the required numbers of a combination code. For example,
As discussed above with respect to some embodiments, numbers of a combination code may be entered by rotating the key only CW or only CCW. However, according to another example embodiment of the present disclosure, the rotation direction of the key bears additional information as opposed to only entering the correct numbers in the correct order. That is, some transitions (i.e., from some number of a combination code to others) may involve rotating the key in the same direction (e.g., CW) while other transitions may involve rotating the key in the opposite direction (e.g., CCW). Considering an exemplary combination code 12-20-8-28 and an exemplary transitions pattern, the key operator may have to enter the first number “12” by first aligning the number “12” with air bubble 1040 by rotating the key arbitrarily (i.e., either CW or CCW), then rotate the key in the same direction as “12” to enter the number “20” by aligning the number “20” to air bubble 1040, then rotate the key in the opposite direction to enter number “8” by aligning the number “8” with air bubble 1040, and, finally, rotate the key in the same direction as number “8” to enter the last number “28”. Alternatively, instead of rotating the key to the first number in an arbitrary direction and deriving the “number-to-number” (i.e., within a combination code) transitions thereform, the number-to-number transitions, including the rotation direction to the first number, may be predetermined. Of course, other transition patterns may be used. Angle dial 1010 is pivotally coupled to the rest of key 100 (i.e., to the key's insert, shown in dashed line 1050 in
In the description and claims of the present application, each of the verbs, “comprise”, “include” and “have”, and conjugates thereof, are used to indicate that the object or objects of the verb are not necessarily a complete listing of members, components, elements, or parts of the subject or subjects of the verb.
The articles “a” and “an” are used herein to refer to one or to more than one (i.e., to at least one) of the grammatical object of the article, depending on the context. By way of example, depending on the context, “an element” can mean one element or more than one element.
The term “including” is used herein to mean, and is used interchangeably with, the phrase “including but not limited to”.
The terms “or” and “and” are used herein to mean, and are used interchangeably with, the term “and/or,” unless context clearly indicates otherwise.
The term “such as” is used herein to mean, and is used interchangeably, with the phrase “such as but not limited to”.
Having thus described exemplary embodiments of the invention, it will be apparent to those skilled in the art that modifications of the disclosed embodiments will be within the scope of the invention. Alternative embodiments may, accordingly, include more modules, less modules, and/or functionally equivalent modules. For example, locking mechanism 410 and angle detector 450 of