The present disclosure relates generally to locks, and more particularly, to an electronic lock, techniques to open an electronic lock, and articles incorporating an electronic lock, as set out in greater detail herein.
Numerous applications exist where a user may desire to secure an item, article, device, etc., from unwanted or otherwise undesired access. In this regard, there are a variety of lock styles that are available, which can be used for temporary securement of the item, article, device, etc. For instance, padlocks are available that require either a physical key or a known combination to open the lock. Moreover, electronic locks are available, e.g., which require a known pin code that is entered via a keypad in order to unlock the lock.
According to aspects of the present disclosure, an electronic lock is provided. The electronic lock comprises a housing having a lock aperture extending through a face thereof. Here, the lock aperture is configured to receive a lock arm of a corresponding locking mechanism. Here, the lock arm includes an aperture.
The electronic lock also comprises a controller contained in the housing, a biometric interface attached to the housing, and a biometric reader contained in the housing. The biometric reader is electrically coupled to the controller. Additionally, the biometric reader is electrically coupled to the biometric interface. Yet further, the electronic lock comprises a locking system contained within the housing. The locking system comprises a release spring, a locking pin, a locking spring, an electric actuator, and a lock lever.
The locking system is controlled by the controller to transition between a locked position and an unlocked position. In this regard, to lock the locking mechanism to the housing, the lock arm of the locking mechanism is inserted into the lock aperture of the housing until the lock arm compresses the release spring of the locking system sufficient to enable the aperture of the lock arm to align with the locking pin of the locking system. Under this operation, the locking spring of the locking system urges the locking pin into the aperture of the lock arm of the locking mechanism, thereby locking the locking mechanism to the housing.
To transition from the locked position to the unlocked position, the controller controls the electric actuator to move the lock lever so as to compress the locking spring sufficient to release the locking pin from the aperture of the lock arm. When the locking pin is removed from the aperture of the lock arm, the release spring urges the lock arm toward the lock aperture of the housing away from the locking pin.
The electronic lock still further comprises a battery that powers at least the controller, the biometric reader, and the electric actuator.
In operation, the controller issues an electronic unlock command signal to the electric actuator to cause the electronic lock to transition from the locked position to the unlocked position upon agreement of a match of electronic data corresponding to a biometric read by the biometric reader to biometric data accessible by the controller identifying an authorized user.
According to still further aspects of the present disclosure, an article including an electronic lock is provided. The article includes a zipper clasp and an electronic lock. The zipper clasp has a zipper handle and a zipper attachment extending from the zipper handle, where the zipper attachment includes a securement for attaching the zipper clasp to a zipper of the article. The zipper clasp also includes a zipper lock arm extending generally orthogonally from the zipper handle proximate to an end portion of the zipper handle that is opposite the zipper attachment. The zipper lock arm has an aperture.
The electronic lock is secured to the article, and comprises a housing having a front face defining a major surface, where at least a portion of the front face is exposed to a user. The housing also comprises a lock aperture extending through the front face, where the lock aperture is dimensioned to receive the zipper lock arm of the zipper clasp.
The electronic lock also comprises a controller that is contained in the housing, a biometric interface that is attached to the housing, and a biometric reader that is contained in the housing. The biometric reader is electrically coupled to the controller. Additionally, the biometric reader is electrically coupled to the biometric interface.
The electronic lock yet further comprises a locking system contained within the housing. The locking system comprises a release spring, a locking pin, a locking spring, an electric actuator, and a lock lever. Under this configuration, the locking system is controlled by the controller to transition between a locked position and an unlocked position.
To lock the zipper clasp to the housing, the zipper lock arm of the zipper clasp is inserted into the lock aperture of the housing until the zipper lock arm compresses the release spring sufficient to enable the aperture of the zipper lock arm to align with the locking pin of the locking system. In this configuration, the locking spring of the locking system urges the locking pin into the aperture of the zipper lock arm of the zipper clasp, thereby locking the zipper clasp to the housing.
To transition from the locked position to the unlocked position, the controller controls the electric actuator to move the lock lever so as to compress the locking spring sufficient to release the locking pin from the aperture of the zipper lock arm. Here, the release spring urges the lock arm toward the lock aperture of the housing away from the locking pin.
The electronic lock moreover comprises a battery that powers at least the controller, the biometric reader, and the electric actuator,
In operation, the controller issues an electronic unlock command signal to the electric actuator to cause the lock to transition from the locked position to the unlocked position upon agreement of a match of electronic data corresponding to a biometric read by the biometric reader to biometric data accessible by the controller identifying an authorized user.
The following detailed description of various aspects of the present disclosure may be best understood when read in conjunction with the following drawings, where like structure is indicated with like reference numerals, and in which:
aspects of the present disclosure;
According to aspects of the present disclosure, various configurations are disclosed, which are suitable to implement an electronic lock. In this regard, an electronic lock is disclosed herein, which takes a form factor of a general-purpose smart lock, making the smart lock usable to lock any suitable article to which the smart lock is applied. In other applications, a smart lock is provided that is either formed as an integral part of an article, or the smart lock can be incorporated into an article transforming the article into a smart, lockable article.
According to further aspects of the present disclosure, techniques herein implement technology in a personalized manner so as to provide an increased likelihood that an individual opening the lock is truly an authorized individual. In this regard, the personalized technology can be implemented locally within the lock itself, via communication with a remote device (such as via short range communication with an electronic appliance, long range communication such as across a network including the Internet, etc.), combinations thereof, etc.
Electronic Lock Example A
Referring now to the drawings, and in particular to
In practical applications, one or more features of the electronic lock 100 may be exposed to a user via the housing 102. For instance, as illustrated in the example electronic lock 100 of
Also as illustrated, an optional keyhole 108 can be provided. Where utilized, the keyhole 108 passes through the housing 102. In the embodiment shown in
Still further, at least one electronic authorization device is provided. The electronic authorization device is used to authorize a user to a controller of the electronic lock. As will be described in greater detail herein the authorization device can comprise any number of modalities, which may include a biometric scanner, an electronic keypad, a wireless communication device, etc. Examples of electronic authorization devices are described more fully herein.
However, for sake of example,
In practical applications, the biometric interface 110 can form part of a fingerprint/thumbprint scanner. In this regard, the biometric interface 110 can optionally include a pad 112. The pad 112 provides an interface for receiving a biometric input from a user. However, other biometric-based sensing technologies can also/alternatively be utilized.
Optionally, the electronic lock can also include one or more user interface input/output features. The input/output 114 can include buttons, pads, knobs, encoders, switches, or other input and/or output devices that facilitate user interaction with the lock.
Electronic Lock Example B
Referring to
Notably, in the illustrated embodiment, an electronic authorization device implemented as a biometric reader 204 is electrically coupled to the controller 202. More particularly, the electric coupling provides an electrical pathway by which the controller 202 and the biometric reader 204 communicate. In practical applications, the electrical coupling provides a communicative coupling that may be unidirectional or bi-directional. That is, in some embodiments, the biometric reader 204 sends information to the controller 202. In other embodiments, the communication is bi-directional such that the controller 202 transmits information (e.g., commands, data, combinations thereof, etc.) to the biometric reader 204, and the controller 202 receives information (e.g., commands, data, requests, etc.) from the biometric reader 204.
The biometric reader 204 is also electrically coupled to the biometric interface 110 (
In some embodiments, an optional electronic authorization device such as an optional proximity-based wireless communication device 206 can be provided, e.g., in addition to, or in lieu of the biometric reader 204. The proximity-based wireless communication device 206 is also electrically coupled to the controller 202. More particularly, the electrical coupling provides a communicative pathway by which the controller 202 and the proximity-based wireless communication device 206 communicate. In practical applications, the electrical coupling provides communicative coupling that can be unidirectional or bi-directional. Analogous to that discussed above, in some embodiments, the proximity-based wireless communication device 206 sends information to the controller 202. In other embodiments, the communication is bi-directional such that the controller 202 transmits information (e.g., commands, data, combinations thereof, etc.) to the proximity-based wireless communication device 206, and the controller 202 receives information (e.g., commands, data, requests, etc.) from the proximity-based wireless communication device 206.
In practical applications, the proximity-based wireless communication device 206 can comprise any suitable short range (e.g., typically less than 30 meters) communication technology, such as low energy Bluetooth, Zigbee, ultra-wide band (UWB), etc. As yet a further example, the proximity-based wireless communication device 206 can comprise an active or passive radio frequency identification (RFID) device, which may provide a range of approximately 1-6 meters, or greater for active RFID system. Similarly, low power FOBs can be configured to be limited to a few meters. In other embodiments, the proximity-based wireless communication device 206 can comprise near field communication (NCF) device (or other magnetic field induction technology that enables communication). In this embodiment, a working range of 10-20 centimeters is more practical. Still further, the proximity-based wireless communication device 206 can comprise an inductive based technology that requires intimate contact with the housing of the electronic lock 200. In this regard, requiring contact with the housing of the electronic lock 200 may be advantageous, e.g., to increase the likelihood of a deliberate attempt to engage the proximity-based wireless communication device 206.
A lock 208 is also electronically coupled to the controller 202. In a manner analogous to that described above, the electronic coupling provides an electrical pathway by which the controller 202 and the lock 208 communicate. In this regard, communication can be unidirectional, or bi-directional. In general, the lock 208 includes a combination of mechanical and electrical components necessary to mechanically implement the lock.
For instance, the lock 208 can include, or be coupled to, any necessary electrical and/or mechanical components to receive a locking mechanism (such as a clasp, shackle, hook, bolt, etc.) that is passed through the lock aperture 106 (
Yet further, additional mechanical components such as springs, wedges, locks, etc., may be provided as are necessary to lock and unlock the device.
In general terms, the lock 208 transitions from a locked position to an unlocked position in cooperation with the locking mechanism (e.g., a clasp lock, shackle, etc.) that is insertable into the lock aperture. The specific configuration of the lock 208 will thus vary depending upon the implemented technology, type of locking mechanism used, etc. For instance, a physical lock may have different components when securing a clasp, e.g., attached to a zipper, compared to locking to a barb on a shackle for a padlock or bar-style lock.
While not required, in some embodiments, a mechanical key receiver 210 is configured to accept a physical key, e.g., passed through the keyhole 108 (
The provision of the mechanical key receiver 210 facilitates a backup mechanism to unlock the device. The mechanical key receiver 210 can also function as an electronic lock override, e.g., in case of an electrical or logic malfunction. Yet further, the mechanical key receiver 210 can function as a Transportation Security Administration (TSA) key making the electronic lock suitable for travel applications. Thus, the mechanical key receiver can accept a physical key that is compatible with a Transportation Security Administration (TSA) key to transition the lock from the locked position to the unlocked position.
Solely for sake of a non-limiting example, the lock 208 is schematically illustrated as having an electric actuator 212 (e.g., a linear actuator, rotary actuator, motor, a motor and a cam arrangement, motor and slider-crank, or other structure that converts rotational to linear motion, etc.) that is controlled by the controller 202. The electric actuator 212 provides the electronically controlled motive force to open the lock to transition the device from a locked state to an unlocked state. For instance, the electric actuator 212 may move a pin responsive to an unlock signal from the controller 202, so as to release the locking mechanism. In this example, a spring-biased pin 214 can be used to hold the locking mechanism inserted therein. For instance, the spring-bias can be used to provide an automatic and positive lock when a user inserts the locking mechanism through the lock aperture in the housing. As a few examples, inserting a clasp through the lock aperture causes a bias against the spring causing the pin to lock to the clasp mechanically, so that energy is not consumed by the electronics to enter a locked state. A coupler 216 is provided so as to form a mechanical interface so that the pin can be activated to unlock the locking mechanism either by the controller 202, e.g., via the electric actuator 212 or via a response by the mechanical key receiver 210 receiving a valid key, e.g., a user inserts and properly turns a valid physical key. In this regard, the lock 208 may require other mechanical or electrical components 218, e.g., one or more cams, gears, magnets, actuators, etc., as required to enable both mechanical and electrical unlocking, such that the mechanical unlock can override or otherwise work independent of the electrical unlock.
The electronic lock 200 is also illustrated as having a power supply 220. The power supply 220 can comprise a battery, which may be rechargeable, user-replaceable, or otherwise configured. As used herein, “battery” includes multiple batteries, cells, and other energy sources. The batteries may be rechargeable, replaceable, or a combination thereof. For sake of clarity, the power supply 220 is not shown as being wired to the other electronic circuits solely for sake of clean schematic diagram. In practice, the power supply 220 provides power to any component or components that require power. In this regard, the power supply 220 can include its own circuitry, including sleep circuitry that minimizes power consumption by entering a low power sleep mode until a user begins to interface with the electronic lock to unlock the locking mechanism thereof.
As will be described in greater detail herein, in an example embodiment, the power supply, controller or other device can also regulate and/or monitor the charge of the power source. In this regard, a threshold (or thresholds) can be set that determine when the battery is about the run out of charge. If the battery charge falls below that threshold, the lock may be unlocked so as to not leave the lock in a locked state. As an illustrative example, a measure of battery characteristic (e.g., charge) is evaluated against predetermined threshold(s) (e.g., first threshold and second threshold) as a percentage of predicted charge remaining. If the charge falls below the first threshold, but is above the second threshold, a warning is provided. If the battery charge falls below the second threshold, an action can be taken, e.g., an email can be pushed to the user's smartphone, the lock can be automatically unlocked, etc.
As an illustrative working example, with reference to
An electric actuator 212 is electrically coupled to the controller 202. The electric actuator 212 is operable to transition the lock between the locked position and the unlocked position. A battery 220 powers at least the controller 202, the biometric reader 204, and the electric actuator 212. Here, the controller 202 issues an electronic unlock command signal to the electric actuator 212 to cause the lock to transition from the locked position to the unlocked position upon determining agreement of a match of electronic data corresponding to a biometric read by the biometric reader to biometric data accessible by the controller 202 identifying an authorized user (such as a library containing one or more authorized user electronic biometric signatures). Also, the controller 202 issues the unlock command signal to the electric actuator 212 to cause the lock to transition from the locked position to the unlocked position where a measure of a battery characteristic falls below a predetermined threshold, independent of an output of the biometric reader 204.
Unlock Algorithm
Referring to
At 302, the algorithm receives an input from a biometric scanner, e.g., the biometric reader 204 (
At 304, the algorithm determines whether the biometric is a valid input. For instance, the biometric scanner may attempt to match the biometric of the user to one or more stored biometric signatures. If the input is not valid, then the process loops back to obtain an input. Alternatively, if a valid input is received, the controller considers whether the controller has also received a valid input from the proximity-based communication device. If a valid input is not received from the proximity-based communication device (Agreement at 306 is NO), then the process again loops back for a user input.
Analogously, at 308, the algorithm receives an input from the proximity-based communication device. As noted more fully herein, the proximity-based communication device may comprise a Near Field Communication Device, Bluetooth Device, RFID device, FOB, UWB, Zigbee, etc. A check is made at 310 as to whether the input is valid. If the proximity-based communication device does not authenticate a valid input, (Valid Input is No at 310), then flow returns to the beginning to receive an input.
The proximity-based communication device can perform a number of authentication functions. For instance, the proximity-based communication device may require that an associated known device pairs or otherwise communicates therewith. Here, a valid user must possess a corresponding, separate device that is known to the proximity-based wireless communication device. As another example the proximity-based communication device may require a passcode, key, pin, or other electronic input, which can be input or otherwise provided by a user, e.g., interacting with the electronic lock itself (e.g., via the input/output 114,
Alternatively, if a valid input is received, the algorithm considers whether a valid input has been received from the biometric scanner. If a valid input is not received from the biometric scanner (Agreement at 306 is NO), then the process again loops back for a user input.
If a user identification is presented to both the biometric scanner at 302 and at the proximity based communication device at 308 (e.g., within a predetermined time period of one another), then the algorithm determines at the Agreement box 310, whether the biometric scanner and the proximity based communication device identify the same user, or whether the biometric scanner and the proximity based communication device identify different users.
In some embodiments, agreement must be from the same user. In other embodiments, agreement requires that the user that authenticates with the biometric reader and the user that authenticates with the proximity-based communication device are different, but known and associated people. Regardless, if there is no Agreement at 310 between the user identified by the biometric scanner and user identified by the proximity-based communication device at 310, the process loops back to the beginning to obtain one or more inputs as described more fully herein.
Alternatively, if there is Agreement at 310 between the user identified by the biometric scanner and user identified by the proximity-based communication device at 310 (e.g., within the predetermined time period of one another), then control continues to 312, where the controller issues an unlock command, e.g., to the lock 208 by way of example. Here, the predetermined time required for agreement can range from a few seconds to a few minutes, for example.
Thus, according to the algorithm 300 of
In an example embodiment, the proximity-based wireless communication device is implemented by at least one of a nearfield electronic communication (NFC) reader that communicates with a corresponding NFC tag, and a Bluetooth receiver that is configured to only pair with authorized users. Moreover, in these embodiments, the locking mechanism can comprise a zipper clasp. Here, the lock comprises a locking member that restricts the clasp, when inserted into the lock aperture, from being removed when the lock is in the locked position. As another example, the locking member can restrict at least one of a shackle, hook, or bolt inserted into the lock aperture from being removed when the lock is in the locked position.
Notably, even with multi-part authentication, in some embodiments, the lock can be controlled to transition from the locked position to the unlocked position by the mechanical key receiver engaging a physical key independent of the unlock command signal from the controller.
In practical applications, two independent verification mechanisms may be sufficient. However, it is possible to incorporate more and/or alternative verification mechanisms. In this regard, the algorithm 300 can be altered in to include additional, different, or fewer authentication mechanisms.
As a first example, where a proximity-based communication device is not provided, the system my authenticate based upon the input from the biometric scanner alone. Here, the agreement at 306 is assumed to be satisfied if the input is valid at 304.
Analogously, as a second example, where a biometric scanner is not provided, the system my authenticate based upon the input from the proximity-based communication device alone. Here, the agreement at 306 is assumed to be satisfied if the input is valid at 310.
As yet another example, a system may include both a biometric scanner and one or more proximity-based communication devices, or multiple different proximity-based communication devices. Here, the controller need only account for a valid input from one device, or validation may be required from multiple devices, e.g., depending upon the desired implementation.
Thus, the algorithm 300 can be modified to not require two-part authentication. Rather, the Agreement decision logic 306 may be optional. As a result of such a modification, the controller issues an unlock command signal to cause the lock to transition from the locked position to the unlocked position in a manner that is independent of the mechanical key receiver (when a mechanical unlock is provided), and is based upon at least one electronic verification selected from a match of a biometric read by the biometric reader to an authorized user at 302, 304 or a match of an identifier read by the proximity-based wireless communication device an authorized user at 308, 310.
As yet further examples, either of the above-described embodiments can replace the proximity-based communication device and/or biometric reader scanner. For instance, the proximity-based communication device and/or biometric scanner can be replaced by a user interface on the electronic lock that requires a pin code or other unique user input. As yet further examples, the proximity-based communication device and/or biometric scanner can be replaced by another electronic component (or components), e.g., Bluetooth, UWB, Zigbee, Wi-Fi, a GPS receiver, other global or local positioning system, etc. Yet further, multiple “channels of authentication” (e.g., any described technology herein for communication, user interaction, etc., such as user I/O, Bluetooth, Wi-Fi, Zigbee, NCF, GPS, etc.,) can be provided, where agreement of n channels is required for the controller to issue an unlock command, where n is any whole number greater than 0 (i.e., one or more). Thus, for instance, there may be 3-4 ways to authenticate, of which two or more authentications must match in order for the controller to issue an unlock command.
Moreover, some secondary authentications can be automated. For instance, if an authorized user places a fingerprint on the biometric scanner (e.g., fingerprint reader), the controller may then try to obtain a confirmation of user identify automatically by checking a geo-location, by looking for a Bluetooth device, smartphone, etc., known to be associated with the user, try to read an NCF or other badge or tag, associated with the user, etc. In other embodiments, e.g., where security is more of an issue, the user may be required to actively participate in the dual verification, e.g., by physically touching an NCF device to the housing of the electronic lock, by responding to a message transmitted by the electronic lock over Wi-Fi or Bluetooth to the user's smartphone, by requiring the user to enter a pin on the electronic lock housing, by requiring the user to enter a pin on an associated smartphone, by responding to an email or app push request, text request to a smartphone texting app, etc.
In some embodiments, if the controller detects a predetermined number of illegal identification attempts, the controller may issue a lockout such that an owner is required to reset the controller, e.g., by requiring a supervisor/administrator login, e.g., via a specific user account, the user may be required to reset the lock using the physical key, etc.
In some embodiments, the algorithm 300 can be modified to provide a number of additional features that can enhance the flexibility of the lock. For instance, there is no strict requirement that the user that enters a biometric is the identical person the provides an input via the proximity-based communication device. For instance, there may be a situation where it is desirable to require two individuals to unlock the lock. As yet another example, a single individual can use the biometric scanner for multiple different inputs. For instance, the user may be required to scan two or more fingers, which may result in different signatures for each finger, etc. The biometric scanner can be utilized in other ways, examples of which are set out in greater detail herein. Here, there may be multi-part authentication for each user, or two or more individuals can split ownership of a different component of the multi-part authentication.
Electronic Lock Example C
Referring to
As with the block diagram of
However,
In practical applications, there are a number of ways to program the user list 430. A user list can be uploaded into a local database via a hardware connector, e.g., USB (not shown for clarity). As another example, the user list can be uploaded via wireless, e.g., via connection to a network, e.g., WI-FI, e.g., using a smartphone, computer, etc. Still further, the controller 402 can run an algorithm that implements a secure administrative mode where the controller 402 itself builds a valid user list and associates each valid user with a unique biometric signature and with a unique input via the proximity-based communication device.
Electronic Lock Example D
Referring to
As with the block diagram of
However,
Electronic Lock Example E
Referring to
As with other electronic locks described more fully herein, the electronic lock 600 includes a controller 602 (which can execute the algorithm 300 of
The electronic lock 600 can also include one or more communication devices as noted more fully herein. For convenience of illustration, the device(s) are illustrated in block 634. Here, the communication device(s) can include NCF, Bluetooth, UWB, Zigbee, Wi-Fi, a combination thereof, etc.
The electronic lock 600 also includes a positioning system 636, which can be implemented as a global positioning system (GPS), a local positioning system, etc. The incorporation of a GPS enables the electronic lock to implement geo-based decisions into the algorithm that determines whether to issue an unlock command to the lock 608. For instance, geo-fences can be set up that require the electronic lock 608 to be outside of defined geographical region(s) in order for algorithm to issue the unlock command. Likewise, the positioning system 636 can be used to set up geo-containment regions, where the electronic lock 600 must be within a predefined geo-boundary in order for algorithm to issue the unlock command.
Notably, other metadata can be used with or in lieu of geo-based data to augment the algorithm 300 in order for algorithm to issue the unlock command. For instance, an administrator may set up the electronic lock 600 to open only within set hours, on set days, etc. Geo-requirements and metadata requirements can be in addition to, or part of the required n part authentication described more fully herein.
As a few examples, the electronic lock can include a global positioning system (GPS) receiver that is controlled by the controller to determine the position of the electronic lock when an attempt is made to unlock the lock. In some embodiments, the controller reads a list of geoboundaries to determine whether multi-part electronic verification is required. For instance, if a user is within a geofenced area such as a public area, a multi-part verification may be required. As yet another example, if the user is in a geofenced area such as a safe area, then multi-part verification can be disabled.
By way of illustrative example, the controller can be programmed with at least one approved geoboundary. Here, the controller issues an unlock command signal, e.g., to the electric actuator, to cause the lock to transition from the locked position to the unlocked position from any one of the authorization devices provided, such as a fingerprint scanner or the proximity-based wireless communication device, when the controller determines from the GPS receiver that the electronic lock is in a predetermined approved geoboundary. The controller can require a multi-part electronic verification to issue an unlock command signal, e.g., to the electric actuator, to cause the lock to transition from the locked position to the unlocked position when the electronic lock is not within the predetermined approved geoboundary. In other embodiments, the above-two roles can be flipped. For instance the controller issues an unlock command signal, e.g., to the electric actuator, to cause the lock to transition from the locked position to the unlocked position from any one of the authorization devices provided when the controller determines from the GPS receiver that the electronic lock is not in a predetermined approved geoboundary. The controller can require a multi-part electronic verification to issue an unlock command signal, e.g., to the electric actuator, to cause the lock to transition from the locked position to the unlocked position when the electronic lock is within the predetermined approved geoboundary.
The electronic lock 600 also is illustrated as having a device port 638. The device port 638 can comprise a universal serial bus (USB) port, etc. The device port 638 can function to recharge a battery (e.g., the power supply 620) that powers the electronic lock 600. The device port 638 can also be used to power the electronic lock 600, e.g., in case the battery wears down too far to be useful. Still further, the device port 638 can be used to load data, e.g., into the user list 630. Moreover, the device port 638 can be used to extract information from the electronic lock 600.
For instance, the electronic lock 600 can log authorization attempts, e.g., to capture data on when the lock is accessed. The electronic lock can also use the positioning system to tag authorization attempts with geo-data such that records can be created that reflect not only that the lock was accessed, but by whom and where.
The electronic lock 600 can also include one or more input/output devices (I/O) devices 640. Example I/O devices include a speaker, a microphone, a haptic device, a transducer, a piezo element, light, LED, display, etc. In the example embodiment, the I/O device 640 is coupled to the controller 602, thus enabling the controller 602 to interact with the I/O device 640 and to coordinate the I/O device 640 with other features of the electronic lock 600.
By way of example, an I/O device 640 implemented as microphone, coupled with voice recognition software executing in the controller 602 enables voice activation of an unlock command. Here, the user can train the controller 602 to respond to a voice command to cause the controller to unlock the lock 608. In some embodiments, a voice command can also (and/or alternatively) be used to cause the controller 602 to cause the lock 608 to transition to a locked position. The voice commands can also optionally be utilized to turn on or off certain features, e.g., to enable or disable the biometric scanner, Bluetooth, GPS, NFC, or other features provided on the particular device 600. Still further, a pre-designated command can cause the controller to start listening for voice commands. For instance, a command such as “hey lock” may trigger the lock to start listening for a voice command. In this regard, the controller can be programmed to listen for identifying characteristics of a voice signal (e.g., authenticate) based upon verbal characteristics. The controller can also be programmed to listen for certain words, sounds, or combinations thereof. The command words can be buried in a sentence, thus masking the true trigger words. In this regard, the controller can record across a time window, then parse the recorded speech to look for trigger words, sounds, etc.
As yet another example, an I/O device 640 can be an LED and/or LED and speaker/transducer. Here, the controller is programmed to respond to a user request to find the lock. Thus, the LED can be programmed to turn on, flash, change color, etc., to send a “beacon”. The I/O device 640 can also play a sound, e.g., chirp, alarm, etc. to assist with location of the electronic lock 600.
In yet another example, a smartphone can connect to the lock, e.g., via Bluetooth, ultra-wide band, WiFi, USB, or other wired or wireless technology. In this implementation, the lock includes the appropriate transceiver, USB interface, etc., to communicate with the smartphone. In a manner analogous to the voice example above, a smartphone microphone is coupled with voice recognition software executing in the smartphone, e.g., via an app, to enable voice activation of an unlock command. Here, the user can train the voice software in the app to respond to a voice command to cause the controller 602 to unlock the lock 608. In some embodiments, a voice command can also (and/or alternatively) be used to cause the controller 602 to cause the lock 608 to transition to a locked position. The voice commands can also optionally be utilized to turn on or off certain features, e.g., to enable or disable the biometric scanner, Bluetooth, GPS, NFC, or other features provided on the particular device 600. Still further, a pre-designated command can cause the controller to start listening for voice commands. For instance, a command such as “hey lock” may trigger the smartphone app to start listening for a voice command. In this regard, the smartphone app can be programmed to listen for identifying characteristics of a voice signal (e.g., authenticate) based upon verbal characteristics. The smartphone app can also be programmed to listen for certain words, sounds, or combinations thereof. The command words can be buried in a sentence, thus masking the true trigger words. In this regard, the smartphone app can record across a time window, then parse the recorded speech to look for trigger words, sounds, etc.
In yet further example embodiments, a smartphone can be used to augment the controller, e.g., controller 602, and/or other components of the lock. For instance, a user may be required to enter a biometric signature. However, an app on the smartphone includes the same signature library (or subset of the same signature library) as the lock. As such, the app on the smartphone can use a biometric scanner on the smartphone to read a biometric signature in addition to, or in lieu of the biometric scanner on the lock. In other example, the smartphone can use its transceiver, e.g., WiFi transceiver, to receive software updates, etc., which can then be loaded into the controller 602. In yet another example, the controller in the lock can communicate with the smartphone app to carry out enhanced features. For instance, the lock may not include a built-in GPS, but rather rely on the smartphone GPS and smartphone computing power to carry out any one or more of the geofeature capabilities described more fully herein. In this example, the lock can leverage the graphical user interface, including the touchscreen, and computer processing power of the smartphone to offload data intensive processing, which saves energy, prolongs battery life, and requires less computational capability on the lock. Here, if the lock receives an input indicating that the controller should issue an unlock command, the controller on the lock first communicates with the smartphone app, e.g., to check whether the unlock command was received within the requirements of geoboundaries, whether the necessary authentication is satisfied, etc.
Yet further, in some embodiments, a user can set a unique pairing requirement for the controller in the lock to pair with a smartphone. This allows the user to ensure that pairing can be securely and reliably made with the lock. By way of example, when using Bluetooth, the user can set a unique discovery parameter (e.g., a passkey, PIN, passcode, password, or other security code) that the Bluetooth receiver on the lock requires before successful pairing. When the user attempts to pair with the lock, after discovering the lock, the lock will require the user to enter the correct discovery parameter. Because the discovery parameter is set by the user of the lock, the user can pair any smartphone. Thus for example, if a user smartphone is not charged, or not in the user's possession, and the user needs to use a smartphone to unlock the lock, the user can borrow a smartphone from a trusted source, pair the new smartphone, download any necessary app, and use the app on the borrowed smartphone to cause the controller to issue an unlock command to the lock system.
In yet further aspects of the present disclosure, because the controller of the lock integrates with a smartphone, e.g., to offload technology and/or software processing, the same or similar functionality can be passed to other electronic peripherals/accessories. For instance, in some embodiments, the lock can be controlled to issue an unlock command responsive to a command received from a smartwatch.
In still further embodiments, a smartphone acts as a graphical user interface to pass key information to the user, e.g., the controller of the lock sends messages to an app in the smartphone (e.g., directly or via a cloud infrastructure), to show battery level, access details, lock status (e.g., locked, unlocked), etc. As another example, the app on the smartphone can act as a “finder” by finding the lock, e.g., based upon GPS, wireless communication, or a combination thereof.
The smartphone app can also be programmed to carry out certain lock or unlock functions automatically or via user interaction, e.g., based upon proximity to the lock. For instance, in an example embodiment, an alarm is triggered by the smartphone when the lock exceeds a predetermined range, distance, etc., from the smartphone app. By way of example, a received signal strength indicator (RSSI) can be used as an estimated distance of the lock from the smartphone. In addition to the alarm, the smartphone app can automatically send a command to cause the lock to lock itself where the lock design makes this automatable. Also, the smartphone capability described herein can augment, override, or be overridden by the normal capability of the lock. For instance, in some embodiments, the lock will normally automatically unlock just before the battery is discharged too low to be able to respond to commands. However, if the smartphone app detects that the lock is not within a predetermined range, then this normal unlock sequence can be overridden so that the lock does not automatically unlock. This smartphone override may be geobounded, e.g., so that when the lock is within a defined geoboundary, e.g., a user's home, the lock will simply unlock if the battery gets too low. On the other hand, when the lock is in another geoboundary, e.g., designated geolocation such as a public location, or if the lock is outside a designated “safe” geoboundary, then smartphone and lock interact so that the lock does not automatically unlock if the battery on the lock gets too low.
Miscellaneous
Various embodiments are illustrated, to demonstrate features of an electronic lock. In practice, an electronic lock according to aspects herein, can be implemented using any one or more features described with reference to any one or more of the FIGURES generally. Thus, each FIGURE represents a non-limiting example embodiment comprised of several components, processes, etc., that can be combined with features such as components, processes, etc., from other embodiments herein. For instance, an authentication device such as the GPS device 636 can be implemented with the configuration of
As another illustration, an example embodiment of an electronic lock can comprise a housing having a first face, a lock aperture that extends through the first face of the housing, a keyhole that passes through the housing, and a biometric interface attached to the housing. The housing contains, for example, a controller, a biometric reader electrically coupled to the controller, and a proximity-based wireless communication device electrically coupled to the controller. Also, a lock transitions from a locked position to an unlocked position in cooperation with a locking mechanism that is insertable into the lock aperture. For instance, the lock can include a locking member that restricts a zipper clasp inserted into the lock aperture from being removed when the lock is in the locked position, a locking member that restricts at least one of a shackle, hook, or bolt inserted into the lock aperture from being removed when the lock is in the locked position, etc.
Yet further, a mechanical key receiver is configured to accept a physical key. Under this arrangement, the controller can issue an unlock command signal to cause the lock to transition from the locked position to the unlocked position in a manner that is independent of the mechanical key receiver, based upon at least one electronic verification selected from a match of a biometric read by the biometric reader to electronic data identifying an authorized user, or a match of an identifier read by the proximity-based wireless communication device (e.g., a nearfield electronic communication (NFC) reader that communicates with a corresponding NFC tag, a Bluetooth receiver that is configured to only pair with authorized users, etc.) to electronic data identifying the authorized user. Moreover, the lock is controlled to transition from the locked position to the unlocked position by the mechanical key receiver engaging a physical key independent of the unlock command signal from the controller. In some embodiments, there can be both a first proximity-based wireless communication device, such as a nearfield electronic communication (NFC) reader that communicates with a corresponding NFC tag, and a second proximity-based wireless communication device, such as a Bluetooth receiver. As noted more fully herein, the electronic lock can include an authentication device such a positioning system, e.g., a global positioning system (GPS) receiver that is controlled by the controller to determine the position of the electronic lock when an attempt is made to unlock the lock, as set out more fully herein.
However, other combinations of features described herein can be combined to form an electronic lock. By way of example, an electronic lock could include the GPS 636 of
With reference to the FIGURES generally, the example technologies described herein can be used in various ways to cause the controller to issue an unlock command. For example, the controller can respond to a PIN (e.g., personal identification code) as a way to establishing authentication to issue an unlock command. The PIN can be a sequence, pattern, or other code entered into a smart device, e.g., smartphone. In the case of a smart device running an app, a PIN can be used in addition to, or in lieu of pressing an “unlock” virtual button on a graphical user interface of the smart device. Here, the PIN can be any combination of alpha numeric or special characters.
The PIN can also/alternatively be implemented using coded pulses, e.g., analogous to Morse code. The code entry can be implemented by tapping the biometric reader, e.g., biometric reader 204. In this manner, instead of reading an actual biometric input, the biometric reader detects activation, and sends a signal to the controller. The controller is programmed to “listen” for a series of pulses or activations, and convert those received serial pulses or activations into a PIN. If the interpreted pattern matches a pre-stored pattern, then the controller can send an unlock command. Thus, for example, determining agreement of a match of electronic data corresponding to a biometric read by the biometric reader to data identifying an authorized user can comprise collecting the data corresponding to a biometric read by the biometric reader by collecting a series of taps on the biometric reader, thus forming a PIN and comparing the determined PIN to the data identifying the authorized user.
With the above in mind, yet another example implementation of an electric lock comprises a housing having a lock aperture extending through a face thereof, and a biometric interface attached to the housing. Also, a locking system is contained within the housing. Here, the locking system comprises a controller. The locking system also includes one or more authentication devices. For instance, the locking system includes a biometric reader electrically coupled to the controller and to the biometric interface. A lock transitions between a locked position and an unlocked position such that when the lock is in the locked position and the locking mechanism is inserted into the lock aperture, the locking mechanism is locked to the housing and when the lock is in the unlocked position, the locking mechanism can release from the housing. Responsive thereto, an electric actuator is electrically coupled to the controller, and is operable to transition the lock between the locked position and the unlocked position. Under this configuration, the controller issues an electronic unlock command signal, e.g., to the electric actuator, to cause the lock to transition from the locked position to the unlocked position upon determining agreement of a match of electronic data corresponding to a biometric read by the biometric reader to data identifying an authorized user or detecting that the user tapped a PIN into the biometric interface that matches a PIN corresponding to the user, where the PIN is stored in memory accessible by the controller.
This same concept can be applied to other input devices. For instance, instead of the controller using voice commands per se, a user could tap on the microphone to send a pattern of touches. The controller listens to the pattern of taps and if the interpreted pattern matches a pre-stored pattern, then the controller sends an unlock command to the lock. Instead of tap or in addition to taps, a microphone can use utterances, pitch, duration volume, or a combination thereof to assemble a pattern into an input that can be matched to a pre-stored value representing an authorization, and trigger an unlock command. Still further, a PIN code can be tapped into graphical user interface on a smartphone that is linked to the lock, e.g., via Bluetooth, WiFi, ultrawide-band, etc.
A related approach can be taken with location sensing features, such as GPS. The user can program a geo-location as a lock or unlock position. Yet further, the other devices connected to the controller can be converted into PIN code generators using techniques analogous to that described above. This allows features provided in an electronic lock to serve multiple purposes, including use as a PIN generator in addition to, or in lieu of using an associated device in its normal capacity as described more fully herein.
Yet further, as noted in greater detail herein, a user possessing a smart device, e.g., smartphone, smartwatch, smart fitness tracker, tablet, laptop, etc. can link the smart device to the electronic lock, e.g., via Bluetooth, WiFi, ultra-wide band, etc. Using a technology such as UWB allows the controller to be programmed with rules that affect wither the controller will issue an unlock command. For instance, ultra-wide band, Bluetooth, WiFi, and similar technologies can sense the presence of an external device without actually communicably pairing or connecting with that external device. As such, the controller can be programmed, e.g., via a user interface on a smart device (e.g., smartphone, smart watch, smart appliance, etc.) or computer, to only issue an unlock command if the user authenticates to the controller (e.g., using a technique(s) described more fully herein) and a particular external device or devices (e.g., different from, the user's smart device) is/are either present, or not present. For instance, if the controller detects that the user is home, a home WiFi router may be broadcasting a WiFi network name that is recognized by the controller. The controller can use the detection of the WiFi as a sort of inferential positioning system to know that the user is in a familiar setting, thus authorizing an unlock command. Many other examples can be implemented based upon the disclosure herein.
The user can also pair a smart device such as a smartphone to the electronic lock. Under this configuration, using GPS, Bluetooth, ultra-wide band, Wi-Fi, etc., in either the electronic lock, the smartphone, or both, the controller can determine whether the electronic lock is within a predefined geo-boundary of the smartphone. In this regard, the controller is programmed with a rule that causes the controller to not send an unlock command to the electronic lock if the electronic lock is outside the defined geo-boundary.
In still another example embodiment, the controller is programmed to utilize signal strength, e.g., via a received signal strength indicator (RSSI) or other measure of power, signal strength or other measurable parameter.
Also, as described more fully herein, the controller can issue an unlock command based upon a predefined authentication. The authentication can, in some embodiments, come from one feature/modality (e.g., biometric input, smart device pairing, PIN code entry, etc.). In other embodiments, the controller is programmed by a rule that provides a predefined authentication based upon multi-technology/multi-modal verification, e.g., NFC plus smart device pairing, or any two or more modalities/features described herein, etc.). In still further embodiments, the controller is programmed with a rule that defines authentication based upon single feature/modality or multi-feature/modality plus external environment criteria, e.g., and not in a predefined geo-boundary (and not at the park), within a predefined geo-boundary (e.g., in my car, at my house, etc.), and within the presence of an external device, and only if not in the presence of a known external device, etc.
Still further, where the controller has access to memory, the controller can store metrics, including successful unlocks, failed attempts, timestamps and other meta data, which can be exported to a smartphone, e.g., either directly or via a cloud based data gathering process.
In some embodiments, the controller can include a boot loader or other feature that allows a smart device, computer, etc., to flash the electronic lock with a software update, e.g., to change firmware.
Yet further, as best illustrated in
Here, the controller 602 can provide feedback via multiple modes, e.g., by controlling an LED (e.g., I/O 640) to flash or change color when the battery level crosses the first threshold indicating the need to be recharged, or the second threshold indicating the need to either secure the lock in the locked state (or alternatively, to unlock the lock) depending upon the user configuration. The percentage given for the first and second thresholds are by way of example only. Other values can be utilized instead.
Referring to the FIGURES generally, as a few additional non-limiting but illustrative examples, a clasp can be received into a lock aperture (e.g., lock aperture 106,
Example Zipper Lock
Referring now to
In practical applications, one or more features of the electronic lock 700 are exposed to a user via the housing 702. For instance, as illustrated in the example electronic lock 700 of
The electronic lock 700 can include an optional keyhole 708 that passes through the housing 702. In the embodiment shown in
Still further, a biometric interface 710 is attached to or otherwise passes through the housing 702. In the embodiment shown in
In practical applications, the biometric interface 710 can form part of a fingerprint/thumbprint scanner. In this regard, the biometric interface 710 can optionally include a pad 712. The pad 712 provides an interface for receiving a biometric input from a user, receive a tapped in PIN from a user, or combination thereof, as set out in greater detail herein. However, other biometric-based sensing technologies can also/alternatively be utilized.
As noted more fully herein, the electronic lock 700 can include other electronic identification features in addition to, or in lieu of the biometric interface 710, e.g., NCF, Bluetooth, Ultra-wide band, etc.
Optionally, the electronic lock can also include one or more user interface input/output features. The input/output 714 can include one or more buttons, pads, knobs, encoders, switches, Light Emitting Diodes (LEDs) or other input and/or output devices that facilitate user interaction with the lock.
Referring to
Referring to
The locking system receives a locking mechanism 900 (e.g., the zipper clasp 800,
With reference to
As best illustrated in
Referring to
In operation, when a user pushes a locking mechanism 1000 (e.g., clasp) into the housing of a lock, a projection of the clasp compresses a release 1016 via springs 1018. To keep the release 1016 in a biased position, the locking pin 1008 includes a nose that is received into an aperture of the projection of the locking mechanism 1000. The locking pin 1008 is urged into the aperture via spring 1010. Thus, the spring 1010 and springs 1018 compress and expand in orthogonal directions. To unlock the device the lock lever (see lock lever 904) moves laterally across the locking pin 1008 into the “C” opening, in a wedging motion. As the lock lever wedges into the locking pin 1008, the locking pin 1008 begins to recess, thus compressing the spring 1010 until the nose of the locking pin 1008 releases from the aperture of the locking mechanism 1000. Once the nose is released, the bias of the springs 1018 causes the release 1016 to project up, thus launching the locking mechanism 1000 out of the housing of the lock. Thus, the unlock spring biases an ejection or partial ejection of the locking member from the lock housing.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Referring back to the FIGURES generally, in another example embodiment, the controller is programmed to enable or allow third-party device pairing. For instance, using Bluetooth, a user can custom program a Pairing code in response to a request to pair. Because the Pairing code is unique and known to the user (or programmed by the user in some embodiments), the user can decide to share that code with another device. For instance, if a user does not have access to their smart device, e.g., smart phone, but needs to unlock the electronic lock, the user can “borrow” a smart device and pair with that device using the known pairing code. In some embodiments, the controller, recognizing a correct pairing code, but different MAC address, can log the occurrence, e.g., including a time stamp, location stamp, MAC address stamp, etc.
The description of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the disclosure.
Having thus described the disclosure of the present application in detail and by reference to embodiments thereof, it will be apparent that modifications and variations are possible without departing from the scope of the disclosure defined in the appended claims.
This application is a continuation of U.S. patent application Ser. No. 16/987,467, filed Aug. 7, 2020, now allowed, which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/891,215, filed Aug. 23, 2019, entitled “ELECTRONIC LOCK”, the disclosure of which is hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
62891215 | Aug 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16987467 | Aug 2020 | US |
Child | 18483319 | US |