This application is related to an electronic locking system. More particularly, this application is related to a lock, such as a padlock or a door lock, having a radio frequency identification (RFID) and/or Bluetooth capability.
An electronic door lock may be accessed, for example, with a magnetic strip key card, a smart card, or a proximity badge, or by using a personal identification number, or the like. Typically the lock includes a card reader into which a key card or a smart card can be inserted. The key card and the smart card include a magnetic strip that stores a code or other access information that is read by the electronic lock. The keycard “KEY” may also be a card that has an imbedded RFID chip. If the code on the key card or the smart card matches predefined criteria, the electronic lock will operate the door latch to allow access to the area secured by the lock.
An electronic lock, such as a padlock or a door lock, having RFID and/or Bluetooth capabilities is disclosed. The control system included in the lock may obtain identifying information from a user device, such as an RFID device or a Bluetooth device, presented close to the lock, and operates an actuator to unlock the lock based on the identifying information. The control system may also operate the actuator based on time-based information, Global Positioning System (GPS)-based information, and/or customized access grant criteria programmed by the user based on specific-use case conditions. The lock may include both an RFID reader and a Bluetooth system in a single device, and may automatically lock and unlock the lock by detecting a presence or an absence of a user device near the lock.
The lock includes a housing, a locking mechanism for locking the lock, and a lock control system including an RFID reader, a Bluetooth system, and a processor. The lock may also include other bi-directional communication sub-systems such as Z-wave, WiFi, or radio frequency (RF) communication protocols. The lock control system is configured to actuate the locking mechanism based on identifying information obtained via the RFID reader or the Bluetooth system.
At least a portion of a front face of the housing of the lock in front of an RFID antenna and a Bluetooth antenna may be made of non-metallic material. A non-metallic isolation may be provided between a wrap-around body and a bottom plate of the housing of the lock.
An RFID circuitry and a Bluetooth circuitry are printed on a printed circuit board (PCB), and a ground plane provided for the RFID circuitry and the Bluetooth circuitry may have a slot where an RFID antenna and a Bluetooth antenna are located. A cutout may be provided on a front plate of the housing, leaving an RFID antenna and a Bluetooth antenna exposed.
The lock may be a padlock including a shackle and a housing. The housing may include a dowel pin channel for accommodating a dowel pin attached around a bottom of the shackle, wherein the dowel pin channel is extended vertically with a horizontal extension at a top of the dowel pin channel such that the shackle can move vertically freely but cannot swivel until the shackle is fully extended out of the housing.
The lock may include a sensor to provide a signal to the processor that the shackle is in the closed and locked position.
The lock may include a data connector, such as a micro Universal Serial Bus (USB) connector, for connecting to an external entity. The data connector may be accessed through a channel formed in the housing.
The locking mechanism may include a servo motor and a metal pin drivable by the servo motor. The metal pin may be inserted into a notch formed into a shackle when in a locked state, and retracted from the notch when in an unlocked state.
The lock may include an indicator (e.g., light-emitting diodes (LEDs)) for indicating at least one of a power-on state, a Bluetooth connection status, a locked or unlocked status, a low-battery state, or the like.
The lock may be a door lock including an external unit and an internal unit installed outside and inside a door, respectively. The external unit includes an external handle and the internal unit includes an internal handle. The locking mechanism may include a servo motor and a metal pin drivable by the servo motor. The metal pin may be driven into a locking hole formed into the external handle in a locked state to prevent the external handle from rotating, and the metal pin may be extracted from the locking hole in an unlocked state.
The external handle and/or the internal handle may be a two-part assembly including a hand-gripping part and a plate rotatably attached to the external unit or the internal unit. The hand-gripping part is attached to the plate with two screws such that the screws break before any other components of the lock break when an excessive force is applied to the hand-gripping part.
The lock may include a decoupling means configured to allow the internal handle to turn and open the door without operating the external handle. The lock may include an automatic back unlock means configured to detect operation of the internal handle to unlock the door and leave the door unlocked. The lock may include a door lock turning prevention means for allowing the external handle to rotate in a specific direction.
The lock may stay in a sleep state until a button on a front plate of the lock is pressed by a user and returns to the sleep state after use or a predetermined period of inactivity. The lock may be configured to wake up periodically in order to communicate and receive instructions from the user (e.g., via Bluetooth, WiFi, or any other means).
The lock may include a memory to store identifying information of users that opened the lock, and time and date information that the lock was opened. The lock control system may be configured to automatically unlock and lock the lock by detecting a presence or an absence of an RFID device or a Bluetooth device within a range of the lock.
The lock may include a door proximity sensor to determine if the door is in the open or closed position.
The lock control system may be configured to maintain a list of Bluetooth-enabled devices that it has previously connected to, and establish a connection with a Bluetooth-enabled device based on the list.
The lock may include a GPS module to determine a geolocation of the lock. The lock may be programmed to open or remain closed inside a specific geolocation. The lock-opening credentials may be based on time or location.
The locking system may include a fixed “master access code” programmed in the lock firmware that may not be erased or changed via Bluetooth or RFID. The locking system may be set up to allow administrator credentials via a particular protocol. The lock may be set up such that the first RFID code scanned by the lock may become the master authorizing credential.
The lock may be set up such that after scanning an authorized card or receiving an authorized command via RF communication, the program button may be pressed or appropriate credentials may be sent via RF communication means to restore all factory default settings on the lock.
The lock may be set up such that after scanning an authorized card or receiving an authorized command via RF communication, the program button may be pressed or appropriate credentials may be sent via RF communication means to customize the authorization credentials.
The lock may be programmed to read one key or any number of keys.
The lock may be configured to read one or several standard near field communication (NFC) protocols simultaneously depending upon user preference and/or available memory space.
The lock may include a real time clock (RTC) configured to keep time and date information. The lock control system may be configured to keep records of identification of a device used to open the lock and time and date information when the lock is opened, and provide the records to a user or owner of the lock. The lock control system may be configured to provide time-based access to a location secured by the lock.
The lock may further include a bolt that is spring-loaded in an open state and released in response to a signal sent from the lock control system to lock the lock.
Embodiments hereafter will be explained with reference to a padlock and a door lock. However, it should be noted that the embodiments disclosed herein can be applied to any types of locks. For example, embodiments disclosed herein can be applied to a padlock, a deadbolt door lock, a sliding door lock, a display case lock, a computer security lock, or any types of locks.
In accordance with an embodiment, a lock, such as a padlock or a door lock, has RFID/near field communication (NFC) and/or Bluetooth capabilities. The control system in the lock is capable of obtaining identifying information of a user device (such as an RFID/NFC device or a Bluetooth device) that is presented close to the lock. If the identifying information of the user device indicates that the holder of the user device is authorized to access the area secured by the lock, the control system operates the actuator to unlock the lock.
A lock 100 may be provided with a button 118 on a front face of the lock 100. When a user (i.e., a holder of a user device 120 (e.g., an RFID device or a Bluetooth device)) presses the button 118, an input signal is sent to the processor 110. Upon receipt of the input signal, the processor 110 sends an activation signal to the RFID reader 102 or the Bluetooth system 104. The RFID reader 102 or the Bluetooth system 104 then searches for the user device 120 for obtaining identifying information from the user device 120. The identifying information may be obtained from the user device 120 in accordance with a conventional process or protocol known in the art. For example, in response to the activation by the processor 110, the RFID reader 102 may emit an RF signal via the RFID antenna 106 to an RFID device, and obtain information back from the RFID device in response to the RF signal.
The user device 120 may be an RFID tag, an NFC tag, a smart card, or the like, or may be an NFC-enabled or Bluetooth-capable phone or hand-held computing device, or a smart phone or any hand-held computing device functioning as an RFID tag or an NFC tag.
The RFID reader 102 or the Bluetooth system 104 then sends the identifying information obtained from the user device 120 to the processor 110. The processor 110 determines whether the holder of the user device 120 is authorized to access the area secured by the lock 100 by comparing the received information to the information stored in the memory 112 of the lock 100. If it is determined that the holder of the user device 120 is an authorized person, the processor 110 sends a signal to the actuator 114 to operate the locking mechanism 116 to unlock the lock 100.
As shown in
A lock 100 is typically made of metal. Placing an RFID reader 102 in close proximity to, or surrounding it by, metal reduces its reading range and may completely disrupt its operation. This occurs because eddy currents are induced in the metal by the alternating magnetic field of the RFID reader 102. Eddy currents are currents induced in conductors to oppose the change in flux that generated them. The eddy currents are caused when a conductor is exposed to a changing magnetic field due to relative motion of the field source and conductor, or due to variations of the field with time. The eddy currents result in ohmic losses as heat and also generate opposing magnetic fields that cancel a portion of the RFID reader field.
It should be noted that the padlock 200 shown in
The internal components of the padlock 200, such as the processor 110, the memory 112, the actuator 114, the RFID reader 102, the Bluetooth system 104, etc., may be powered by a battery 119. In order to lower the power consumption of the battery 119, the padlock 200 may transition between a sleep state (i.e., a low-power state) and an active state. The padlock 200 may stay in the sleep state until the button 219 on the front plate of the padlock 200 is pressed, which activates the internal components of the lock 100. The padlock 200 may be configured to wake up periodically or based on certain triggers in order to communicate and receive instructions from the user (e.g., via Bluetooth, WiFi, or any other means).
As explained above, a user may press the button 219 on the front face of the padlock 200 to access the padlock 200. Once the button 219 is pressed, the processor 110 may transition from the sleep state to the active state and power may be supplied to the components of the padlock 200 including the RFID reader 102 and the Bluetooth system 104. The power may remain available for a specified period of time, after which the power is removed. In one embodiment, once the control system of the padlock 200 is activated, the padlock 200 may make a wireless connection (e.g., using the Bluetooth system 104) to a hub or a server and transmit data stored in the memory 112 to the hub or server.
The authorization information (e.g., identifying information of authorized devices) may be stored in the memory 112 of the lock 100 so that the processor 110 may determine whether the holder of the user device 120 (e.g., an RFID device or a Bluetooth device) is an authorized person based on the information stored locally. Alternatively, a separate module may be used to authorize the user device 120 to work with the lock 100. The authorization information may be stored in a separate server, and may be downloaded to the lock 100 from the server. When the lock 100 is powered on, the lock 100 may update the authorization information from the server. This can allow information transfer without significantly increasing the battery usage.
As shown in
As shown in
As described above, the internal components of the padlock 600, such as the processor 110, the memory 112, the actuator 114, the RFID reader 102, the Bluetooth system 104, etc., may be powered by a battery 119. In order to lower the power consumption of the battery 119, the components of the padlock 600 may stay in a sleep state until the button 618 on the front plate is pressed, which activates the internal components of the padlock 600. The components of the padlock 600 may power down and go into a sleep state after use or a predetermined period of inactivity. This keeps the power consumption low for a longer battery life.
In response to the signal from the button 618, or periodically or in response to a predetermined trigger, the processor 110 may transition from a sleep state to an active state, and activate the internal components of the padlock 600, such as the RFID reader 102 or the Bluetooth system 104. The processor 110 may remain active until a predetermined period of inactivity, after which the processor 110 goes back to the sleep state. The padlock 600 may be configured to wake up periodically or based on certain triggers in order to communicate and receive instructions from the user (e.g., via Bluetooth, WiFi, or any other means).
The padlock 600 may be locked and unlocked manually by an RFID device or by a Bluetooth device with an associated application. Alternatively, the padlock 600 may be locked and unlocked automatically by detecting the presence or absence of the user device 120 within a certain range of the padlock 600. For example, when a Bluetooth device comes close to the padlock 600, the Bluetooth system 104 in the padlock 600 may discover the presence of the Bluetooth device and obtain information from the Bluetooth device, and the padlock 600 may be automatically unlocked once it is determined that the Bluetooth device is a device authorized to access the area secured by the padlock 600. When the Bluetooth device goes out of a range, the Bluetooth system 104 in the padlock 600 discovers the absence of the Bluetooth device within the range, and the control system of the padlock 600 may automatically lock the padlock 600.
The embodiments disclosed with reference to
Embodiments for a door lock are disclosed hereafter.
When a user presses the button 1216, the processor 110 activates the RFID reader 102 and the Bluetooth system 104, and obtains identifying information from a user device 120 and may unlock the door lock 1200 based on the identifying information. The door lock 1200 may also notify a person inside, for example through the Bluetooth system. This notification may be ringing a user's phone after establishing a Bluetooth connection with the user's phone.
The door lock 1200 may include a door proximity sensor to determine if the door is in the open or closed position. Alternatively, the door proximity sensor may be installed in the door frame or the door and may send the information to the door lock 1200.
The external handle 1214 and the internal handle 1224 of the door lock 1200 may be a low-profile handle that allows the user to turn the handle and pull or push to open the attached door. Each handle 1214, 1224 has an opening 1402 as shown in
The processor 110 may be set up in two modes to control the outside lock state. The first mode (persistent lock state) returns the external lock back to a locked state (with a time delay) after each entry. The second mode is a free access mode where after each access event the lock state is toggled to the opposite state.
The door lock may have a sliding battery tray 1910 to install batteries.
The door lock 1200 may be configured to operate without the need for a motor-driven latch. This is a power-saving feature that allows the batteries to last much longer. For example, the door latch module 1230 may be a spring-loaded bolt latch in a deadbolt shape. The door latch module 1230 may have a catch mechanism so when the user opens the latch it is spring-loaded in the open position. When a signal is sent from the processor 110 to lock the door, the spring-loaded bolt latch is released to lock the door. A mechanical movement to lock or locking the external handle 1214 may release the spring-loaded bolt latch.
As explained above, a lock is typically made of metallic material, and placing an RFID antenna 106 and a Bluetooth antenna 108 in close proximity to, or surrounding these by, metal reduces their reading range and may completely disrupt their operation. This occurs because eddy currents are induced in the metal by the alternating magnetic field. The door lock 1200 may comprise both metallic and non-metallic components to reduce the interference with both RFID and Bluetooth signals. The components that are directly in front of, and behind, the RFID antenna 106 and the Bluetooth antenna 108 may be made of non-metallic material.
The internal components of the door lock 1200, such as the processor 110, the memory 112, the actuator 114, the RFID reader 102, the Bluetooth system 104, etc., may be powered by a battery 119. In order to lower the power consumption of the battery 119, the door lock 1200 may stay in a sleep state until a button 1216 on the front cover is pressed, which activates the internal components of the door lock 1200. The door lock 1200 powers down after use or a predetermined period of inactivity. This keeps the power consumption low for a longer battery life. In response to the signal from the button 1216, the processor 110 transitions from a sleep state to an active state, and transmits a signal to activate the RFID reader 102 or the Bluetooth system 104. The processor 110 may remain active until a predetermined period of inactivity, after which the processor 110 goes back to the sleep state.
The door lock 1200 may include LED indicators or any other type of indicators.
The door lock 1200 may have an internal memory 112 to store data. The door lock 1200 may store the information of users that opened the lock, the time and date that the lock was opened, and any other relevant information. The door lock 1200 may have an application running on the processor 110. The application may store the user and time/date/location information when a lock is opened as well as any other information.
The door lock 1200 may be locked and unlocked manually by an RFID device or a Bluetooth device with an associated application. Alternatively, the door lock 1200 may be locked and unlocked automatically by detecting the presence or absence of the Bluetooth device within a certain range of the door lock 1200. For example, when a Bluetooth device comes close to the door lock 1200, the Bluetooth system 104 in the door lock 1200 may discover the presence of the Bluetooth device and obtain information from the Bluetooth device, and the door lock 1200 may be automatically unlocked if it is determined that the Bluetooth device is a device authorized to access the area secured by the door lock 1200. When the Bluetooth device goes out of a range, the Bluetooth system 104 in the door lock 1200 may discover the absence of the Bluetooth device within the range, and the door lock 1200 may be automatically locked.
A Bluetooth-enabled device (such as a phone) may connect to any Bluetooth-enabled device (such as a padlock, a door lock, or other locking devices having Bluetooth capability) it sees. Once a connection is established between Bluetooth-enabled devices, other devices may not connect to those devices. For example, in an environment with multiple (Bluetooth-enabled) phones and devices, connecting a particular phone to a particular Bluetooth-enabled device is very difficult.
In one embodiment, a Bluetooth-enabled device may connect to other Bluetooth-enabled devices it has previously connected to. A Bluetooth-enabled device may keep a list of addresses (such as MAC addresses) of the devices it has previously connected to. When the Bluetooth-enabled device searches for devices to connect to, it compares the addresses (e.g., MAC addresses) of each device with the list in its memory and connects to the device if there is a match.
New devices may be added to the list. Once a Bluetooth-enabled device is added to the list, the device may be connected to even in the presence of other devices. The addition of the Bluetooth-enabled device to the list may be done before the device is used in a crowded environment. Alternatively or additionally, a device with Bluetooth capability may connect to any Bluetooth-enabled device upon verification by the user (e.g., by entering that device's password).
A conventional lock may be opened and closed without any control. The owner and/or user of the lock might not know whether a location or material secured by the lock was accessed through the locking mechanism. In accordance with one embodiment, the lock may have a real time clock (RTC) that continually tracks time and date. The time and date may be updated by another device (e.g., a phone) when a connection is made between them. When the lock is opened, the identifying information of the user device (e.g., an RFID or NFC tag or a Bluetooth-enabled phone) used to open the lock is captured and the identifying information and the time information are recorded in a database in the memory of the lock. An application running on the processor 110 of the lock (e.g., a Bluetooth application) may then (with or without a password) provide these records to the owner or the user of the lock so that the owner or the user may know when and who accessed the locking mechanism.
Users may be given time-based access to a location secured by a lock. With the capabilities of a lock to keep track of time, the user or owner of the lock may set up the lock to allow a particular Bluetooth access code or RFID/NFC access code to be able to successfully access the lock at certain times. The lock firmware may also be programmed to give access based on the number of openings (e.g., one time, two times, etc.).
An administrator may program the lock to complete special administrative functions by scanning a special RF code that differs from a standard RF read code. An example of this would be to program a specific phone or Bluetooth password into many locks simply by reading a special RF-coded sequence through the standard RF interface.
Administrative rights over the lock 100 may be configured initially at the factory or subsequently by a user. In one embodiment, a fixed “master access code” may be programmed in the lock firmware that may not be erased or changed via Bluetooth, RFID, or the like. The locking system may be set up to allow administrator credentials via a particular protocol. For example, the lock 100 may be set up such that the first RFID code scanned by the lock 100 may become the master access code of the lock 100.
The lock 100 may be set up such that, for example after scanning an authorized device/card or receiving an authorized command, for example via RF communication, all factory default settings on the lock 100 may be recovered by pressing the program button or by sending appropriate credentials via RF interface (e.g., the Bluetooth system 104, etc.).
Alternatively, the lock 100 may be set up such that, for example after scanning an authorized device/card or receiving an authorized command, for example via RF communication, the authorization credentials may be customized by a user of the lock 100 by pressing the program button or by sending appropriate credentials, for example via RF interface. For example, the user may configure whether to use the real time clock, different RFID/NFC tag types, or the like.
The lock may be programmed to read one key or any number of keys. The lock may be configured to read one or several standard NFC protocols simultaneously depending upon user preference and/or available resources, such as memory space.
The capabilities to control the lock and store access records may be implemented in the lock locally. In this case, no connection to the web or cloud is needed to grant or reject access. The lock may have a database and may also have timing and decision-making capabilities within the lock itself. Alternatively, the lock may be provided with the capability of sending data over the cloud or web to enable remote access.
The lock may have the ability to automatically unlock, and turn itself on, when a connected Bluetooth device is present (with application and Bluetooth on) in a close range. This allows quicker access to the locks. However, there may be situations where the user or owner of the lock wants to grant specific validation before opening the lock. For example, a padlock on a gun case may be opened by a child if the parent is in another room and the child presses the padlock button, turning the lock off. In order to prevent the lock from inadvertently opening, the application may be set to require the user to grant access through the application for the lock to unlock. In this way the lock may not be opened just by turning the lock on (with a button press).
One or more of the features, functions, procedures, operations, components, elements, structures, etc. described in connection with any one of the embodiments described herein may be combined with one or more of the functions, procedures, operations, components, elements, structures, etc. described in connection with any of the other embodiments described herein, where compatible.
The steps and/or actions of the methods described herein may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is required for proper operation of the method that is being described, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
The claims are not limited to the specific implementations described above. Various modifications, changes and variations may be made in the arrangement, operation and details of the implementations described herein without departing from the scope of the claims.
This application claims priority to U.S. Provisional Application Nos. 62/034,942, filed Aug. 8, 2014; 62/105,166, filed Jan. 19, 2015; 62/105,206, filed Jan. 20, 2015; and 62/131,320, filed Mar. 11, 2015, which are incorporated herein by reference as if fully set forth.
Number | Date | Country | |
---|---|---|---|
62034942 | Aug 2014 | US | |
62105166 | Jan 2015 | US | |
62105206 | Jan 2015 | US | |
62131320 | Mar 2015 | US |