The present disclosure relates to high security locks and more particularly pertains to a new high security lock with multiple operational modes for providing an enhanced level of security in a hybrid lock.
There are three primary categories of locks in current use, including mechanical cylinders, electro-mechanical locks, and electronic locks. Electronic locks may utilize credentials transmitted to the lock through a variety of different wireless technologies, including radio-frequency identification, (RFID), near field communication (NFC), Low Energy Bluetooth, or through a keypad used to enter a code number, commonly known as a personal identification number (PIN). Electronic locks may also have a mechanical lock to bypass the electronic lock in the event of electronic failure.
There are two main classifications that define the security of a lock: conventional and high security. Standards organizations such as Underwriters Laboratories and the Builders Hardware Manufacturers Association (BHMA) rate the level of security provided by a lock based upon three criteria. The first is the lock's resistance to physical attack (forced entry), the second is the lock's resistance to non-destructive manipulation (covert or surreptitious entry), and the third is the lock's ability to restrict the availability of key blanks and to make their replication difficult (key control). Key control is particularly critical for high security locks, but is also important for some conventional locks. The concept and practice encompasses both organizational and physical key security. Key control relates to the designed characteristics of the keyway, internal active locking components, and the design of the mechanical bitted key to make it difficult to obtain blank keys, and to control the ability to make unauthorized keys through duplication, replication and simulation.
High security locks must be designed to make the availability of restricted keys and corresponding keyways very difficult to obtain by unauthorized individuals. Patented key protection often incorporates special security enhancements such as undercuts, movable interactive elements, special shapes, unique bitting shapes and sizes, angled cuts, dimple cuts, and countless other innovations to make mechanical keys more secure. Some manufacturers have also introduced magnets and electronic elements to frustrate key copying without the proper authority.
The fundamental problem with virtually all mechanical and electro-mechanical lock designs is that they can be compromised, with varying degrees of difficulty, by various methods of covert, forced attack and the compromise of even the highest levels of key control, alone or in combination with each other.
The most secure locks, even if they contain or are based upon electronic credentials, may ultimately fail. They are largely ineffective against skilled craftsmen or criminals who understand the recognized methods of compromise of mechanical locks. Not only are the locking cylinders at risk, but virtually all conventional and high security keys can be copied, simulated, or replicated, because the easiest way to open a lock is withy a key.
Pin tumbler and other forms of traditional mechanical locks and keys suffer from significant security vulnerabilities including picking, impressioning, decoding, key duplication by conventional means and the newer three dimensional (3D) printing technologies, and the extrapolation and decoding of the top level master key within a system of locks. Such mechanically-based cylinders are all designed upon well-known and old technologies that make them subject to compromise by skilled individuals in the art of covert and forced entry. Most mechanical cylinders do not have a high security rating, which means their security can be very easily circumvented through traditional methods of attack. The security of mechanical cylinders and their keys are further at risk due to the constantly developing 3D printing technology which can allow the compromise of the highest security systems if such systems are based solely upon the security of mechanical keys.
By definition, mechanical cylinders intended for high security installations are themselves secure against physical attacks such as drilling, application of torque, and other forms of compromise. In addition, lock manufacturers have incorporated many different designs to make the internal active locking components highly resistant to covert forms of manipulation, such as picking and impressioning and decoding and bumping. While the active locking components, such as pin tumblers, sliders, disks, sidebars and other security enhancements that are contained within these high security-rated cylinders are secure and meet stringent standards promulgated by Underwriters Laboratories, BHMA, and European standards organizations for protection against cover entry attacks, their mechanically-based credentials (keys) are not of equivalent security.
The critical vulnerability for high security mechanical cylinders is their metal keys. These “credentials” can be copied by many traditional means known to those skilled in the art, including casting, molding, plastics, portable milling machines such as the German Easy Entrie, and epoxy. Keys can also be visually decoded, photographed and reproduced, and often easily simulated in different materials, including plastics.
The latest threat to all mechanically-based locking systems is 3D printer technology. The current generation of 3D printers allows the reproduction of virtually any mechanical key, thus potentially placing at risk the security of every mechanically-based locking system and its keys, even those of the highest security as defined by the standards organizations. 3D printers have been able to reproduce blank keys and those with bitting, for many different systems that are ostensibly restricted and highly resistant to copying or simulation. Bump keys have been created from photographs and then generated in plastic or metal with 3D printers, and master keys systems can be easily compromised once blank keys are produced through this technology.
Several lock manufacturers produce a hybrid lock that contains both a mechanical locking portion, and an electronic-controlled element. Both of these security layers (mechanical and electronic) must operate in parallel, so the ostensible security of the lock is enhanced. Electronic credentials for these locks are embedded in the keys, so that both traditional mechanical bitting and an electronic element is required to open the lock. The idea in creating electro-mechanical locks was that they would have the best of both worlds as far as their security. That is, there would be two distinct security layers running in parallel. The mechanical bitting provided the first level of protection against physical and manipulation attacks, and the electronic credentials offered a much higher level of security for key control that does any mechanical key.
The problem with this premise is that all electro-mechanical cylinders are a compromise because of space limitations. All of the components must be compressed into the same form-factor as their traditional mechanical-only counterpart. The result is that while the electronic credentials are much more secure than their mechanical key counterpart, the physical security of the electro-mechanical cylinder will never meet the same high security criteria as conventional mechanical high security cylinders. There are inherent compromises in physical security because of the space limitation and requirement for the use of less secure materials.
The mechanical bitting portion of these electro-mechanical cylinders is still subject to covert entry attack. It has been demonstrated repeatedly that electro-mechanical cylinders can be compromised by both forced and covert entry because of inherent design compromises, as well as certain attacks on the mechanical elements that are controlled by electronic credentials.
All-electronic locks, meaning those that rely solely upon electronic credentials for their security, suffer much the same security deficiency as electro-mechanical cylinders. They are not physically secure against forced attack, even though their electronic credentials offer many options not available in mechanical designs.
In one aspect, the present disclosure relates to a lock system which may comprise a lock assembly including a locking element movable between a locking position and an unlocking position. The system may also comprise a first lock actuating assembly configured to be mechanically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, and a second lock actuating assembly configured to be electrically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions. The lock assembly and the first and second lock actuating assemblies may have a first mode of operation characterized by the first lock actuating assembly being capable of actuating the lock assembly, a second mode of operation characterized by the second lock actuating assembly being capable of actuating the locking element of the lock assembly, and a third mode of operation being characterized by the lock assembly being actuated only by substantially simultaneous operation of the first lock actuating assembly and operation of the second lock actuating assembly.
In another aspect, the disclosure relates to a lock system that may comprise a lock assembly including a locking element movable between a locking position and an unlocking position, and a first lock actuating assembly configured to be mechanically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, with mechanical operation of the first lock actuation assembly occurring through a physical object. The system may also comprise a second lock actuating assembly configured to be electrically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, with electrical operation of the second lock actuating assembly occurring through reception of a wireless signal by the second lock actuating assembly. The lock assembly and the first and second lock actuating assemblies may have a first mode of operation characterized by the first lock actuating assembly being capable of actuating the lock assembly and the second lock actuating assembly being incapable of actuating the lock assembly, a second mode of operation characterized by the second lock actuating assembly being capable of actuating the locking element of the lock assembly and the first lock actuating assembly being incapable of actuating the lock assembly, and a third mode of operation being characterized by the lock assembly being actuated only by substantially simultaneous operation of the first lock actuating assembly and operation of the second lock actuating assembly.
In yet another aspect, the disclosure may relate to a lock system that may comprise a lock assembly including a locking element movable between a locking position and an unlocking position, and a first lock actuating assembly configured to be mechanically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, with mechanical operation of the first lock actuation assembly occurring through a physical object. The system may also comprise a second lock actuating assembly configured to be electrically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, with electrical operation of the second lock actuating assembly occurring through reception of a wireless signal by the second lock actuating assembly. The lock assembly and the first and second lock actuating assemblies may have at least one mode of operation characterized by the lock assembly being actuated only by substantially simultaneous operation of the first lock actuating assembly and operation of the second lock actuating assembly.
There has thus been outlined, rather broadly, some of the more important elements of the disclosure in order that the detailed description thereof that follows may be better understood, and in order that the present contribution to the art may be better appreciated. There are additional elements of the disclosure that will be described hereinafter and which will form the subject matter of the claims appended hereto.
In this respect, before explaining at least one embodiment or implementation in greater detail, it is to be understood that the scope of the disclosure is not limited in its application to the details of construction and to the arrangements of the components, and the particulars of the steps, set forth in the following description or illustrated in the drawings. The disclosure is capable of other embodiments and implementations and is thus capable of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
As such, those skilled in the art will appreciate that the conception, upon which this disclosure is based, may readily be utilized as a basis for the designing of other structures, methods and systems for carrying out the several purposes of the present disclosure. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the present disclosure.
The advantages of the various embodiments of the present disclosure, along with the various features of novelty that characterize the disclosure, are disclosed in the following descriptive matter and accompanying drawings.
The disclosure will be better understood and when consideration is given to the drawings and the detailed description which follows. Such description makes reference to the annexed drawings wherein:
With reference now to the drawings, and in particular to
The applicants have recognized the need for a lock that is physically secure against both forced and covert attacks and incorporates two separate yet integrated security layers: mechanical and electronic. Applicants have recognized that both mechanically- and electronically-triggered or operated lock systems have at least some degree of vulnerability to covert attacks. Mechanically-operated locks can be compromised in a number of ways, several of which are mentioned in this disclosure. Electronically-operated locks may be triggered by wireless transmissions or retransmissions or field generations that may or may not originate from authorized devices or objects, such as key cards, security fobs, etc. While there may seem to be some similarity to current electro-mechanical cylinder designs, there is a critical distinction, as the disclosed lock system provides security against brute force physical attacks, manipulation attacks, and the protection of key control, and can be added to virtually any mechanical-based cylinder. In order to be secure, a lock must contain a locking mechanism based upon mechanical components that has been proven to be secure against picking, impressioning, decoding, key copying and key simulation, a physically-secure plug and shell to meet UL and BHMA standards, and must also contain advanced electronic credentials to allow different options that are required to protect against present security threats. The modes of locking and the ability to alter the use of mechanical and electronic elements provide a secure locking system as described herein. Significantly, while known lock systems provide only a single mode of operation (e.g., only a mechanical mode of operation, or only an electronic mode of operation, or only a combination mechanical and electronic mode of operation), the disclosed lock system provides the user with the option to use any one of multiple modes on the same lock, including, for example, mechanical operation, electronic operation, or a combination of mechanical and electronic operation. As an added level of security, some embodiments may also provide the option to disengage the deactivated portion of the device (e.g., mechanical or electrical) from influencing the operation of the latch or bolt. As another added security measure, the operational mode of the lock system may not be made apparent from viewing the installed system so that attempts to compromise the lock must deal with the need to determine the current operational mode of the lock system.
The disclosure describes an electronic and mechanical cylinder and configuration of components, either internal to any deadbolt cylinder configuration, or as an external “add-on” module to a deadbolt device, that may incorporate the attributes of the highest security mechanical cylinders, together with the enhanced electronic credentials that are found in the highest security electronic cylinders. The locking system of the disclosure may operate with conventional as well as high security cylinders and will provide a high level of security against simple and sophisticated methods of attack and will allow the user three distinct levels of security for a locking system which can be locally or remotely programmed, depending on hardware configuration and required levels of security of the user or facility. The unique combination of mechanical and electronic credentials and how they are implemented distinguishes this invention from current technology and state of the art.
When set to the highest security level, the combination of the lock system may be virtually impervious to attacks by covert and forced entry, and may also be totally resistant to the compromise of key control that can normally be accomplished through the use of traditional known methods of copying, duplicating, simulating and replicating the warding and bitting portion of mechanical keys. The lock system may also make the use of advanced techniques like 3D printer technology essentially meaningless because even if the correct key is produced for this lock, it will not open it without the correct electronic credentials to be operated in parallel. In other words, in one operating mode, the rotation (or blocking of rotation) of the plug, even with the correctly bitted key, will not result in the lock being able to be opened. The lock system 100 may be distinguished from current electro-mechanical designs, or purely mechanical designs, in this ability to, in one mode, block the plug from turning through the use of the correct key.
The lock system 100 allows for embodiments with several variations and designs to accomplish the same result of securing a mechanical cylinder against different attacks. In some embodiments, the lock system may be an add-on separate component that will operate with a single-sided deadbolt, which is a common device used in many applications throughout the world. Most single-sided deadbolts rely upon a thumb-turn positioned on the inside of the door, which provides the ability to retract and extend the bolt by the user turning the thumb-turn. The add-on embodiment of the lock system 100 differs from those currently in use.
The lock system 100 also differs from known electronic add-on devices presently on the market in a number of critical respects. The typical mode of operation for known electronic control of deadbolt locks require some form of wireless credentials, usually low energy Bluetooth, NFC, or RFID, as well as WiFi, to communicate to the lock through the use of a key fob or smartphone application. When the correct credential is presented, such as in the form or a receipt of a wireless signal recognized to be authorized or authentic, the lock can be opened or locked. In some cases, the face of the cylinder is touched, which senses the presence of the user. When the electronic credentials are detected, the lock can be opened or locked.
When electronic add-on products are added to deadbolt cylinders, the mechanical cylinder and key only provide a backup in case of failure of the electronics, and thus provide the ability to circumvent the electronic credentials. The problem with this arrangement is thus the same as conventional mechanical locks—the locks can still be compromised in a variety of means, depending upon their security rating and design. The locks are subject to forced and covert attacks, and do not provide any meaningful key control, so these electronic add-on systems are in essence convenience locks that can be opened electronically, obviating the need for mechanical keys.
One significant distinction between the lock system of the disclosure and other known locks is that the electronic control mechanism of the system allows the system to operate in one of three states, depending upon security requirements. Thus, the distinctive and unique feature of this invention is the control and mechanical module that determines how the lock functions and to effectively block access to the plug and internal components that would allow manipulation. The present disclosure provides a lock system with three modes of locking and access. Depending upon the setting selected by the user, the lock can be set to a (first) mode of mechanical actuation only, a (second) mode of electronic credentials actuation only, or a (third) mode of electro-mechanical actuation that requires the use of the mechanical actuation and electronic credentials, usually presented in a simultaneous or substantially simultaneous manner. For the purposes of this disclosure, substantially simultaneous actuation of the first and second lock actuating assemblies may include actuations of the first and second lock actuating assemblies that occur within a predetermined time period. For example, the predetermined time period in which actuation of both of the first and second lock actuating assemblies must occur to be considered substantially simultaneous actuations may range up to one minute between the time of actuation of one lock actuating assembly and the time of actuating the other lock actuating assembly, and may include possibly more time between actuations. In some of the more preferred implementations, the time between the actuations of the first and second locking actuating assemblies may be less than approximately 20 seconds, and in some of the most preferred implementations may be less than approximately 10 seconds or even approximately 5 seconds. In the third mode, if actuations of both of the first and second lock actuating assemblies are not detected within the predetermined period representing a substantially simultaneous actuation, then the lock assembly will not be actuated and actuation of the first and second lock actuations assemblies must be repeated if the lock assembly is to be successfully actuated.
The first mode, or mechanical-only mode, may be considered the relatively lowest security operating mode of the lock system and permits the mechanical lock cylinder to operate substantially as normal. For example, the user inserts the properly-bitted key, turns the key, and the lock either locks or unlocks. In this mode, there may be essentially no change to the lock's normal operation.
In the second mode, or electronic credentials-only mode, only the electronic credentials are required and utilized to control the actuation mechanism that allows the bolt to be extended or retracted. The operation of the key and its link to the bolt is removed and thus rendered inoperable. Significantly, in the second mode, even a properly-bitted key would have no effect upon the control of the bolt in contrast to normal operation of a conventional mechanical lock. In this mode, the operation of the mechanical lock may not operate the bolt, latch, or other fixing mechanism that is normally utilized to move the bolt to secure or unsecure a door. The second mode may be considered to provide a relatively higher level of security as compared to the first mode.
The third mode may provide the relatively highest degree of security among the modes as it requires two different types of authentication (e.g., mechanical key AND electronic credentials) to be used to actuate the lock into an unlocked condition, while the first and second modes only require one type of authentication (e.g., mechanical key OR electronic credentials) to unlock the system.
Depending upon the interface configuration, the lock system may either block any rotation of the plug in the second mode and as a result block the ability to manipulate internal lock components by picking and other covert entry attacks, or the plug will rotate free of the actuation mechanism even if a key with the proper bitting is inserted into the plug or the proper bitting is simulated (e.g., through picking), but such rotation will not result in any movement of the bolt or latch. Whether 1) the plug is blocked from rotation or 2) allowed to spin freely may be determined by the character of the interface between the plug tailpiece and the actuation mechanism, and in some embodiments may be set or determined by the user through the various setting provided to the user.
If the interface of the plug tailpiece and actuation mechanism is configured so that the two elements are disconnected or de-linked from each other, then the different modes of attacking or subverting the lock as described herein will not result in the bolt being actuated. While these manners of attacking the lock may result in the plug being turned, as well as the tailpiece, such attacks will have no effect because the plug will spin free of the actuation mechanism. In the second mode, unless the correct electronic credentials are presented, the actuation mechanism and thus the bolt cannot be moved or extended.
If the interface of the plug tailpiece and actuation mechanism is configured so that rotation of the plug, even with insertion of a correctly-bitted key, is physically blocked and cannot occur, then any attempt at subverting the lock by picking, impressioning, decoding, bumping, or even the use of the correct key will not result in the lock being opened, or its security being compromised.
By blocking rotation of the lock plug, which may extend to blocking as little as one degree of rotation, the recognized methods of covert bypass may be frustrated. Picking and impressioning cannot occur without a very slight movement of the plug when tension is applied. Similarly, master key extrapolation and bumping is rendered virtually impossible because rotational movement of the plug is required for feedback as to the success or failure of the process.
In implementations of the third mode, until the proper electronic credentials are presented to the lock simultaneously or substantially simultaneously with the correctly bitted key, the interface of the plug tailpiece and the actuation mechanism may completely block rotation of the plug through the use of a number of different mechanisms, including a motor drive, worm gear, solenoid, or magnetic coupling. In the third mode, key control is enhanced because even having the correctly bitted key will not permit the lock to be opened without the correct credentials.
These three modes of operation allow the user to determine, on a dynamic real-time basis, the desired security level provided by the lock system. Generally, only one mode of operation may be activated at a time. The mode of the lock system may be set in any suitable manner, such as by physical or mechanical controls on the lock system, or even both operated simultaneously, but in many implementations it may be desirable to provide control of the modes electronically and in particular wirelessly. In addition to changing modes, it may be desirable to add, delete, or change the device or devices having the appropriate credentials to operate the lock system, and this may also be performed electronically and/or wirelessly. Switching between the modes may thus be effected using a portable device or computer, or even through a wireless network of the structure on which the lock system is installed. The modes may be toggled or changed manually, or may be changed automatically based upon factors such as, for example, time of day, day of week, etc. In some instances it may be desirable to allow the use of a mechanical key (only) to operate the lock system, such as based upon time of day, but at other times to require a higher level of security. In some locations, it may be desirable or necessary to allow access through the use of electronic credentials only during certain times, particularly since the electronic credentials may be transmitted to an authorized recipient electronically. In other circumstances where the highest degree of security is required, the combination of mechanical and electronic credentials may be required, an option that may also provide additional options for audit of access and control
Significantly, a person seeking to subvert the lock system would not know the mode of the system that is active and in effect, and thus could spend a great deal of time attempting to mechanically open the lock using covert means, only to find that being able to turn the lock plug does not result in retraction of the bolt. In any of the modes in which the lock is configured to prevent the plug from turning, no mechanical feedback can be obtained during the picking or impressioning attempts.
In greater detail, the lock system 100 may utilize various elements of conventional locks. As illustratively shown in
As illustratively shown in
A plug-blocking mechanism may be provided to block rotation of the plug 2 with respect to the shell 1 by acting on the tailpiece 3 of the plug (see
As further illustratively shown in
As illustratively shown in
As is illustratively shown in
As illustratively shown in
As illustratively illustrated in
As also shown in
Looking to
The characteristic sound signatures may be stored in the lock system, such as on a sound processor 59 which also has the ability to compare the signatures of sounds detected by the sound detector 56 and transmitted to the processor 59 (e.g., through connectors 57, 58, cable 60 and connectors 60, 61). In operation, a sound detected by the sound detector 56 may be compared to the stored sounds by the sound processor 59 to determine the possibility that the detected sound corresponds to one of the stored compromise signatures and that an attempt is being made to compromise the lock using one of the known (or even unknown) techniques. Such comparison may also include distinguishing the detected sound from the sound signature of a legitimate locking opening activity.
When a sound signature is detected that corresponds to, or is determined likely to correspond to, an action to compromise the lock, the lock system may be programed or otherwise configured to prevent operation of the lock and may be further configured to block the operation of lock elements that are necessary to open the lock (e.g., retract the bolt). Any suitable technique for disabling the lock elements, or blocking of operative movement of the lock elements, may be employed, and may include the various techniques disclosed in this disclosure. For example, the blocking element 15 may be moved to the blocking position to prevent lock actuation and bolt movement. Blocking the plug from turning (e.g., without relying upon the positions of the pin tumblers to block plug rotation) effectively blocks those methods of compromise that rely upon pin tumblers manipulation, such as bumping, picking, or using other tools used to manipulate the pins. This condition in which the lock cannot be operated using the physical key may be cancelled in various suitable manners, including the presentation of an authorized electronic credential to the lock system, which upon recognition removes the inoperable status of the lock.
It should be appreciated that in the foregoing description and appended claims, that the terms “substantially” and “approximately,” when used to modify another term, mean “for the most part” or “being largely but not wholly or completely that which is specified” by the modified term.
It should also be appreciated from the foregoing description that, except when mutually exclusive, the features of the various embodiments described herein may be combined with features of other embodiments as desired while remaining within the intended scope of the disclosure.
With respect to the above description then, it is to be realized that the optimum dimensional relationships for the parts of the disclosed embodiments and implementations, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art in light of the foregoing disclosure, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present disclosure.
Therefore, the foregoing is considered as illustrative only of the principles of the disclosure. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the disclosed subject matter to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to that fall within the scope of the claims.
This application claims the benefit of U.S. Provisional patent application No. 62/078,108, filed Nov. 11, 2014; and U.S. Provisional patent application No. 62/100,211, filed Jan. 6, 2015; each of which is hereby incorporated by reference in its entirety,
Number | Name | Date | Kind |
---|---|---|---|
4616491 | Genest | Oct 1986 | A |
4633687 | Fane | Jan 1987 | A |
4633688 | Beudat | Jan 1987 | A |
4745785 | Uebersax | May 1988 | A |
5979199 | Elpern | Nov 1999 | A |
6094952 | Clark | Aug 2000 | A |
7818984 | Hwang | Oct 2010 | B2 |
9657500 | Min | May 2017 | B2 |
20050050928 | Frolov | Mar 2005 | A1 |
20050144994 | Lies | Jul 2005 | A1 |
20050172685 | Keightly | Aug 2005 | A1 |
20060117819 | Kilbourne | Jun 2006 | A1 |
20090049878 | Amir | Feb 2009 | A1 |
20100212381 | Huang | Aug 2010 | A1 |
20120055213 | Sorensen | Mar 2012 | A1 |
20130192316 | McKibben | Aug 2013 | A1 |
20130192318 | Yanar | Aug 2013 | A1 |
20140250956 | Chong | Sep 2014 | A1 |
20160376812 | Yanar | Dec 2016 | A1 |
Number | Date | Country |
---|---|---|
0216714 | Feb 2002 | WO |
Number | Date | Country | |
---|---|---|---|
62100213 | Jan 2015 | US | |
62078108 | Nov 2014 | US |