The present invention generally relates to the field of physical security, describing a biometric lock and locator apparatus directed towards securing a sealed personal bag or similar article. General considerations are made towards additional functionalities typical of various ‘smart’ devices, in addition to the more specific construction of the physical lock apparatus.
Padlocks, tumbler locks, shackles, and a variety of both digital and mechanical security devices are regularly used to physically secure valuables against unauthorized access. In particular, locking luggage and handbags are vulnerable—there are rarely equipped with the same kinds of security apparatuses that might be placed in a more permanent installation. This shortcoming is increasingly concerning as personal devices, credit cards, or other similar items may cause far-reaching harm if stolen. However, the conventional digitized security solutions available for doors and luggage are not immediately suitable for use in personal articles, said solutions being primarily directed towards immobile applications. These locks are typically characterized by bulky casings, excessive weight, and locking members that cannot properly engage the openings of said personal articles.
Therefore, it is proposed that a novel form of digitized personal security implement is desirable. The present invention aims to improve the security of anti-theft bags in the market today, using a smart lock system and gives confidence to the user in any day-to-day activity. The bag is easy to use and will provide peace of mind for people who travel or are in crowded spaces by ensuring that nobody may gain access to the personal affects of the user without being authorized by an integrated, user-coded biometric security mechanism integrated directly into the bag.
Additional advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. Additional advantages of the invention may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the detailed description of the invention section. Further benefits and advantages of the embodiments of the invention will become apparent from consideration of the following detailed description given with reference to the accompanying drawings, which specify and show preferred embodiments of the present invention.
All illustrations of the drawings are for the purpose of describing selected versions of the present invention and are not intended to limit the scope of the present invention. The present invention is to be described in detail and is provided in a manner that establishes a thorough understanding of the present invention. There may be aspects of the present invention that may be practiced or utilized without the implementation of some features as they are described. It should be understood that some details have not been described in detail in order to not unnecessarily obscure focus of the invention. References herein to “the preferred embodiment”, “one embodiment”, “some embodiments”, or “alternative embodiments” should be considered to be illustrating aspects of the present invention that may potentially vary in some instances, and should not be considered to be limiting to the scope of the present invention as a whole.
In reference to
As shown in exemplary form in
Accordingly, the capacitive surface 13 refers to any means of capturing a machine-readable metric suitable for establishing the identity of a user through direct contact, such as a fingerprint. The power supply 14 is electrically connected to the controller 15, wherein the controller 15 is configured to moderate the flow of electrical energy to the lock actuator mechanism 12 and the at least one capacitive surface 13. This arrangement defines the most simplistic interpretation of a lock-or-unlock logic, wherein the actuator mechanism 12 remains in a ‘locked’ configuration until provided operating power via the controller 15. In a preferred embodiment, the at least one capacitive surface 13 is positioned on the exterior of the lock body 10 as shown in
In reference to the exemplary embodiment in
In addition to the internal power supply 14 providing operating power to the controller 15 and the actuator mechanism 12, it is proposed that the secured container 16 itself may serve as a discrete power source. More specifically, one embodiment of the present invention further comprises a photovoltaic array 24, wherein the photovoltaic array 24 constitutes a means of collecting ambient sunlight and converting said solar energy into useable energy within the power supply 14. In reference to
It is further proposed that the controller 15 may be configured to recognize additional unique signatures of an authorized user to provide alternative means of accessing the secured container 16. Accordingly, one embodiment of the present invention comprises a microphone 26 configured to detect ambient sound, specifically voices and finer features of spoken words. The microphone 26 is mounted into the lock body 10 and electrically connected to the power supply 14 to provide any necessary operating power to the microphone 26. The microphone 26 is further electronically connected to the lock actuator mechanism 12, wherein the lock actuator mechanism 12 is configured to operably disengage from the engagement member 11 upon receipt of an audio datum 27 via the microphone 26. The audio datum 27 is ideally a password or phrase configured by an authorized user and stored within the controller 15 for comparison to the audio datum 27 as outlined in
Another embodiment of the present invention comprises a location beacon 29 mounted into the lock body 10. The location beacon 29 generally refers to a global positioning system (GPS) radio similar universal position-reporting component suitable for providing a digitized reference to the location of the location beacon 29. The location beacon 29 is electrically connected to the power supply 14 to provide any requisite operating power, wherein the location beacon 29 is expected to periodically update the position of the present invention to the controller 15 and limit power consumption according to available resources. The location beacon 29 is further electronically connected to the lock actuator mechanism 12, wherein the lock actuator mechanism 12 is configured to operably disengage from the engagement member 11 upon receipt of a positional datum 30 via the location beacon 29. In reference to
It is further considered that an embodiment of the present invention may provide at least one camera 32 mounted into the lock body 10. The at least one camera 32 is electrically connected to the power supply 14, including at least one embodiment of the at least one camera 32 that is always-on and operational to capture relevant unlocking attempts or to capture the identities of potential thieves attempting to access the secured container 16. Accordingly, the at least one camera 32 is electronically connected to the lock actuator mechanism 12, wherein the lock actuator mechanism 12 is configured to operably disengage from the engagement member 11 upon receipt of a visual datum 33 via the at least one camera 32 as outlined in
In yet another embodiment of the present invention, the present invention comprises a transceiver array 35 mounted into the lock body 10 as shown in
In the broadest conception of the present invention, the controller 15 is contemplated to define any type or variety of logical operator as might be suitable for the operation of the present invention across the varied embodiments outlined herein. More specifically, the controller 15 may comprise a processor, an internal storage volume, a motor controller 15, or any other type of logical operator of equivalent function as may be suitable for integration to any embodiment of the present invention. The processor is ideally a mobile-class multicore processor suitable for performing any functions typically associated with a smartphone, smartwatch, or other comparable personal electronic device. The volume of internal storage is interlinked to the processor in support of this functionality, defining a volume of writeable digital storage space suitable for short-term data handling or longer-term storage of personal files such as photos, music, personal calendars, notes, or other user-generated data. In one configuration, the controller 15 may define a standalone personal electronic device or user terminal. In at least one conceivable use-case, the controller 15 may be configured to seize after a user fails to authenticate after repeated attempts or if the controller 15 receives a remote lockdown order. In this mode the engagement member 11 will be locked into the lock body 10 until a hard-reset or preset all-clear code is received, regardless of the input of appropriate passcodes of biometrics in the interim.
The secured container 16 may be further improved as a theft-resistant enclosure by layering or laminating multiple separate materials into a single coherent textile to create a durable instance of the container shell 19. In the embodiment shown in
Further, it is proposed that the interstitial layer 40 may be interchanged or reconfigured to protect the contents of the container shell 19, or the user themselves, dependent upon the individual design selections of any individual user. In one instance, the interstitial layer 40 comprises a radio-frequency blocking material to prevent any technically adept thieves from passively scanning any radio-frequency identification (RFID) chips within the secured container 16. RFID chips are now commonly associated with bank cards, personal identification, access keys, and a variety of other sensitive data-storage tokens that a user may wish to shield against passive scanning attacks. It is further noted that the position of the transceiver array 35 within the lock body 10 will not prevent the transceiver array 35 from functioning appropriately, provided that any signal source is not directly obstructed by the secured container 16.
In another embodiment, the interstitial layer 40 is a fire-resistant material. This configuration enables the contents of the container shell 19 to survive total-loss scenarios, such as house fires, in which the container shell 19 may be relied upon as a safe repository for vital documents or cash stores. It is further proposed that the fire-resistant material may be overlaid or superimposed onto the radio-frequency blocking material in at least one instance, wherein a user may benefit from both measures of protection.
In yet another embodiment, the interstitial layer 40 is a ballistic protective material. This embodiment is primarily directed towards defeating potential thieves utilizing brute-force entry methods to compromise the container shell 19, but the inherent benefits to personal protection are also presented as a potential benefit. Further, this embodiment offers enhanced durability of the interstitial layer 40 owing to the immense tensile strength of any ballistic protective material that may be selected by any reasonably skilled individual. As with the above-outlined embodiments, the ballistic protective material may be overlaid or integrated to any other constituent material of the interstitial layer 40, further compounding the functionality of the interstitial layer 40 across multiple conceivable embodiments.
Although the invention has been explained in relation to its preferred embodiment, it is to be understood that many other possible modifications and variations can be made without departing from the spirit and scope of the invention as hereinafter claimed.
The current application claims a priority to the U.S. Provisional Patent application Ser. No. 63/123,978 filed on Dec. 10, 2020.
Number | Date | Country | |
---|---|---|---|
63123978 | Dec 2020 | US |