A portion of the disclosure hereinbelow contains material that is subject to copyright protection. The copyright owner has no objection to the reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever
The present disclosure is directed to a low-profile smart padlock that may be remotely engaged by a consumer using a lock management system that may be accessed via a mobile computing device. The lock management system provides the user with an access code that may be transmitted to the smart padlock using Bluetooth® or other near field communications (NFC). One of the advantages the unique lock profile of the smart padlock described has, is the advantage that it can be positioned to lock a variety of structures that typically have insufficient space needed to accommodate the opening and closing of a conventional padlock.
Padlocks are frequently used to secure everyday items including everything from structures and buildings to containers, equipment, vehicles, lockers, and cables. The development of electromechanical padlocks has allowed people to continue to move away from physical keys which are often lost, and simple combinations which are often forgotten, in favor of programmable electronic keypads and fingerprint readers that allow them to access their locks.
While smart locks and card readers for building access have seen significant strides in the past decade, the advent of smart padlocks has been much slower. Unlike building smart locks which are fully wired, electromechanical padlocks use portable batteries making them subject to more constant maintenance or less reliability. In some instances, smart locks are controlled by software-based management systems which provide remote control over and access to the locking device; however, such management systems provide superior function when associated with wired systems since a remote lock must have sufficient power to receive signals and instructions from the remote management system.
A smart padlock is an electromechanical padlock which is designed to perform the locking and unlocking function after receiving instructions from an authorized device which acts as the key. The authorized device may be a key fob, remote or mobile computing device such as a phone.
U.S. Pat. Nos. 7,948,359 and 9,600,949, assigned to Master Lock Company LLC disclose smart padlocks and associated wireless systems for managing those locks. In one exemplary implementation of the '359 patent, a padlock includes a receiver arranged to receive a remote input signal including at least one authorization code. The lock includes a logic applying program to selectively store at least one access code, respond to a corresponding authorization code received by the receiver, and to energize the locking arrangement to move from the locked state to the unlocked state when the authorization code is received by the receiver. The '949 patent discloses an enhanced security system for a smart lock system that uses encrypted authentication files.
U.S. Pat. No. 10,679,441 assigned to The Sun Lock Company Ltd discloses a wireless communication system that uses a user device to receive an electronic signal capable of locking and unlocking an electronic locking device.
Published U.S. Patent Application No. 2021/0029489, assigned to Master Lock Company LLC discloses a cloud-based system for remotely managing a plurality of smart locks including delivering access credentials based upon the geolocation of the lock and at least one personal device of the user.
Power supply issues for electromechanical locks are addressed in a variety of ways. For example, U.S. Pat. Nos. 10,176,656 and 10,310,165, assigned to Noke, Inc. discloses an electronic lock that can become active from a low power state. Likewise, U.S. Pat. No. 8,806,907 discloses a system to prevent compromising a smart lock in the event an internal battery supply is depleted.
U.S. Pat. No. 10,458,153 to Rynan Technologies Pte., Ltd discloses a smart padlock that can be opened via one or more electronic interfaces or via a near field communication network such as Bluetooth®.
As can be seen from the foregoing, smart locking systems including smart padlocks are becoming more commonplace particularly as the use of smart phones has become ubiquitous. While the smart padlock as disclosed and described herein may include features common with the smart padlocks as described in the prior art, the smart padlock and lock management system provide a number of advantages not seen in the art.
It is with respect to these and other considerations that the disclosure made herein is presented.
In an exemplary implementation, provided herein is a low-profile locking device comprising: a lock housing having a channel for receiving an object to be secured; a lock housing cover; a locking structure contained between the lock housing and the lock housing cover that can be moved from a position inside the lock housing to a position spanning the channel when the locking device is locked.
In another exemplary implementation, provided herein is a locking system comprising: a low-profile locking device comprising a controller for receiving and executing locking instructions; a lock management system comprising a processor; and a non-transitory memory device for storing computer executable instructions in communication with the management system processor, the processor configured to execute the instructions to: determine, via a processor of an electronic key, that a locking device is proximate to the electronic key; determine, using user-specific data, authenticating the user (in other words, that the electronic key is appropriate to access the locking device by that user); send, responsive to determining that the access to the locking device by the electronic key is appropriate, a signal providing an access code; wherein the electronic key transmits the access code and locking instructions to the locking device via at least one of: Bluetooth® (BLE), near field communications (NFC), radio-frequency identification (RFID), ZIGBEE, WIFI and IOT Protocols (e.g., LoRA, NB-IoT, Thread).
In yet another exemplary implementation, provided herein is a non-transitory computer-readable storage medium storing thereon a set of instruction that when executed by one or more processors cause the one or more processors to perform the steps comprising: determining, via a processor of an electronic key, that a locking device is proximate the electronic key; determining, using user data, that the electronic key is appropriate to access the locking device; sending, responsive to determining that the access to the locking device by the electronic key is appropriate, a message providing an access code; wherein the electronic key transmits the access code and locking instructions to the locking device via Bluetooth® (BLE), near field communications (NFC), radio-frequency (RFID), ZIGBEE, WIFI and/or other IOT Protocols.
In yet another exemplary implementation, provided herein is a system for managing access to a plurality of enclosures; the system comprising: the plurality of enclosures, each enclosure configured to be enclosed using a networked lock; a plurality of the networked locks, each lock specifically associated with a corresponding enclosure, wherein each network lock comprises: a transceiver; a Bluetooth module; an electromagnetic motor; a locking mechanism coupled to the electromagnetic motor, operable to bias at least one ball bearing in a pair of ball toward an opposing ball bearing; and a processor, in communication with the transceiver, the Bluetooth module, and the electromagnetic motor, the processor being in further communication with a non-transitory memory device storing thereon a set of executable instructions, configured, when executed, to cause the processor to receive a pairing command from a backend management server; and using the Bluetooth pair the lock to a user's portable computing device. the backend management server, in communication with each transceiver of the networked locks, the backend management server, further comprises a central processor in communication with a non-transitory memory device storing thereon a set of executable instructions, configured when executed to: receive an inquiry from the user; obtain from the user a user identification; an enclosure location, an enclosure type; and duration of occupation of the enclosure; Upon payment by the user, issue to the user an enrollment code, the enrollment code specifically associated with the networked lock associated with the enclosure type in the location specified by the user; receive from the user the enrollment code; issue the pairing the networked lock associated with the enclosure type in the location specified by the user to pair.
The detailed description is set forth with reference to the accompanying drawings. The use of the same reference numerals may indicate similar or identical items. Various exemplary implementations may utilize elements and/or components other than those illustrated in the drawings, and some elements and/or components may not be present in various exemplary implementations. Elements and/or components in the Figures are not necessarily drawn to scale. Throughout this disclosure, depending on the context, singular and plural terminology may be used interchangeably.
The following discussion is directed to various exemplary implementations of the invention. Although one or more of these exemplary implementations may be preferred, the exemplary implementations disclosed should not be interpreted, or otherwise used, as limiting the scope of the disclosure, including the claims. It is to be fully recognized that the different teachings of the exemplary implementations discussed below may be employed separately or in any suitable combination to produce desired results. Finally, one skilled in the art will understand that the following description has broad application, and the discussion of any exemplary implementation is meant only to be exemplary of that exemplary implementation, and not intended to suggest that the scope of the disclosure, including the claims, is limited to that exemplary implementation.
Certain terms are used throughout the following description and claims to refer to particular features or components. As one skilled in the art will appreciate, different persons may refer to the same feature or component by different names. This document does not intend to distinguish between components or features that differ in name but not structure or function.
As used in the following discussion and in the claims, the terms “including” “is”, “comprising”, “containing”, etc. are used in an open-ended fashion, and thus, should be interpreted to mean “including, but not limited to.” If closed language is included, “consisting,” and “consisting essentially of,” it should be given its art recognized meaning.
In one exemplary exemplary implementation, the locking device of the present disclosure is a low-profile smart padlock that may be opened by one or more electronic keys.
In another exemplary implementation, the locking device includes a channel in the lock body that accommodates the eyelet 170, cable or other feature to which the lock will be secured.
As used herein “low-profile” means that the lock as described doesn't include a shackle above the lock body. Low-profile makes no reference to and provides no limitation on the specific height or width of the locking device. The device may be any desired height and width depending upon the particular use for the locking device.
In another exemplary implementation, the locking device of the present disclosure is a smart locking device that may be controlled via a lock management system.
Each of the illustrated exemplary implementations includes smart features allowing for communication between the locking device and one or more other mobile computing devices. However, the novel “low-profile” lock profile as described may be associated with other physical, i.e., non-programmable, lock bodies that use keys, codes or other mechanical opening mechanisms, as appropriate. While described with respect to use as a fail-safe, one exemplary implementation of the low-profile locking device 10 can be seen in
In yet another exemplary implementation, the locking device of the present disclosure is a smart padlock having prolonged battery life. The locking device of this exemplary implementation may remain predominately in an unpowered configuration being awakened on an as-needed basis by the user. In certain exemplary implementations, the padlock battery can be rechargeable or non-rechargeable.
While the exemplary implementations described will be principally padlocks, any and all lock features associated with the padlock exemplary implementations may be used in locking devices that are permanently mounted to the object they will secure.
These and other advantages of the present disclosure are provided in greater detail herein.
The disclosure will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary exemplary implementations of the disclosure are shown, are not intended to be limiting.
In an exemplary implementation, locking device 10 includes a “wake-up” button 132 (shown in
As will be readily apparent to the skilled artisan, the object through which locking device 10 is secured can be any object that defines an aperture that can accommodate the locking bolt 125. Further, as will be understood based upon the description herein, the size of the channel 117 in locking device 10 will depend upon the objects to be secured. While the channel 117 shown in e.g.,
In this exemplary implementation, locking case cover 115 does not define channel 117 but would fit over locking case 110. Accordingly, locking device 10 is placed over a eyelet 170 or other object to be secured from back or top of locking device 10 and engaged using electronic key. While locking device 10 remains on object, neither the user nor any third party would have access to locking mechanism.
According to one exemplary implementation, the combined locking device shown
According to another exemplary implementation, the locking device may be placed on an object to be secured, e.g., a latch, eyelet 170 or bracket. The mechanical lock 195 is then secured using a key 210. In an exemplary implementation, mechanical key 210 is integrated with a smart key fob which can provide a single instrument to control locking device 10 of locking system 198. As will be understood by the skilled artisan, an integrated mechanical/electromechanical key may provide less security than a mechanical key that is separate from a smart key fob, or mobile computing device, which can together provide two-layer authentication of the user.
To open the lock, electronic key 210 is operable to instruct smart lock 198 to release eyelet 170 aperture 1700 for a predetermined period of time, for example, 30 seconds. During that period, the mechanical lock can be disengaged using, for example, a key or a thumb turn. Smart locking system 198 will remain in the open configuration until mechanical lock 195 is reengaged. Once the mechanical lock is reengaged, the smart locking system 198 can automatically transition to the locked configuration or be controlled by the electronic key, as desired.
As used herein “locking structure” refers to the mechanism that is used to close the channel 117 in the lock housing. The locking structure can include the locking bolt (conical or otherwise), the locking bar, the ball bearing assembly, the rotatable pin, as described, or any other art recognized arrangement that can close the channel and secure locking device 10. When an exemplary implementation is described with reference to one of these locking structures it is understood that any of the other locking structures may be used in that exemplary implementation.
Turning now to
Locking device 10 described herein has been described in reference to exemplary implementations that are directly connected to a power supply where, for example, the power is supplied via (rechargeable or non-rechargeable) battery. Features of locking device 10 have been described primarily as they relate to the different power supply; however, all features of locking device 10 are interchangeable. For example, locking devices that are mounted on locker assemblies or locker doors, may be directly wired or powered via battery and either can include an initiation or wake-up switch to power locking device 10. In certain exemplary implementations where the locking device is mounted internal to the locker or internal to an object to be secured, the initiation or wake-up button would be mounted to allow access from outside the object (see e.g.,
Locking device 10 as described includes a controller 155 capable of communicating with an electronic key to receive and carryout locking (and unlocking) instructions. As used herein “locking instructions” refers to any actions that may be undertaken by locking device 10 in response to one or more signals from the electronic key. As used herein “electronic key” refers to any device capable of providing locking instructions to locking device 10. The controller 155 as described can include any art recognized features useful in controlling locks, for example, the controller can include a clock, a calendar, and the like. The controller 155 is capable of storing and carrying out information and commands about locking device 10 operation. The controller has the capacity to receive and decrypt messages from the electronic key in Bluetooth®, near field communication methods or using other IOt protocols. The communications module of the controller is capable of communicating with HUBs, electronic keys, and other electromechanical locking devices on the same system, for example. The controller 155 includes controls to remove, update and allow users authorizations as appropriate.
According to one exemplary implementation, rather than requiring a code to control access to the lock, the controller can be programmed to accept other art recognized forms of identification as appropriate including but not limited to fingerprints, electronic codes, pattern locks, and the like. For example, a control panel as illustrated in
The electronic key can take the form of a mobile computing device, a key fob, a remote control, or any other device operable to communicate with locking device 10. In some exemplary implementations, electronic keys may also take the form of unique biometric parameters such as fingerprints, retina pattern, voice recognition and the like. Smartphones, which are in near constant use for many people, are in an exemplary implementation, the electronic key most widely used. However, other mobile device that can be an electronic key include tablets, phablets, smart watches, personal Global Positioning System (GPS), fitness bands, or any other mobile computing devices. For exemplary implementations where locking device 10 and system as described are used in schools, dedicated control devices may be required if school policies forbid students to carry mobile computing devices during the school day. The dedicated control device can take the form of a remote control, key fob, a key card or other easily carried communication device.
For example, as illustrated in
Locking device 310i as described herein may be managed via a lock management system 3101. Lock management system's backend management server 3101 includes the necessary hardware and software to engage users and accept payment for lock service packages. As described in detail below (see e.g.,
Hardware components associated with the lock management system include processors, displays, sensors and input devices. The lock management system may also be carried out via mobile computing devices such as smartphones and tablet computers which contain these elements.
Software for use in the lock management system can include any computer-readable medium (also referred to as a processor-readable medium) including any non-transitory (e.g., tangible) medium that participates in providing data (e.g., instructions) that may be read by a computer (e.g., by a processor of a computer). Such a medium may take many forms, including, but not limited to, non-volatile media and volatile media. Computing devices may include computer-executable instructions, where the instructions may be executable by one or more computing devices such as those listed above and stored on a computer-readable medium.
Any now-existing or after-developed security protocols for user authentication including confirming user identity or electronic communication origination can be used with the lock management system as described herein. Appropriate security protocols can include, by way of example only, encrypted messaging. Any art recognized encryption protocols can be used including by way of example, 3DES, AES, RC5 and the like.
The lock management system will generally include a processor and a memory device for storing computer executable instructions, the processor being configured to execute the instructions to determine, via a processor of an electronic key, that a locking device is proximate the electronic key, determine, using user data that the electronic key is appropriate to access the locking device, send, responsive to determining that the access to the locking device by the electronic key is appropriate, a message providing an access code. The electronic key then being capable of transmitting the access code and/or locking instructions to locking device 10 via Bluetooth® (BLE), near field communications (NFC), radio-frequency (RFID), ZIGBEE, WIFI and/or other IOT Protocols.
In one exemplary implementation, the lock management system may communicate with locking device 10 via wired communication. For example, in the exemplary implementation shown in
Turning now to
Additionally, or alternatively, lock management system's backend management server 3101 can issue EC operable to provide access for a single opening of locker e.g. c, in locker bank I. For example, for a post-office packaging delivery, or any business wishing to have a client arrive at a specific location (with a locker bank) and collect an item in a secured manner. In that exemplary implementation, a third party reserves locker bank with lock management system's backend management server 3101. The third party will be able to operate all lockers and put an item within a given ith lock 310i. Using the application in user 700 communication device, the third party can send client EC, incorporating the particular locker bank and the specific ith lock 310i. Upon arrival of the client to the specific ith lock 310i, and activating ith lock 310i, using “wake-up” button 3105, user 700 will send the EC to lock management system's backend management server 3101, which will allow pairing of communication device 3100 with the specific ith lock 310i, allowing for the specific ith lock 310i to open. Upon detection of closing of the specific ith lock 310i, or upon the passage of predetermined period (e.g., between 30 seconds and 5 minutes, communication device 3100 will automatically be decoupled from the specific ith lock 310i.
User 700 can also request an electronic key in the form of a key fob, or remote control or they can request a lock with biometric identification capability, such as a fingerprint reader. Once user 700 lock 310i and electronic key 3100 are enrolled, user 700 would, if available on the lock, activate wake-up button 3105 to power lock 310i. User 700 would then pair lock 310i with electronic key (interchangeable with communication device) 3100, be it an app on a mobile computing device or a key fob or remote. Electronic key 3100 would request credentials authentication lock management system's backend management server 3101 and if the user is authenticated (e.g., via database 3102, or through network authentication), would transmit a temporary code to electronic key 3100 allowing the key to send locking instructions to locking device 310i. As seen in
According to one exemplary implementation, processor 155, can include an automatic enrollment code generator. Accordingly and in an exemplary implementation, the enrollment code can include the user ID, the lock device ID, a period of use and an authorization code. When the enrollment code is transmitted to user 700, the associate App can be downloaded and his enrollment code introduced. User 700 can then bring the lock on-line, for example, by pressing wake-up button 3105, and then pair lock 310i with the app and send the enrollment code (via encrypted message) to locking device 310i. Once locking device 310i receives the enrollment code (EC), locking device 310i can allow user 700 access during the authorized period of use.
In one exemplary implementation, locking device 310i may further include a system for tracking the location of locking device 310i. The tracking system may be any art recognized location system. The tracking system may include a Global Positioning System (GPS) receiver configured or programmed to triangulate the position of the locking device. Since locking device 10 can be used to secure mobile items, for example, bicycles, motorcycles, scooters, packages, postal or currency bags, jewelry cases and the like, being able to track the lock using an associated mobile computing device provides an additional layer of security to the locking devices as described. Other location mechanisms could also be employed, for example through the use of RFIF locators, Bluetooth beacons and the like.
Turning now to
As will be readily understood by the skilled artisan, locking device 310i as described may be used to lock and secure any art recognized object. The locking system may be used by schools for securing locker systems, the system may be used by gym to secure their locker systems, the locking system may be used by shippers to secure pouches, luggage, and other valuables. The locking system may be used to restrain portable devices and equipment that can be accessed by a new user, for example, scooters, or construction sites. The locking system may be used.
According to another exemplary implementation, the smart locking device 10 as described can be used to secure other locking devices, for example, mechanical locks or key management systems. Locking device 10 can also be used as anti-vandal protection for locking cylinders.
In the above disclosure, reference has been made to the accompanying drawings, which form a part hereof, which illustrate specific implementations in which the present disclosure may be practiced. It is understood that other implementations may be utilized, and structural changes may be made without departing from the scope of the present disclosure. References in the specification to “one exemplary implementation,” “an exemplary implementation,” “an example exemplary implementation,” etc., indicate that the exemplary implementation described may include a particular feature, structure, or characteristic, but every exemplary implementation may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary implementation. Further, when a feature, structure, or characteristic is described in connection with an exemplary implementation, one skilled in the art will recognize such feature, structure, or characteristic in connection with other exemplary implementations whether or not explicitly described.
It should also be understood that the word “example” as used herein is intended to be non-exclusionary and non-limiting in nature. More particularly, the word “exemplary” as used herein indicates one among several examples, and it should be understood that no undue emphasis or preference is being directed to the particular example being described.
In the context of the disclosure, the term “operable” means the system and/or the device and/or the program, or a certain element or step is fully functional, sized, adapted and calibrated, comprises elements for, and meets applicable operability requirements to perform a recited function when activated, coupled, implemented, actuated, effected, realized, or when an executable program is executed by at least one processor associated with the system and/or the device. In relation to systems and circuits, the term “operable” means the system and/or the circuit is fully functional and calibrated, comprises logic for, having the hardware and firmware necessary, as well as the circuitry for, and meets applicable operability requirements to perform a recited function when executed by at least one processor.
Likewise, “operably coupled” refers to the joining of two members directly or indirectly to one another. Such joining may be stationary in nature or moveable in nature. Such joining may be achieved with the two members (or the two members and any additional intermediate) being integrally formed as a single unitary body with one another or with the two members or the two members and any additional members being attached to one another. Such joining may be permanent in nature or may be removable or releasable in nature.
With regard to the processes, systems, methods, heuristics, etc. described herein, it should be understood that, although the steps of such processes, etc. have been described as occurring according to a certain ordered sequence, such processes could be practiced with the described steps performed in an order other than the order described herein. It further should be understood that certain steps could be performed simultaneously, that other steps could be added, or that certain steps described herein could be omitted. In other words, the descriptions of processes herein are provided for the purpose of illustrating various exemplary implementations and should in no way be construed to limit the claims.
Accordingly, it is to be understood that the above description is intended to be illustrative and not restrictive. Many exemplary implementations and applications other than the examples provided would be apparent upon reading the above description. The scope should be determined, not with reference to the above description, but should instead be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. It is anticipated and intended that future developments will occur in the technologies discussed herein, and that the disclosed systems and methods will be incorporated into such future exemplary implementations. In sum, it should be understood that the application is capable of modification and variation.
Unless specifically stated otherwise, as apparent from the foregoing discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing,” “loading,” “in communication,” “transferring”, “receiving”, “sending”, “detecting,” “calculating,” “determining”, “analyzing,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as a transistor architecture into other data similarly represented as physical and structural layers.
As may also be used herein, the terms “module”, “processing circuit”, and/or “processing unit” may be a single processing device or a plurality of processing devices. Such a processing device may be a microprocessor, micro-controller, digital signal processor, microcomputer, central processing unit, field programmable gate array, programmable logic device, state machine, logic circuitry, analog circuitry, digital circuitry, and/or any device that manipulates signals (analog and/or digital) based on hard coding of the circuitry and/or operational instructions (in other words, firmware). The processor, processing circuit, and/or processing unit may have an associated memory and/or an integrated memory element, which may be a single memory device, a plurality of memory devices, and/or embedded circuitry of the processing module, module, processing circuit, and/or processing unit. Such a memory device may be a read-only memory, random access memory, transient memory, non-transient memory, static memory, dynamic memory, flash memory, cache memory, and/or any device that stores digital information.
The term “system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more functions. Also, the term “system” refers to a logical assembly arrangement of multiple devices, and is not restricted to an arrangement wherein all of the component devices are in the same housing, or physical location. Also, the term “server”, in the context of the disclosure, refers to a computer system, including processing hardware and process space(s), and an associated storage system and database application (e.g., OODBMS or RDBMS) as is well known in the art. It should also be understood that “server system” and “server” are often used interchangeably herein. Similarly, the database object described herein (3102) can be implemented as single databases, a distributed database, a collection of distributed databases, a database with redundant online or offline backups or other redundancies, etc., and might include a distributed database or storage network and associated processing intelligence such as, for example, machine learning algorithms
In an exemplary implementation non-transitory memory device, interchangeable with the terms “non-transitory storage medium” and/or “non-transitory computer-readable storage medium” refers to, any media that can contain, store, or maintain programs, information, and data. Non-transitory storage medium and non-transitory computer-readable storage medium may include any one of many physical media such as, for example, electronic, magnetic, optical, electromagnetic, or semiconductor media. More specific examples of suitable non-transitory storage medium and non-transitory computer-readable storage medium include, but are not limited to, a magnetic computer diskette such as floppy diskettes or hard drives, magnetic tape, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), a flash drive, a compact disc (CD), or a digital video disk (DVD). The memory device may comprise other types of memory as well, or combinations thereof. In addition, the memory medium may be located in a first computer in which the programs are executed, and/or may be located in a second different computer which connects to the first computer over a network, such as the Internet. In the latter instance, the second computer may further provide program instructions to the first computer for execution. The term “memory device” can also include two or more memory devices which may reside in different locations, e.g., in different computers that are connected over a network.
All terms used in the claims are intended to be given their ordinary meanings as understood by those knowledgeable in the technologies described herein unless an explicit indication to the contrary is made herein. In particular, use of the singular articles such as “a,” “the,” “said,” etc. should be read to recite one or more of the indicated elements unless a claim recites an explicit limitation to the contrary. Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain exemplary implementations could include, while other exemplary implementations may not include, certain features, elements, and/or steps. Thus, such conditional language is not generally intended to imply that features, elements, and/or steps are in any way required for one or more exemplary implementations.
Accordingly and in an exemplary implementation, provided herein is a low-profile locking device comprising: a lock housing having a channel for receiving an object to be secured; a lock housing cover; a locking structure contained between the lock housing and the lock housing cover that can be moved from a position inside the lock housing to a position spanning the channel when the locking device is locked, wherein (i) the locking structure is chosen from a locking bolt, a locking bar, ball bearings and a pivot pin, further comprising (ii) a gear motor and pinion for raising and lowering a rack for maintaining the locking structure in place, (iii) a controller for receiving a signal and engaging a motor gear in response to the signal to open or close the lock, (iv) a lock pin housing containing a biasing element actuated locking bolt as the locking structure and a locking pin for engaging the locking rack, wherein (v) the locking device is a mobile (in other words, portable) lock, wherein (vi) the controller is programmed to relock the locking device following at least one of: a specified period of inactivity, a specified period of activity, and a specified number of openings, the lock further comprising (vii) a “wake-up”button to reactivate the locking device from a powered-off mode, the button further operable to provide indication (e.g., using LED light) of the lock status (open, closed, pairing search, ready etc.), and wherein (viii) the locking device powers off following at least one of: a specified period of inactivity, a specified period of activity, and a specified number of openings, the locking device further comprising (ix) a redundant (unused) locking mechanism, wherein (x) the redundant locking mechanism is another electromechanical locking device, (xi) or a mechanical locking device, (xii) the mechanical locking device is a multi-point lock, (xii) further comprising a cam and associated key for moving the position of the rack and unlocking the locking device, wherein (xxii) the lock is a smart lock, wherein (xxiii) the controller is programmed to receive an encrypted authorization code that is make up of a lock ID, a lock position, a user ID and a use period, wherein (xxiv) the controller received locking signals from an electronic key chosen from a remote control via blue tooth, wherein (xxv) the locking structure is moved via mechanical motion associated with a key, further comprising (xxvi) a reactivation mechanism chosen from one or more of a motion sensor, a sound sensor or a touch sensor, wherein (xxvii) the lock housing cover comprises a channel that corresponds to the channel in the lock housing (xxviii) the locking structure remains in place across the channel after being opened by electronic key so that the lock also remains in place, wherein (xxix) the controller further comprises a clock and/or a calendar, the capacity to decipher Encrypted codes, the capacity to store information about operations and commands, the capacity to communicate by Bluetooth, near field communication methods or IoT (Internet of things) protocols, (xxx) the controller can communicate with HUBs, electronic keys chosen from phone, remote controller, special electronic key fob, (xxxi) the controller on one locking device is adapted to communicate with the controller on another locking device, and wherein the controller is programmed to allow or remove user authorizations according to the received commands.
In another exemplary implementation, provided herein is a locking system comprising: a low-profile locking device comprising a controller for receiving and executing locking instructions; a lock management system comprising a processor; and a memory for storing computer executable instructions, the processor configured to execute the instructions to: determine, via a processor of an electronic key, that a locking device is proximate electronic key (interchangeable with a communication device, or portable computing device, or a smart phone); determine, using user data, that electronic key is appropriate to access the locking device; send, responsive to determining that the access to the locking device by electronic key is appropriate, a signal providing an access code; wherein electronic key transmits the access code and locking instructions to the locking device via Bluetooth® (BLE), near field communications (NFC), radio-frequency (RFID), ZIGBEE, WIFI and/or other IOT Protocols, wherein (xiii) upon first interaction (e.g., through a dedicated web site) with lock management system's backend management server, the user will identify: provide a client ID (in other words, user name and password and other identifying parameters); the location of the locker bank I, for example, a floor in a building, entrance location, etc.; the specific locker within the locker bank (e.g., A, B, C, D); and the duration of the occupation of the specific locker, whereby following payment using the same session, the lock management system's backend management server issues the user an enrollment code (EC, could be e.g., an alphanumeric code, a numeric code, a letter code), operable to be valid for a predetermined period, wherein (xiv) the processor is configured to determine electronic key is proximate the locking device when electronic key request a change in the lock status of the locking device, (xi) generate one time permission codes, wherein (xv) the low-profile locking device comprises a lock housing having a channel for receiving an object to be secured; a lock housing cover having a channel that corresponds to the channel in the lock housing; a locking structure contained between the lock housing and the lock housing cover that can be moved from a position inside the lock housing to a position spanning the channel when the locking device is locked, and wherein the system further comprising (xvi) a series of locker assemblies, each locker assembly having a low-profile locking device coupled to the locker assembly.
In yet another exemplary implementation, provided herein is a non-transitory computer-readable storage medium comprising instructions that when executed by one or more processors cause the processors to perform acts comprising: determining, via a processor of an electronic key, that a locking device is proximate electronic key 3100; determining, using user data, that electronic key 3100 is appropriate to access the locking device; sending, responsive to determining that the access to the locking device by electronic key 3100 is appropriate, a message providing an access code; wherein electronic key 3100 transmits the access code and locking instructions to the locking device via Bluetooth® (BLE), near field communications (NFC), radio-frequency (RFID), ZIGBEE, WIFI and/or other IOT Protocols.
In an exemplary implementation, provided herein is a locker system comprising: a locker to be secured; and a low-profile locking device comprising a lock housing having a channel for receiving an object to be secured; a lock housing cover having a channel that corresponds to the channel in the lock housing; a locking structure contained between the lock housing and the lock housing cover that can be moved from a position inside the lock housing to a position spanning the channel when the locking device is locked, as well as (xvii) a lock management system comprising a processor; and a memory for storing computer executable instructions, the processor configured to execute the instructions to: determine, via a processor of an electronic key, that a locking device is proximate electronic key; determine, using user data, that electronic key is appropriate to access the locking device; send, responsive to determining that the access to the locking device by electronic key is appropriate, a signal providing an access code; wherein electronic key transmits the access code and locking instructions to the locking device via Bluetooth® (BLE), near field communications (NFC), radio-frequency (RFID), ZIGBEE, WIFI and/or other IOT Protocols, wherein (xviii) the processor is configured to determine electronic key is proximate the locking device when electronic key request a change in the lock status of the locking device, and/or (xix) generate one time permission codes, wherein (xx) low-profile locking device comprises a battery, (xxi) is wired into a power system,
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IL2022/050262 | 3/8/2022 | WO |
Number | Date | Country | |
---|---|---|---|
63157835 | Mar 2021 | US |