Computer equipment, information and services often need protection from unintentional or unauthorized access, change or destruction. Many computer systems include software authorization components and security components. Such components can provide protection against a hacker or other unauthorized individual who is trying to access information on the computer devices.
Hacking is typically not the only concern. Data and computer equipment often need to be protected from tampering, physical access, or theft, such as where a thief steals a computer or components of a computer to later access data on the computer or to sell the hardware components. Hardware-based security can provide a solution to this issue, such as by having secure server racks, data centers, or individual case locks. A physical lock, such as a pin tumbler lock, can be an inexpensive deterrent to theft. Pin tumbler locks are cheap to manufacture and require only a key for access. However, pin tumbler locks can be fairly easy to defeat via picking and/or bumping.
Various embodiments in accordance with the present disclosure will be described with reference to the drawings, in which:
In the following description, various embodiments will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. However, it will also be apparent to one skilled in the art that the embodiments may be practiced without the specific details. Furthermore, well-known features may be omitted or simplified in order not to obscure the embodiment being described.
In accordance with embodiments, physical locks are provided that include features for detecting tampering. The locks may be, for example, pin tumbler locks. Tampering may be detected in a number of different ways. As an example, abnormal movement of one or more of the driver pins in a pin tumbler lock can be an indication of tampering. In addition, one or more sensors can be included at the end of a keyway that detect picking or bumping beyond the length of normal key insertion. As other ways to detect tampering, excessive torque on a plug or vibration of the plug or lock can also be detected.
Sensors for detecting key tampering can be mechanical, such as an actuator, or can be electrical, such as optical sensors, pressure sensors, conductivity sensors, capacitive sensors, magnetic sensors, proximity sensors, rotation sensors, acceleration sensors, electromechanical switches, or movement detectors. If mechanical, a lever or other linkage can be connected to the driver pins or a keyway sensor, and an actuation of the lever or other device can cause a “mouse trap” release of a spring to lock out the pin tumbler lock and/or a door protected by the lock. Alternatively, the lever or other linkage can trigger a switch to perform another function, such as setting off an alarm or causing a solenoid to fire to lock the pin tumbler lock and/or the door. As an example, upon sensing tampering of a pin tumbler lock, a plunger pin may be moved to block out rotation of a plug for the pin tumbler lock. Alternatively, a lock that is separate from the pin tumbler lock, such as a deadbolt lock, can be actuated. In some embodiments, any key in the lock may be retained.
A signal received from an electronic sensor can be used, for example by a management component, in a number of different ways. As an example, in a master lock configuration, an audit of the particular key being used can be maintained and/or acted upon. A signal can be sent for door lockout and/or pin tumbler lockout. Software behind the lock can also be handled. For example, when tampering is detected, the management component can instruct automated destruction of software that is physically protected by the lock. As another option, an alarm can be sent to security and/or an administrator. In addition, as a result of receiving information about a tampering event, software or other material can be destroyed, privileges can be revoked, software can be encrypted, or software protected by the lock can otherwise be made inaccessible. Examples are described in U.S. application Ser. No. 13/765,020, filed Feb. 12, 2013, entitled “Data Security with a Security Module”, incorporated herein by reference.
Locks described herein have particular application to protection of computer equipment and computer devices. The computer devices can be, for example, in a datacenter or other facility used to house computer systems and components. A datacenter can include rooms, which in turn include racks. The racks can include individual components, such as servers and/or network components. Any or all of these can be protected by the locks of the present system.
For example, the entire datacenter can include such a lock at a front door. Similar locks can be used at a room level. A rack may be any frame or enclosure capable of mounting one or more servers or other computing devices. In some applications, the rack can be a four-post server rack, a server cabinet, an open-frame two-post rack, a portable rack, a LAN rack, combinations of the same, or the like. Datacenter components that are maintained in a rack can be protected using one of the locks described herein.
Referring now to the drawings, in which like reference numerals represent like parts throughout the several views,
At 102, tampering of a lock is sensed. This sensing can occur via one or more mechanical or electronic sensors, with some examples described below. At 104, the sensing event is handled or reported. In embodiments, if a mechanical sensor and lockout mechanism is used, handling can involve automated mechanical lockout of a door or the lock as a result of the tampering. If electronic sensing is utilized, then information can be provided to a management component, which can be hardware, software, or a combination of the two, and the management component can handle accordingly, for example by locking out the lock or reporting the tampering incident.
Embodiments herein are directed to tamper detection and/or remediation for any type of lock, but specific embodiments are directed to pin tumbler locks. Although pin tumbler locks are known, details are provided here for the benefit of the reader. To this end, a prior art pin tumbler lock 200 is shown in
The pin tumbler lock 200 includes a cylindrical outer casing 202. The outer casing 202 has a cylindrical hole in which a plug 204 is housed. To open the pin tumbler lock 200, the plug 204 must rotate.
The plug 204 has a straight slot, called a “keyway” 206, extending through its center. During use, the keyway 206 receives a key K (
Above each key pin 210 is a corresponding driver pin 212. The driver pins 212 are biased downward by springs 214. The outer casing 202 includes several vertical shafts 216 for receiving the driver pins 212 and the springs 214. Simpler locks typically have only one driver pin 212 for each key pin 210, but locks requiring multi-key entry, such as a group of locks having a master key, may have one or more extra driver pins known as “spacer pins.” This arrangement is not shown in
The point where the plug 204 and the cylindrical outer casing 202 meet is called a shear point 218. As shown in
When a key K is properly cut and is fully inserted into the keyway 206, the key pins 210 rise against the bias of the springs 214. The length of the key pins 210 is such that the proper key causes the tops of the key pins to align at the shear point 218, as shown in
In the case of a lock that permits use of a master key, each outer casing 202 and plug 204 is configured such that each key that is not a master key causes the key pins 201 to rise to align at the shear point. The master key, on the other hand, causes the spacer pins (not shown) to align at the shear point 218. The master key may alternatively align some of the spacer pins and some of the key pins 210 at the shear point 218. In any event, the master key is capable of opening multiple different locks 200, whereas some keys are designed to open only a single lock or an identically-keyed set of locks.
There are two common methods of defeating a pin tumbler lock, such as the pin tumbler lock 200: picking and bumping. Picking involves inserting a pick and moving the key pins 210 upward and downward until the picker feels that the key pins 210 are aligned with the shear point 218. This often involves moving one pin at a time while tension is applied to keep the pins in position. In the course of picking, each driver pin 212 is raised further than its final height to set the pin. This action typically does not occur when a proper key is inserted. Instead, when the proper key is inserted, the driver pins 212 move no higher than pushed by the highest point on the key.
When a lock is bumped, a key filed to a certain pattern is inserted forcibly, causing all pins to fly up. Thus, bumping also results in the driver pins 212 moving higher than by a proper key.
In normal operation, with an authentic key K inserted into the keyway 206, each driver pin 212 is raised to a particular height determined by the key contour. In accordance with embodiments, to detect bumping or picking, one or more sensors are placed in the pin shaft(s) 216, on the driver pin(s) 212 or otherwise where the sensor(s) can sense driver pin 212 movements. If one or more of the driver pins 212 are raised further than expected by an authentic key, the sensor(s) can generate sensor event information and/or automatically cause handling or reporting of the sensed tampering activity.
As examples of handling of a sensor event, an alarm can be triggered or a mechanism can be triggered for inactivating the lock or a door that the lock protects. The inactivation mechanism can be, for example, an additional deadbolt or other lock for the door or other structure for which the lock 200 provides security. In addition, in accordance with embodiments, the inactivation mechanism can be an additional lockout feature on the pin tumbler lock for preventing rotation of the plug 204 relative to the outer casing 202.
For example, as shown in
Thus, the lock 500 includes parts that are similar to the lock 200, and similar numbers are used for those parts, with “2” used in the hundreds place for the parts of the lock 200, and “5” used in the hundreds place for parts of the lock 500.
The sensor 530 is a mechanical sensor, which actually works as an actuator. By actuator, we mean a device or mechanism that takes action upon being actuated. Primarily, the actuators herein are devices or mechanisms that, upon sensing (typically by being moved), take action, such as flipping a switch or springing a trap or otherwise taking mechanical action.
In the lock 500, the sensor 530 includes a block 532 that is positioned in the path of one of the driver pins 512. Specifically, the block 532 is located at a position that is higher than where the driver pin 512 would travel under normal use (i.e., opening by an authentic key) but low enough to be engaged when the lock 500 is being picked or bumped. Thus, when the driver pin 512 is moved too far upward relative to normal, it engages the block 532. Similar blocks 532 and sensors 530 can be provided for additional driver pins 512.
The block 532 connects to a lever arm 534. Movement of the driver pin 512 upward to an extent beyond what is normal operation causes the block 532 to be engaged, and the lever arm 534 to rotate. A distal end of the lever arm 534 engages a switch 536, which may be, for example, a switch. The switch 536 in turn actuates a solenoid 538, which drives a plunger pin 540 through a shaft 542 and into an opening 544 in the plug 504. The plunger pin 540 straddles the shear point 518 and thus locks the plug 504 from rotation. As an alternative to the solenoid, a linear actuator can be used for lockout.
The sensor 530 shown in
Although shown as using a solenoid 538, other structures can be used for locking movement of the plug 504. For example, a mousetrap type of system can be used in which a spring is positioned behind the plunger pin 540 and the spring is released upon contact by the lever arm 534. In embodiments, however, the plunger pin 540 engages and locks the plug 504 in a position remote from the keyway 506. This feature ensures that a picker or bumper cannot have access to the plunger pin 540 through the keyway 506.
Other mechanical linkages can be provided to connect a driver pin sensor to locking of the plug 502 or some other handler, such as a deadbolt in a door in which the lock 500 is installed. In general, such linkages translate excessive travel of one of the driver pins 512 into a movement that can lockout or otherwise handle the tampering event. A mechanical linkage can, for example, cause locking of a deadbolt that is separate from the lock 500. The mechanical linkage can also engage a switch to set off an alarm, or can otherwise mechanically react to tampering of the lock 500.
In embodiments, a sensor can react to multiple incidents of excessive travel of a driver pin 512, instead of only a single incident. This arrangement can prevent a single occurrence from accidentally locking out the lock. For example,
Utilizing the structure in
As an alternative to mechanical sensing and coupling of a sensor to driver pin movement, electrical sensing of excessive driver pin movement can be used, and the signals generated by the electronic sensors can be acted on according to a plan or routine. As an example, as shown in
The electronic sensors 732 can be optical sensors, pressure sensors, movement sensors, or any other sensor that can provide a signal or information in response to movement of a driver pin 512. In embodiments, the information is provided to a management component 750. The management component 750 can be a computer or any micro-controller that can perform the lockout, inactivation, messaging or other handling features described herein. In embodiments, the management component 750 can be coupled to a lockout mechanism 752, which can be structured to provide lockout of the lock 750 or an alternative lockout for a door that the lock is designed to secure. The management component 750 can also be coupled to an audit component 754, which can maintain and/or report information about the sensed event information received by the management component.
The electronic sensor 730 in
The management component 750 can receive data from a number of sensors, correct errors and reconcile data from one source to that of another, maintain and/or retrieve authorization information about keys and/users, generate instructions on handling of locks, alarms or other features described herein. The management component 750 can reconcile the data received from the disparate sources, and generate instructions for handling the lock or associated components as needed. In some embodiments, the management component 750 can generate an alert to request human interaction with the device, for example in accordance with a playbook. In other embodiments, the management component 750 can generate instructions that are received by the lock or other components to cause the components to react accordingly, e.g., to change state and/or operation.
The management component 750 can be a computing device, such as a microprocessor, configured with various hardware and software modules to implement the processes described herein. In embodiments, the management component 750 can be physically located within a lock, physically connected to the lock, or can be remotely located from a lock. In some embodiments, the management component 750 can be remote from the lock and even the building in which the lock in located. A single management component can also manage a number of locks, and can be connected to those locks or positioned remotely of those locks. In addition, reporting functions of the management component can be processed, presented, or reported on by the management component, or can be sent to a centralized management component for processing or handling.
Beginning at 802, the management component 750 receives driver pin sensed event information. For example, the amount each of the driver pins 712 moves in corresponding shafts 716 can be provided to the management component 750. At 804, the management component accesses driver pin information to determine what action to take with respect to the lock 700 in accordance with the information received at 802. If the driver pin information indicates that the movement is an authorized movement, then 806 branches to 808, where the lock is allowed to be opened or other authorized movement is permitted. If the information received at 804 does not indicate authorization, then 806 branches to step 810, where the lock 700 is locked out, an alarm sounds, or other action is taken. As indicated above, a number of different options are provided for locking out the lock 700. In addition, as opposed to a lockout, an alarm can be sounded or other alert.
In still further embodiments, information can be sent by the management component 750 to software, with instructions for software or other material to be destroyed, privileges to be revoked, software and/or data to be encrypted, and/or software protected by the lock can otherwise be made inaccessible.
At 812, after either allowing access or providing lockout or otherwise handling, the information can be reported or otherwise stored. For example, the management component 750 can maintain information about the number of uses of a particular key, whether a key is a master key that is being used, or other information. In addition, the type of authorization permitted can be altered based upon whether a key is a master key or a different type of key.
As described above, a plunger pin, such as the plunger pin 640, can be used to lockout the plug 604 from rotation. As discussed above, one benefit to the location of the plunger pin 640 is that it cannot be accessed from the keyway 606. In embodiments, such a plunger pin 640 or other lockout mechanism can be utilized with or without sensing mechanisms. As an example, as shown in
In most of the embodiments herein, the plunger pin 940 is normally unlocked. Alternatively, the plunger pin 940 can be normally locked in position, and action may be required to permit release. When an alarm condition is detected, it can be desirable to prevent opening of the lock 900. The plunger pin 940 can be used to lock out the lock 90 in such an alarm situation.
In addition, the plunger pin 940 can be utilized to require multi-factor authentication to open the lock 900. For example, in addition to requiring a proper key to turn the lock 900, the plunger pin 940 can be operated in accordance with another security authorization, such as bio-informatics or an RFID (radio frequency identification) tag positioned within the key and read by a RFID reader in or near the lock 900.
Thus, to open the lock 900, two requirements must be met. First, the plunger pin 940 must be removed from the opening 944. Second, the proper key must be inserted in the keyway 906. Both of these must occur for the plug 904 to be rotatable. As such, multiple security features are provided by the plunger pin 940/management module 950 over a standard pin tumbler lock. In alternate embodiments, the plunger pin 940 (or some other lockout mechanism) can be normally locked, and some action, such as authentication via RFID or some other security clearance, is required to unlock the pin or lock mechanism prior to the pin or lock mechanism releasing to allow key access.
An advantage of the plunger 940 is that it is positioned beyond and is not accessible from the keyway 906. Thus, a potential intruder trying to pick the lock 900 cannot access the plunger 904.
In accordance with embodiments, picking or bumping can also be detected by providing a sensor that is located at a position in the keyway and that is beyond a key end for an authentic key. For example, as shown in
As an alternative to the indexing mechanism 1050, the sensor 1030 can provide an immediate response to engagement by a tool in the distal end 1060 of the keyway 1006. In a similar manner, as shown in
In accordance with additional embodiments, the use of a self-winding or generator mechanism can be used with a cylinder lock, such as the pin tumbler locks described herein. Energy from the mechanism can be used to self-power the electronic and/or mechanical mechanisms, such as the sensors, described herein.
For example, as shown in
Operation of mainsprings is known, but some detail is given here for the benefit of the reader. The mainspring is coiled around an axle called the arbor 1280, with the inner end hooked to the arbor. The outer end is attached to a stationary post, such as the block 1272. The spring is wound by turning the arbor, which in this case is connected to the plug 1204. The wound spring energy can then be used to power the components of the lock 1200. The winding mechanism includes a ratchet attached with a pawl to prevent the spring from unwinding.
Some or all of the process 200, 800 (or any other processes or functions described herein, or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions and may be implemented as code (e.g., executable instructions, one or more computer programs or one or more applications) executing collectively on one or more processors, by hardware or combinations thereof. The code may be stored on a computer-readable storage medium, for example, in the form of a computer program comprising a plurality of instructions executable by one or more processors. The computer-readable storage medium may be non-transitory.
The illustrative environment includes at least one application server 1308 and a data store 1310. It should be understood that there can be several application servers, layers, or other elements, processes or components, which may be chained or otherwise configured, which can interact to perform tasks such as obtaining data from an appropriate data store. As used herein the term “data store” refers to any device or combination of devices capable of storing, accessing and retrieving data, which may include any combination and number of data servers, databases, data storage devices and data storage media, in any standard, distributed or clustered environment. The application server can include any appropriate hardware and software for integrating with the data store as needed to execute aspects of one or more applications for the client device, handling a majority of the data access and business logic for an application. The application server provides access control services in cooperation with the data store and is able to generate content such as text, graphics, audio and/or video to be transferred to the user, which may be served to the user by the Web server in the form of HyperText Markup Language (“HTML”), Extensible Markup Language (“XML”) or another appropriate structured language in this example. The handling of all requests and responses, as well as the delivery of content between the client device 1302 and the application server 1308, can be handled by the Web server. It should be understood that the Web and application servers are not required and are merely example components, as structured code discussed herein can be executed on any appropriate device or host machine as discussed elsewhere herein.
The data store 1310 can include several separate data tables, databases or other data storage mechanisms and media for storing data relating to a particular aspect. For example, the data store illustrated includes mechanisms for storing production data 1312 and user information 1316, which can be used to serve content for the production side. The data store also is shown to include a mechanism for storing log data 1314, which can be used for reporting, analysis or other such purposes. It should be understood that there can be many other aspects that may need to be stored in the data store, such as for page image information and to access right information, which can be stored in any of the above listed mechanisms as appropriate or in additional mechanisms in the data store 1310. The data store 1310 is operable, through logic associated therewith, to receive instructions from the application server 1308 and obtain, update or otherwise process data in response thereto. In one example, a user might submit a search request for a certain type of item. In this case, the data store might access the user information to verify the identity of the user and can access the catalog detail information to obtain information about items of that type. The information then can be returned to the user, such as in a results listing on a Web page that the user is able to view via a browser on the user device 1302. Information for a particular item of interest can be viewed in a dedicated page or window of the browser.
Each server typically will include an operating system that provides executable program instructions for the general administration and operation of that server and typically will include a computer-readable storage medium (e.g., a hard disk, random access memory, read only memory, etc.) storing instructions that, when executed by a processor of the server, allow the server to perform its intended functions. Suitable implementations for the operating system and general functionality of the servers are known or commercially available and are readily implemented by persons having ordinary skill in the art, particularly in light of the disclosure herein.
The environment in one embodiment is a distributed computing environment utilizing several computer systems and components that are interconnected via communication links, using one or more computer networks or direct connections. However, it will be appreciated by those of ordinary skill in the art that such a system could operate equally well in a system having fewer or a greater number of components than are illustrated in
Some various embodiments further can be implemented in a wide variety of operating environments, which in some cases can include one or more user computers, computing devices or processing devices which can be used to operate any of a number of applications. User or client devices can include any of a number of general purpose personal computers, such as desktop or laptop computers running a standard operating system, as well as cellular, wireless and handheld devices running mobile software and capable of supporting a number of networking and messaging protocols. Such a system also can include a number of workstations running any of a variety of commercially-available operating systems and other known applications for purposes such as development and database management. These devices also can include other electronic devices, such as dummy terminals, thin-clients, gaming systems and other devices capable of communicating via a network.
Some embodiments utilize at least one network that would be familiar to those skilled in the art for supporting communications using any of a variety of commercially-available protocols, such as Transmission Control Protocol/Internet Protocol (“TCP/IP”), File Transfer Protocol (“FTP”), Universal Plug and Play (“UpnP”), Network File System (“NFS”), and Common Internet File System (“CIFS”). The network can be, for example, a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network and any combination thereof.
In embodiments utilizing a Web server, the Web server can run any of a variety of server or mid-tier applications, including Hypertext Transfer Protocol (“HTTP”) servers, FTP servers, Common Gateway Interface (“CGI”) servers, data servers, Java servers and business application servers. The server(s) also may be capable of executing programs or scripts in response requests from user devices, such as by executing one or more Web applications that may be implemented as one or more scripts or programs written in any programming language, such as Java®, C, C# or C++, or any scripting language, such as Perl, Python or TCL, as well as combinations thereof. The server(s) may also include database servers, including without limitation those commercially available from Oracle®, Microsoft®, Sybase® and IBM®.
The environment can include a variety of data stores and other memory and storage media as discussed above. These can reside in a variety of locations, such as on a storage medium local to (and/or resident in) one or more of the computers or remote from any or all of the computers across the network. In a particular set of embodiments, the information may reside in a storage-area network (“SAN”) familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to the computers, servers or other network devices may be stored locally and/or remotely, as appropriate. Where a system includes computerized devices, each such device can include hardware elements that may be electrically coupled via a bus, the elements including, for example, at least one central processing unit (“CPU”), at least one input device (e.g., a mouse, keyboard, controller, touch screen or keypad) and at least one output device (e.g., a display device, printer or speaker). Such a system may also include one or more storage devices, such as disk drives, optical storage devices and solid-state storage devices such as random access memory (“RAM”) or read-only memory (“ROM”), as well as removable media devices, memory cards, flash cards, etc.
Such devices also can include a computer-readable storage media reader, a communications device (e.g., a modem, a network card (wireless or wired), an infrared communication device, etc.) and working memory as described above. The computer-readable storage media reader can be connected with, or configured to receive, a computer-readable storage medium, representing remote, local, fixed and/or removable storage devices as well as storage media for temporarily and/or more permanently containing, storing, transmitting and retrieving computer-readable information. The system and various devices also typically will include a number of software applications, modules, services or other elements located within at least one working memory device, including an operating system and application programs, such as a client application or Web browser. It should be appreciated that alternate embodiments may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets) or both. Further, connection to other computing devices such as network input/output devices may be employed.
Storage media and computer readable media for containing code, or portions of code, can include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer readable instructions, data structures, program modules or other data, including RAM, ROM, Electrically Erasable Programmable Read-Only Memory (“EEPROM”), flash memory or other memory technology, Compact Disc Read-Only Memory (“CD-ROM”), digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices or any other medium which can be used to store the desired information and which can be accessed by the a system device. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that various modifications and changes may be made thereunto without departing from the broader spirit and scope of the invention as set forth in the claims.
Other variations are within the spirit of the present disclosure. Thus, while the disclosed techniques are susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific form or forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions and equivalents falling within the spirit and scope of the invention, as defined in the appended claims.
The use of the terms “a” and “an” and “the” and similar referents in the context of describing the disclosed embodiments (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. The term “connected” is to be construed as partly or wholly contained within, attached to, or joined together, even if there is something intervening. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
Preferred embodiments of this disclosure are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.
All references, including publications, patent applications and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
This application is a divisional of U.S. patent application Ser. No. 13/747,278, filed on Jan. 22, 2013, issued as U.S. Pat. No. 9,394,723 on Jul. 19, 2016, entitled “LOCK THAT MECHANICALLY DETECTS TAMPERING,” the contents of which are herein incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
1666319 | Watts et al. | Apr 1928 | A |
1946364 | Smith et al. | Feb 1934 | A |
2057301 | Boris et al. | Oct 1936 | A |
2769873 | Noregaard et al. | Nov 1956 | A |
3266278 | Ennitt et al. | Aug 1966 | A |
3284593 | Maddison et al. | Nov 1966 | A |
3402581 | Schweizer et al. | Sep 1968 | A |
3464243 | Hawkins | Sep 1969 | A |
3550410 | Toepfer et al. | Dec 1970 | A |
3763676 | Greenberg et al. | Oct 1973 | A |
3798398 | Hills | Mar 1974 | A |
3936673 | Kelly et al. | Feb 1976 | A |
3941954 | Wintringham et al. | Mar 1976 | A |
3962695 | Peters et al. | Jun 1976 | A |
3986376 | Lack | Oct 1976 | A |
4205542 | Renda et al. | Jun 1980 | A |
4262506 | Tobel et al. | Apr 1981 | A |
4326124 | Faude et al. | Apr 1982 | A |
4328692 | Dice et al. | May 1982 | A |
4332306 | Turatti et al. | Jun 1982 | A |
4656851 | Leek et al. | Apr 1987 | A |
4712398 | Clarkson et al. | Dec 1987 | A |
4759204 | Neyret et al. | Jul 1988 | A |
4803314 | Sorenson et al. | Feb 1989 | A |
4982587 | Tzou | Jan 1991 | A |
4996514 | Sunami | Feb 1991 | A |
5177466 | Lai et al. | Jan 1993 | A |
5229747 | Zhao et al. | Jul 1993 | A |
5289177 | Wake et al. | Feb 1994 | A |
5461360 | Guim et al. | Oct 1995 | A |
5691711 | Jorgensen et al. | Nov 1997 | A |
5774043 | Mizuno et al. | Jun 1998 | A |
5836187 | Janssen et al. | Nov 1998 | A |
5838232 | Kim et al. | Nov 1998 | A |
5870915 | D'Hont et al. | Feb 1999 | A |
6000609 | Gokcebay et al. | Dec 1999 | A |
6523381 | Ritz et al. | Feb 2003 | B1 |
6756698 | Shamoto et al. | Jun 2004 | B2 |
8756964 | Wakai et al. | Jun 2014 | B2 |
8981899 | Jokinen et al. | Mar 2015 | B2 |
9394723 | Ginos et al. | Jul 2016 | B1 |
9567770 | Ginos | Feb 2017 | B1 |
20030084691 | Kato et al. | May 2003 | A1 |
20070209412 | Shiramizu et al. | Sep 2007 | A1 |
20080024270 | Katagiri et al. | Jan 2008 | A1 |
20090229326 | Pukari et al. | Sep 2009 | A1 |
20100139340 | Gerner et al. | Jun 2010 | A1 |
20100319420 | Ng et al. | Dec 2010 | A1 |
20110079059 | Piotrowski et al. | Apr 2011 | A1 |
20120118032 | Baumann et al. | May 2012 | A1 |
20130102285 | Suginaka et al. | Apr 2013 | A1 |
Entry |
---|
U.S. Appl. No. 13/747,278 , “Final Office Action”, dated Dec. 21, 2015, 11 pages. |
U.S. Appl. No. 13/747,278 , “Non-Final Office Action”, dated Jun. 15, 2015, 8 pages. |
U.S. Appl. No. 13/747,278 , “Notice of Allowance”, dated Mar. 30, 2016, 15 pages. |
U.S. Appl. No. 13/747,278 , “Supplemental Notice of Allowance”, dated Jun. 15, 2016, 2 pages. |
U.S. Appl. No. 13/747,320, filed Jan. 22, 2013, Titled: “Lock That Electronically Detects Tampering”. |
Number | Date | Country | |
---|---|---|---|
Parent | 13747278 | Jan 2013 | US |
Child | 15199746 | US |