1. Field of the Invention
The device relates to a safety and security device that, once activated, allows the electronic equipment to run for a preprogrammed period. In some embodiments, the device is used as an antitheft device as without the code use of the device is prohibited, preventing theft and resale of protected equipment.
2. Brief Description of the Prior Art
Electronic devices offer a temptation to thieves, as they are easy to resell due to lack of distinctive features. Although people will mark their electronic devices, such as cell phones, computers, etc., unless the stolen device is resold through a legitimate vendor, there is no hope for recovery.
A locking device disclosed is for use on electronics, such as computers, cameras, cell phones, VCRs, DVDs, etc. and mechanical equipment, tools, heavy equipment and machinery, gas-powered vehicles, as well as various other wheeled vehicles. The device provides the option of permitting the equipment to be operarable or inoperable for a predetermined period of time, selection of specific operable features or being completely shut down with operation permitted only through code entry.
Electronic circuitry within the device, in conjunction with an unlocking and timer operation, requires that the equipment be unlocked prior to use. A time period for operation can be programmed into the equipment, after which time the unit shuts off or, conversely, the equipment can be shut down for a specific time period and automatically reactivitated. This reduces theft as well as preventing unauthorized use of the item.
The operating control system is for use with equipment, generally having an exterior case, a power source, an input device, at least one activation/deactivation member, and a control member. The control member, such as a separate chip or programming embedded into existing chips, either has it's own input device to enable the input of user access codes or uses an input device inherent in the equipment, such as the buttons on a cell phone. In the preferred embodiments, a readout panel, such as a cell phone, computer or camera screen, is used to monitor the status of the equipment. The readout can also be an audio output. The control member is in communication with the input device, readout panel, power source, and activation/deactivation member. The control member prevents user code. The control member can also be programmed to control the internal functions of the electronic device, such as permitting the viewing of certain channels on a TV during a predetermined time, and other channels during other times. Secondary access codes permit the system to be programmed to permit activation of the device only by those containing the secondary codes. The device can also permit cell phone calls out, but not in, or vise versa, during set time periods. Any equipment having electronic components can be incorporated with the disclosed device to provide the ability to selectively determine which features are active for specific time periods. In digital equipment, such as cameras, camcorders, etc, the capabilities are increased due to the versitality of the digital technology and it should be noted that any of the capabilities disclosed herein with one digital device can be incorporated in other digital devices.
The control system includes a programmable timer to communicate with the control member thereby enabling access to the selected feature for the predetermined period of time entered at the input device. Preferably the memory within all embodiments is nonvolitile thereby preventing a loss of the selling upon loss of power. A clock member, if not already inherent in the device, can be added to track time, activate, and deactivate the timer based on user input. In cellular phones, computers, cameras, etc., the operation of the equipment is dependent upon microchips, or microprocessors, and would not require the wiring of a power tool, or other non-processor based equipment. The versitility of the locking system enables it, as disclosed in application Ser. No. 09/178,837, to be use on equipment such as hand tools, electronics or wheeled vehicles as well as cell phones, digital and non-digital cameras, etc.
The advantages of the instant disclosure will become more apparent when read with the specification and the drawings, wherein:
The disclosed invention relates to a programmable device having multiple programmable features including, but not limited to, restricting accessibility to specific portions of the device and a coded locking mechanism that discourages theft and restricts or eliminates use during a predetermined time frame. In addition to the inherent advantages obtained through the locking device as disclosed, further safety advantages are achieved simply by its existence. It will be obvious to anyone who buys an item containing the locking device that unless the seller has the code, the item is most likely stolen. The disclosed locking device controls the activation of the item, preventing activation without the entry of user codes. Without access to the codes, the item is useless and unsaleable.
Electronic devices, such as cell phones, palm pilots and other hand held data access devices, cameras, computers, VCRs, televisions, MP3 players, etc. all fall into the category of easy theft devices with high resale value. Their use of programmable chips, however, makes these valuable devices easy to modified to incorporate the advantages of the disclosed system.
Alternatively, in devices such as VCRs and televisions, the device can be a separately encased unit that is retrofitted into the power source, such as the power cord or plug. The use of microchips, microprocessors or analog, technology, however, permits various functions to be monitored, such as scheduling service, based on use time or the number of hours an item has been used.
The locking mechanism is preferably of a type that does not require the use of a key, or other device, thereby avoiding an additional item to lose or carry. Access through keypads or other locking means can be used, such as magnetic card readers, fingerprint or retinal recognition, standard keys, telephone signals, or any applicable wireless technology, etc. The method of programming the device is dependent upon the type of device, size, etc. For example, touch key scanning, or other method of transmission having static data, can easily be incorporated into the device, thereby permitting data relating to the item to be tracked.
The disclosed technology provides benefits in a laboratory or other setting where equipment is centralized and removed for use. Each employee would have a personalized touch key, or other wireless or non-wireless access means, that would record the employee name, time of activation, and any other information required by the employer. In instances where security or training levels are required to use a device, the personalized access device can also carry the ID code enabling use of the device, thus preventing use by unauthorized personnel.
When the device cannot be programmed using systems inherent for the use of the device, such as a digital camera or cell phone, alternative programming “keys” containing static data, such as a touch key, can be used. The disclosed technology provides the advantage that an employer, or parent, can program the touch key with the pertinent data, including activation time, and that data cannot be changed except by someone with top level programming rights. This is advantageous when using equipment that must be shut down after a specific period of use as the preprogrammed time relieves the user from the responsibility of watching a clock. Although shut down could also be obtained through other methods, the disclosed system provides the additional advantages as set forth herein, thereby consolidating systems.
When installed on a computer, the disclosed device can be connected directly to the power supply or programmed into the chip, hard drive or other storage/memory device; permitting businesses that sell computer time to automatically shut down the computer unless additional time is purchased. In home use, the device permits parental control on the amount of time, or specific time periods, the computer, or other electronic device such as a TV, can be used by a child. Thus, the computer, VCR or TV could only be activated after homework time is over, etc. Computers are especially adaptable to keyboard programming of the device, although a keyboard interface can be included with any of the locking devices disclosed. A program embedded in the device's microchip and/or harddrive can allow for a simple timer setting that is activated through key input on the keyboard. As an option, a direct coding key can be incorporated on the keyboard that automatically accesses the program and permits activation, setting changes, etc. Although computer lock out programs are known in the prior art, they totally lock out use of the computer in an all or nothing method. The disclosed device permits access to the computer for a predetermined period of time either at random or within a specific schedule time, optionally, to extend the amount of time to use the device without interruption. For example, the system can be set to enable the computer to be turned at a predetermined time, used for a specific time period, after which the computer cannot be used until the preprogrammed activation time. This enables a parent to leave the house after programming the computer, or other electronic device or equipment, to activate at 6 pm until 10 pm after which it deactivates until the follow day at 6 pm or in reponse with other programming. The user entering the time restraints would set up the program with a user code to prevent unauthorized changes to the program.
One of the programmable modes disclosed herein is a partial activation mode, as described in detail hereinafter with relationship to cell phones. Using this mode, the user can restrict partial use of the electronic equipment, for example a computer can be programmed to restrict certain programs, such as web access, instant messages, email, specific websites or type of site, during specific blackout time periods. For example, children could be prevented from surfing the web except during specific time periods. Or computer games could only be accessed for a restricted time, however the computer could be used for word processing or other homework related activities. This mode enables the computer to be used, but in a restricted manner, based upon primary user programming. Additionally, sub-user ID's can be used to permit individual access to an electronic device. This is advantageous with children having different age restrictions by permitting the older children to access programs, make long distance calls, etc., that are unavailable to younger children.
The disclosed locking device is also advantageous for rental equipment, such as generators, compressors, VCR's, etc., in that the rented equipment can be programmed for a specific period of time and after that point be automatically deactivated. This discourages the theft of rental equipment, thereby reducing insurance and liability, since by preventing unauthorized use, especially when used in conjunction with larger equipment, insurance rates would potentially be reduced.
In electronic equipment, such as TVs, VCRs, etc. containing infrared remote controllers, the timing activation device can be activated through the remote controller. Once activated the program would appear on the screen and utilize either existing or specific keys to set the shut down time, user time periods, or extend the time period, etc. This would be an inexpensive addition to a controller and increase user convenience. Alternatively, the controller itself can be used to set the time of use, without the appearance of the setting program on the screen.
It should be noted that the use of analogue, key scanners, infrared, fingerprint or retinal recognition, etc. taught herein for use by a specific embodiment, is not limited to that embodiment. Each embodiment of the locking device disclosed herein can incorporate the electronics, memory, etc. as described herein in relation to any other embodiment.
A hand drill, as illustrated in
The time can be set through any means appropriate to the equipment being used as well as the final use. For example, the time can be through repeatedly touching a specific key, jumping the time by predetermined increments. Alternatively, an “enter” key can be provided which allows entry of the unlocking code and subsequent entry of a predetermined period of time. Preferably, all timed locking devices are provided with nonvolatile memory to prevent the loss of programmed instructions in the event the item's battery goes dead or is removed. This is more critical with rechargeable hand tools where completely discharging the battery is sometimes required to fully recharge.
The incorporation of a microchip to register the locking codes and program the activation time further provides the added ability to monitor various other tool functions. For example, an LED display 14 of
In
In an alternative embodiment to the safety lock key, the solenoid 126 and wiring 122 are encased in an epoxy, indicated herein as region 128, as illustrated in
In
As stated heretofore, the disclosed device can be easily incorporated with electronic equipment. The programming of the equipment can be through a number of methods and additional methods will become evident as technology changes and will be evident to those skilled in the art.
Rewrite swipe cards are gaining popularity and can easily be incorporated with the disclosed device. The cards can be rewritten with the new codes using a computer or other applicable device, such as a palm or remote control. For example, a computer program can contain the applicable coding for all the electronic devices which incorporate the disclosed technology. A user can select the functions to be incorporated for each device and write them to the card. The user can then use the same swipe the card to program each of the electronic devices available as each device will recognize its codes and ignore programming for other devices. Alternatively, a small hard drive, such as used in digital cameras, can be used to program the various electronic devices.
The schematic of
As stated heretofore, cellular phones are a small sized, high dollar theft item that is difficult to protect. Most people leave their phones on all of the time so that the implementation of an on/off-activated lock would not prevent theft; as the phone would most likely be turned on when stolen and a thief would simply leave the phone on. Incorporating the disclosed system, the thief would know that there was no way to stop the phone from shutting down at a pre-designated time and that once the predesignated time had expired the phone would be unusable. Using the disclosed system, the user could program the phone to shut off permanently at the expiration of a predetermined time or, alternatively at a preset time. For example, this would enable the user to tell the system that it should shut off at 9:00 p.m., or alternatively once the timer reach three hours from the programming time. Once shut down, the device would require reentry of the access codes. The disclosed system further enables a user to set the phone to shut down for a predetermined period of time, with automatic reactivation at the end of the time period.
The ability to turn the phone off for a predetermined period of time, after which it automatically reactivates for a predetermined time based upon user programming, is beneficial for people attending meetings, movies, or some other activity that requires the phone to be turned off. Since the phone will automatically reactivate, the user does not need to worry about turning the phone back on. In the preferred embodiment, the phone can also be set to either receive calls or make calls, during a user programmed time period, as well as the standard incoming/outgoing mode. Thus, if the phone is being loaned out and the owner of the phone does not want his/her calls to be picked up by anyone else, the phone can be set to forward all of the phone owner's incoming calls to their voice mail or other call forwarded location, while still allowing the person having the phone to make outbound calls. In the reverse mode, the person having the phone can receive calls, but cannot use the phone to call out.
It should be noted that for maximum security, the code enabling the programming disclosed herein is preferably on the phone's, or other equipment's, permanent memory device, such as hard drive, microchip, etc. and is not solely dependent upon any temporary software, phone card or other removable system.
A delayed activation can also be programmed into any of the devices to enable activation at a specific time or after a certain amount of time has lapsed. Thus, in applications such as the electric tools used on a construction site, the foreman can program the tool to activate in thirty minutes and to stay activated for an additional eight hours.
In any electronic device the commands can be set through a variety of methods. On equipment that has a built in a screen, such as a digital camera or cell phone, the screen can be used to monitor the exiting settings and program new settings. In devices without screens an external LED display, voice activation, or some other means of forming communicating between the device and the user can be incorporated. The existing command or program buttons can be used to program the device or additional buttons can be incorporated into the design at the time of manufacture. Additionally, remotes, infrared, Bluetooth, or other wired or wireless devices can be used as a programming tool.
A sample of a sequence for the user to follow when programming a cell phone is illustrated in
Use Mode
If the user chooses to simply use the system 603 or 701, they simply enter the personal code 605 or 703 and the system returns to the previous program or the standard operation for a time period set by the manufacturer. If the user chooses to alter the previous program, the user has either changed their mind or made the incorrect selection, they indicate “no”, the programmed modes remain as currently set and the option to go the program mode would be offered. It should be noted that the safety issues disclosed herein would be negated if the user was able to simply turn off the locking system. In the preferred embodiment the manufacturer sets a default maximum amount of time that the phone can be continuously activated, after which it automatically shuts down. This maximum operational period is preferably applicable not only to cell phones but all devices using the disclosed locking system. The maximum time can be set by the user using a separate code, either single or multiple use, from the standard programming.
In
It should be noted that the term fall back as used herein can relate to either the default set by the manufacturer or the last programmed codes. The fall back preference is set at the initial programming by the user at the time of set up.
Program Mode
If user answers “yes” to the Program Mode 602, or activate the system, as illustrated in
The Timed Operation mode, or scheduling 614, provides the user the ability to shut down the operation of the device by clock setting 636 or number of minutes 640. In the event the clock setting 636 is selected, the user then enters the time of day that the device shuts down 638. If the minutes 640 module is selected, the number of minutes prior to shutting down is requested 642. Preferably, a preset maximum time of operation will still prevail after which the user code would be required to reactivate the phone. The selection of “no” as a response brings up the sleep mode 620 operation which, if entered through, enables the user to set a start time 644 and an end time 646 during which the device is inoperable. “No” again bypasses the sleep mode 620 to the delay start 626 mode which enables the user to set the commencement of the start time 648 at a time later than the time of entry. The end time 650 is similar to the sleep mode end time 646. The partial operation mode 634 enables the user to separate the ability to make calls 652 from the ability to receive calls 654. When the make calls 652 operation is selected, the user enters the start time 656 and the end time 658 during which calls can be made. The receive calls 654 also permits start time 660 and end time 662 entry. In the event the user selects none of the modules the system returns to the activate locking system mode 604.
Depending upon the end cost, the device can be programmed to accept multiple different commands, such as a sleep mode 620 where it does not operate from the start time 644 to the end time 646 and timed operation 614 in which the device shuts down 638 at 8:00 pm.
Extend Time
The devices can be provided with an extend time mode 822, as illustrated in
In
In the embodiment of
If the user wishes to view 932, the user code 930 is entered and the system permits viewing of the preprogrammed events. This system is for use predominately on TV's and computers, however other applications will be evident to those skilled in the art.
One use of the disclosed invention is in commercial industries with workers using company owned tools and equipment, computers, motel TVs and VCRs, etc. The tools, or other equipment, are activated in the morning to run for an entire shift, at which point they shut down. This prevents theft from outside sources as well as employees. Additionally by reactivating the tools each morning, a “safety check” can be incorporated with the activation to prevent faulty equipment from being used.
The locking device can further be used with bicycles, shopping carts, wheelchairs, etc. It should be noted, however, that since the locking devices disclosed herein operate on bicycles by stopping movement of the pedals, this device is not recommended for bikes, or other items that have foot brakes. In the event, that the device was activated during use, the user would be unable to activate the brakes. The example used herein is a bicycle, however the device, as disclosed, can easily be adapted for a variety of other wheeled devices. The locking device for use with bicycles, or other applicable devices, preferably has a weight of about one (1) pound or less.
To provide the ability to repair the locking device in the event a problem arises; a bottom plate 214 is incorporated into the locking device 200. The bottom plate 214 illustrated has a rotating lock 212 that is secured to a locking plate 220. The flanges 218 extend into the open area of the case 202 and provide support for the locking plate 220 when rotated to the locked position. Rotation of the rotating lock 212 moves the locking plate 220 into a position to clear the flanges, thereby permitting removal of the bottom plate 214. The locking mechanism for the bottom plate is an example of a method for locking the bottom plate onto the case and other methods known in the art can be used.
An automatic embodiment of the locking mechanism for use with bicycles is illustrated in
The base plate 312 uses an alternate design to the embodiment of
Since other modifications and changes varied to fit particular operating requirements and environments will be apparent to those skilled in the art, the invention is not considered limited to the example chosen for the purposes of disclosure, and covers all changes and modifications that do not constitute departures from the true spirit and scope of this invention.
This application is a continuation in part of application Ser. No. 10/273,819 filed on Oct. 18, 2002 now abandoned, which is a continuation in part of U.S. application Ser. No. 09/178,837, filed on Oct. 26, 1998, now U.S. Pat. No. 6,469,615 issued on Oct. 22, 2002 which is a continuation in part of provisional application Ser. No. 60/065,941 filed on Oct. 27, 1997 the contents of all are incorporated herein as though recieted in full.
Number | Name | Date | Kind |
---|---|---|---|
4081754 | Jackson | Mar 1978 | A |
4263781 | Harner et al. | Apr 1981 | A |
4279012 | Beckedorft et al. | Jul 1981 | A |
4370721 | Berenberg et al. | Jan 1983 | A |
4484220 | Beetner | Nov 1984 | A |
4574752 | Reichert et al. | Mar 1986 | A |
4700296 | Palmer et al. | Oct 1987 | A |
4769765 | Green | Sep 1988 | A |
4959860 | Watters et al. | Sep 1990 | A |
4967305 | Murrer et al. | Oct 1990 | A |
5036314 | Barillari et al. | Jul 1991 | A |
5051837 | McJunkin | Sep 1991 | A |
5150298 | Fujioka et al. | Sep 1992 | A |
5191231 | Berry | Mar 1993 | A |
5231310 | Oh | Jul 1993 | A |
5231661 | Harnum et al. | Jul 1993 | A |
5253066 | Vogel | Oct 1993 | A |
5278538 | Ainsworth et al. | Jan 1994 | A |
5291067 | Nakajima et al. | Mar 1994 | A |
5331353 | Levenson et al. | Jul 1994 | A |
5377317 | Bates et al. | Dec 1994 | A |
5382983 | Kwoh et al. | Jan 1995 | A |
5510780 | Norris et al. | Apr 1996 | A |
5523796 | Marshall et al. | Jun 1996 | A |
5524195 | Clanton et al. | Jun 1996 | A |
5526034 | Hoarty et al. | Jun 1996 | A |
5530230 | Smith et al. | Jun 1996 | A |
5531467 | Schueman | Jul 1996 | A |
5534911 | Levitan | Jul 1996 | A |
5563586 | Baum et al. | Oct 1996 | A |
5589892 | Knee et al. | Dec 1996 | A |
5600364 | Hendricks et al. | Feb 1997 | A |
5642805 | Tefft | Jul 1997 | A |
5653135 | Miller et al. | Aug 1997 | A |
5684861 | Lewis et al. | Nov 1997 | A |
5805763 | Lawler et al. | Sep 1998 | A |
5819156 | Belmont | Oct 1998 | A |
5850218 | LaJoie et al. | Dec 1998 | A |
5898778 | Antonini | Apr 1999 | A |
5917256 | Broadbent, II | Jun 1999 | A |
5930446 | Kanda | Jul 1999 | A |
5940755 | Scott | Aug 1999 | A |
5969748 | Casement et al. | Oct 1999 | A |
5974364 | Kim | Oct 1999 | A |
5982355 | Jaeger et al. | Nov 1999 | A |
6005489 | Siegle et al. | Dec 1999 | A |
6014184 | Knee et al. | Jan 2000 | A |
6098878 | Dent et al. | Aug 2000 | A |
6111240 | Kishimoto et al. | Aug 2000 | A |
6144401 | Casement et al. | Nov 2000 | A |
6202014 | Brandt et al. | Mar 2001 | B1 |
6223265 | Kawasaki et al. | Apr 2001 | B1 |
6226793 | Kwoh | May 2001 | B1 |
6321381 | Yuen et al. | Nov 2001 | B1 |
6430488 | Goldman | Aug 2002 | B1 |
6433818 | Steinberg et al. | Aug 2002 | B1 |
6442406 | Harris et al. | Aug 2002 | B1 |
6463276 | Jonsson | Oct 2002 | B1 |
6473559 | Knudson et al. | Oct 2002 | B1 |
6501380 | Jakobsson | Dec 2002 | B1 |
6505348 | Knowles et al. | Jan 2003 | B1 |
6536041 | Knudson et al. | Mar 2003 | B1 |
6614987 | Ismail et al. | Sep 2003 | B1 |
6697617 | Liebenow | Feb 2004 | B2 |
6698020 | Zigmond et al. | Feb 2004 | B1 |
6701523 | Hancock et al. | Mar 2004 | B1 |
6704929 | Ozer et al. | Mar 2004 | B1 |
6757534 | Bach et al. | Jun 2004 | B2 |
6769128 | Knee et al. | Jul 2004 | B1 |
6777828 | Rothstein | Aug 2004 | B1 |
6785901 | Horiwitz et al. | Aug 2004 | B1 |
6889207 | Slemmer et al. | May 2005 | B2 |
6891955 | Bowden et al. | May 2005 | B1 |
6898762 | Ellis et al. | May 2005 | B2 |
6922843 | Herrington et al. | Jul 2005 | B1 |
20020002706 | Sprunk | Jan 2002 | A1 |
20020095673 | Leung et al. | Jul 2002 | A1 |
20020171763 | Stecyk | Nov 2002 | A1 |
20020174270 | Stecyk | Nov 2002 | A1 |
20020174430 | Ellis et al. | Nov 2002 | A1 |
20020181933 | Ellis et al. | Dec 2002 | A1 |
20030009758 | Townsend et al. | Jan 2003 | A1 |
20030066075 | Bahn et al. | Apr 2003 | A1 |
20030070166 | Johnson | Apr 2003 | A1 |
20030079227 | Knowles et al. | Apr 2003 | A1 |
20030103627 | Nierzwick et al. | Jun 2003 | A1 |
20030110488 | Lee | Jun 2003 | A1 |
20030115592 | Johnson | Jun 2003 | A1 |
20030145321 | Bates | Jul 2003 | A1 |
20030163811 | Luehrs | Aug 2003 | A1 |
20030172377 | Johnson | Sep 2003 | A1 |
20030237093 | Marsh | Dec 2003 | A1 |
20040019902 | Knudson | Jan 2004 | A1 |
20040019903 | Knudson | Jan 2004 | A1 |
20040040034 | Sullivan | Feb 2004 | A1 |
20040073927 | Knudson | Apr 2004 | A1 |
20040083489 | Bansal et al. | Apr 2004 | A1 |
20040123135 | Goddard | Jun 2004 | A1 |
20040153385 | Allibhoy et al. | Aug 2004 | A1 |
20040261097 | Hanks | Dec 2004 | A1 |
Number | Date | Country |
---|---|---|
0630802 | May 1994 | DE |
1213919 | Jun 2002 | EP |
2362546 | Nov 2001 | GB |
61-283228 | Dec 1986 | JP |
WO 0237822 | Nov 2000 | WO |
WO 0106786 | Jan 2001 | WO |
WO 0117209 | Mar 2001 | WO |
WO 0188937 | Nov 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20030107470 A1 | Jun 2003 | US |
Number | Date | Country | |
---|---|---|---|
60065941 | Oct 1997 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09178837 | Oct 1998 | US |
Child | 10273819 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10273819 | Oct 2002 | US |
Child | 10339711 | US |