Various embodiments relate generally to access control systems.
Entities (e.g., companies, organizations, individuals) may have locked assets and/or locked asset repositories. Access to repositories may, for example, be provided by keys. Access to keys may be restricted to authorized personnel.
Apparatus and associated methods relate to an access control system having a planar interlocking mechanism including two reflectively symmetric rotating moon gears mechanically coupled by a linear slide configured to respond to rotation of the moon gears. In an illustrative example, the moon gears are mechanically coupled by the linear slide via respective actuating cams. The moon gears may be provided, for example, with locking cams configured to releasably secure the linear slide via a corresponding follower on the linear slide. Rotation of one moon gear into a first mode may, for example, place the other moon gear in a second mode, and vice versa. Each moon gear may be configured, for example, to be operated by a removable peg. Various embodiments may advantageously be configured such that release of a removable peg from one moon gear captures a peg in a corresponding moon gear.
Various embodiments may achieve one or more advantages. For example, some embodiments may advantageously provide tracking of assets. An access peg identifying a user may advantageously be captured when operated to release an asset peg. Various embodiments may advantageously reduce a quantity of parts used in a (mechanical) access control system. Various embodiments may advantageously achieve multiple configurations with one set of components (e.g., identical molds). Various embodiments may be readily assembled with minimal or no tools. Accordingly, various embodiments may advantageously achieve cost savings. Various embodiments may increase durability and/or life expectancy by providing rotating and/or sliding parts with low stress, strain, and/or flexion imposed during operation. Various embodiments may advantageously increase accountability. Various embodiments may advantageously reduce and/or eliminate costs due to lost keys and/or other assets.
The details of various embodiments are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.
Like reference symbols in the various drawings indicate like elements.
To aid understanding, this document is organized as follows. First, to help introduce discussion of various embodiments, an exemplary access control unit 110 is introduced with reference to
Each pair of access peg 120A and asset peg 120B may be interlockingly coupled by an interlocking mechanism 140. In the depicted example, the interlocking mechanism 140 includes substantially radially symmetric moon gears 145A and 145B in mechanical communication via a linear slide 150. The interlocking mechanism 140 may releasably secure at least one of the access key 120A and the asset key 120B. For example, a moon gear 145 may receive a peg 120 and, when operated, rotate the peg 120 into an orientation preventing removal of the peg 120 from the corresponding access port 115.
In the depicted example, a user 135 gains access to a particular asset peg 120B by inserting (“1”) an access peg 120A into an access port 115A and thereinto into the corresponding moon gear 145A. The user then operates the moon gear 145A by rotating (“2”) the access peg 120A. The moon gear 145A operates the second moon gear 145B via linear slide 150. Accordingly, the corresponding asset peg 120B is rotated into an orientation allowing withdrawal (“3”) of the asset peg 120B through the corresponding access port 115B. Rotation of the access peg 120A to operate the interlocking mechanism 140 to release the asset peg 120B rotates the access peg 120A into an orientation which prevents withdrawal of the access peg 120A from the corresponding access port 115A. The user 135 may thereby release the asset peg 120B and gain access to a desired key 125, and the user's access key 120A is releasably captured. Accordingly, a (visual) record of the last access key 120A used to gain access to a particular asset 125 is advantageously maintained.
In the depicted example, left moon gear 145A and right moon gear 145B are disposed in functional reflective symmetry of one another about an axis 206. The linear slide 150 of the interlocking apparatus 140 is configured to respond to rotation of the moon gears 145 by translation in the first plane along a third axis 215 substantially orthogonal to the axis of reflective symmetry 206 of the moon gears.
When one of the moon gears (e.g., a left moon gear 145A) rotates in a first rotational direction (e.g., counterclockwise), the actuating cam 210A of the moon gear displaces the linear slide along the third axis 215 towards the axis of rotation 205B of the other moon gear 145B (e.g., to the right). The moon gear thereby causes the linear slide 150 to engage an actuating cam 210B of the other moon gear 145B. As the linear slide 150 is displaced to engage the actuating cam 210B, the other moon gear 145B is thereby rotated in the first rotational direction. The rotation may continue until a locking cam 220B (e.g., a substantially hook-shaped structure, as depicted) of the other moon gear 145B releasably secures a first follower 225B of the linear slide 150 (e.g., extending upwards in the first plane from the linear slide 150).
The locking cam 220B (e.g., a ‘hook’) of the other moon gear 145B may retainingly engage the linear slide 150. For example, the locking cam 220B of the other moon gear 145B may hook over the first follower 225B of the linear slide 150 such that the linear slide 150 is releasably retained in place until the locking cam 220B is disengaged from the follower 225B. The locking cam 220B may, for example, be provided with a cam surface that may ‘draw’ the linear slide along the axis 215 toward the associated moon gear and into a ‘locked position.’
When the locking cam 220B of the other moon gear 145B secures the first follower 225B, a second follower 225A of the linear slide 150 (e.g., substantially parallel to and/or in reflectively symmetry with the first follower) is displaced past a locking cam 220A surface of the moon gear 145A such that the moon gear 145A is blocked from rotation in an opposite direction (e.g., counterclockwise). For example, the second follower 225A may protrude upward such that the locking cam 220A would collide with an upper end of the follower without engaging a following surface 225A thereof. The moon gear 145A is thereby placed into a first mode (e.g., ‘locked’) and the other moon gear 145B into a second mode (e.g., ‘unlocked’). When the other moon gear 145B rotates in the opposite rotational direction (e.g., clockwise), the operations reverse and the moon gear 145A is thereby placed into the second mode and the other moon gear 145B is placed into the first mode.
In the depicted example, each moon gear 145 is provided with a corresponding cavity 230. The cavity 230 may be configured, for example, such that a corresponding peg 120 is matingly received thereinto. For example, the moon gear 145A may be configured to receive an access peg 120A into a cavity 230A and the moon gear 145B may be configured to receive an asset peg 120B into a cavity 230B. The cavities 230 may be configured such that a corresponding peg may drive rotation of the moon gear 145 and/or may be driven by rotation of the moon gear (e.g., via rotation of a corresponding moon gear mechanically coupled by a linear slide 150 in an interlocking mechanism 140). In the depicted example, the cavities 230 are provided with radially extending ‘lobes’ 230C configured to mate with corresponding radial extensions of a corresponding peg 120. Accordingly, the interlocking mechanism 140 may quickly and easily alternate between retaining a key in one of the two access ports 115 corresponding to the two moon gears 145 of the interlocking apparatus 140.
As depicted, the interlocking apparatus 140 may be assembled with minimal and/or no tools. The interlocking apparatus 140 may be operated with minimal stress, shear, and/or flexion of each component. Each component may, for example, be manufactured without complex molds and/or manufacturing operations. Accordingly, various embodiments may advantageously be cost-effective to produce and/or assemble. Various embodiments may advantageously increase durability and/or life expectancy.
In the first configuration 300, the first peg 120A is inserted (“1”) into the corresponding access port 115A, and therethrough into a corresponding cavity 230A in the moon gear 145A. The peg 120A is provided with protruding elements 320A configured to mate with corresponding engagement features in the cavity 230A. Once the engagement features 320A are seated in the cavity 230A, the peg 120A is operated (e.g., rotated) (“2”) to rotate the corresponding moon gear 145A into the first mode (e.g., ‘locked’). The moon gear 145A thereby operates the other moon gear 145B via the linear slide 150, placing the other moon gear 145B into the second mode (e.g., ‘unlocked’).
As depicted, in the second mode, the cavity 230B of the moon gear 145B is oriented such that the engagement elements 320B of the peg 120B are aligned with the corresponding access port 115B such that the peg 120B may be withdrawn (“3”) through the access port 115B. Accordingly, a user may, by way of example and not limitation, advantageously use the first peg 120A to operate the interlocking mechanism 140 and release the second peg 120 B. Furthermore, the first peg 120A may be advantageously captured by the interlocking mechanism 140. The first peg 120A may, for example, identify a user to which the peg 120A is assigned. Accordingly, a visual indicator may, by way of example and not limitation, advantageously be captured in the interlocking mechanism 140 to indicate a user who removed the peg 120B.
As depicted, in the second mode, the cavity 230A of the moon gear 145A is oriented such that the engagement elements 320A of the peg 120A are aligned with the corresponding access port 115A such that the peg 120A may be withdrawn (“3”) through the access port 115A. Accordingly, a user may, by way of example and not limitation, advantageously return the second peg 120B and operate it into a ‘captured’ state to operate the interlocking mechanism 140 and release the first peg 120A. Accordingly, the user may return the second peg 120B (e.g., containing an asset, or a means of access thereto) and thereby recover the peg 120B (e.g., assigned to them and/or containing an indication of their identity).
The interlocking mechanism 140 (including the moon gears 145 and the linear slide 150) are disposed in the carrier 310. The carrier 310 is provided with substantially circular pockets 405 configured to receive corresponding moon gears 145. As depicted, a moon gear 145A is disposed within a left circular pocket 405A, and a moon gear 145B is disposed within a right circular pocket 405B. The moon gears 145 are rotatably constrained within the corresponding pockets 405. In the depicted embodiment, the linear slide 150 is supported by and slidingly engages a sliding support feature 410A (e.g., a bearing surface) of the carrier body 310.
The carrier body and/or housing may, for example, cooperate to constrain the interlocking apparatus 140 within the first plane and on the various axes of rotation and/or symmetry. In the first configuration 300, counterclockwise rotation (“1”) of the moon gear 145A within the pocket 405A imparted linear motion (“2”) of the linear slide 150 along the sliding support feature 410A, which imparted corresponding rotation (“3”) of the moon gear 145B within the pocket 405B. Similarly, in the second configuration 301, clockwise rotation (“1”) of the moon gear 145B within the pocket 405B imparted linear motion (“2”) of the linear slide 150 along the sliding support feature 410A, which imparted corresponding rotation (“3”) of the moon gear 145A within the pocket 405A.
As depicted, the carrier 310 is further provided with a second sliding support feature 410B. The second sliding support feature 410B may, for example, be a mirror image of the first sliding support feature 410A about a longitudinal axis 310A of the carrier 310. Accordingly, the carrier 310 (and, for example, the housing 305, other related components, or some combination thereof) may be configured such that an interlocking mechanism 140 (e.g., the moon gears 145 and the linear slide 150) may be disposed in the carrier in one of two configurations mirrored about the longitudinal axis 310A. Accordingly, the access control unit 110 may be assembled in one of two configurations: a first configuration (as depicted, with the linear slide 150 sliding on the sliding support feature 410A), and the second configuration, rotated 180 degrees in the first flying such that the linear slide 150 is sliding on the sliding support feature 410B. When the access control unit 110 is assembled in the second configuration and rotated 180 degrees in the first plane 214 relative to the depicted embodiment, the last moon gear may still be 145A. Accordingly, two configurations may be assembled from identical components by disposing the interlocking mechanism in the carrier (and/or other components) in one of two configurations.
The housing 305 is provided with orientation limiting elements 505A and 505B protruding from corresponding access ports 115A and 115B. The orientation limiting elements 505 are configured to engage corresponding orientation elements 510 on a peg 120 when inserted through the corresponding access port 115 and seated in the interlocking mechanism 140. Accordingly, rotation of the peg 120 may be limited within a predetermined range.
For example, in the first configuration 300 depicted in
Similarly, in the second configuration 301 depicted in
For example, in various embodiments, the lock 715 may, for example, be Internet of Things (IoT) enabled. The lock 715 may, for example, identify a user who operates the lock 715 (e.g., biometric, card, user ID, RFID). The lock 715 may record and/or transmit to a remote logging module the user identity. An electronic access log may be maintained of operation of the lock 715. Accordingly, a user may identify who gained access to a cabinet associated with the lock. The user may inspect the access control units 110 to identify which user(s) took a specific asset 125 by identifying an identifying indicium 130 captured when the asset 125 was released. The user may then match, for example, against the electronic log to validate and/or determine who may have retrieved the asset 125.
Accordingly, each access port 115A of each access control unit 110 is offset by the distance 805 from the access port 115 above and/or below it. Therefore, an object (e.g., a key) suspended from a peg in a particular access port 115 does not overhang an access port 115 in the access control unit 110 below it. Accordingly, a user may, by way of example and not limitation, advantageously view and/or locate a specific asset suspended from a peg in a specific access port 115 without having to move aside objects dangling from a peg 120 in an access unit above it.
In various embodiments, each access control unit 110 may be assembled in one of two assembly configurations as described at least with reference to
Although various embodiments have been described with reference to the figures, other embodiments are possible. For example, in various embodiments engagement features (e.g., 320) may be configured such that a peg (e.g., 120A or 120B) may fit in only one of a pair of access ports (e.g., 115A or 115B) and/or moon gears (e.g., 145A or 145B). By way of example and not limitation, an access peg (e.g., 120A) may not fit in an access port configured for an asset peg (e.g., 115B), an asset peg (e.g., 120B) may not fit in an access port configured for an access peg (e.g., 115A), or some combination thereof accordingly, integrity of the tracking system may be maintained by preventing an asset key (e.g., corresponding to a ‘low value’ asset) from being used to gain access to another asset key (e.g., corresponding to a ‘high value’ asset), an access key (e.g., another user's access key) from being used to release another access key (e.g., an access key of a user trying to circumvent a tracking system), or some combination thereof.
For example, at least one engagement feature 320A of the first key 120A may have different width(s) than at least one corresponding engagement feature 320B of the second key 120B, such as is depicted at least with reference to
In various embodiments the engagement features may be resistant to modification of one key into another key. For example, a first key 120B may not be converted into a first key 120A by simply snipping off a piece of plastic, and or quickly rubbing down a pattern on a rough surface. Accordingly, the integrity of an object tracking system may be advantageously resistant to circumvention by modification of keys.
In various embodiments engagement features may, by way of example and not limitation, be protrusions, cavities, or some combination thereof. In various embodiments the engagement features between a first key (e.g., peg) and a second key (e.g., peg) may, by way of example and not limitation, be different orientations (e.g., angle between two engagement features on a peg), dimensions (e.g., width, length, height), feature type (e.g., cavity, protrusion), position (e.g., axial, radial), pattern, geometry, or some combination thereof.
In various embodiments the carrier body and/or housing may, for example, be patterned to provide engagement features for multiple sets of interlocking apparatus. In various embodiments the pockets 405, the sliding support features 410, other features providing corollary functions, or some combination thereof may, by way of example and not limitation, be provided in the carrier 310, in the housing 305, in other appropriate housing component(s) (e.g., a unitary housing), or some combination thereof.
In various embodiments, the pockets 405 and the sliding support features 410 are unitarily formed (e.g., integrally molded) with the carrier 310. In various embodiments, features may be integrally formed (e.g., of the same and/or different material), separate components, or some combination thereof.
In various embodiments functional reflective symmetry may relate, for example, to some combination of two moon gears' main body, actuating cam, locking cam, and/or central shaft and/or aperture. The moon gears are in functional reflective symmetry at least because the actuating cam and the locking cam may be substantial mirror images in function. In various embodiments the locking cam and the actuating cam may be geometrical mirror images. In some embodiments an aperture(s) and/or key engagement features, by way of example and not limitation, may not be symmetrical between the two moon gears (e.g., feature(s) to permit a master key to be inserted in one moon gear but not in the other), while retaining functional reflective symmetry between the moon gears regarding rotation, actuation, and locking.
In various embodiments the first plane may be substantially a first plane. For example, various features may actually be in various planes substantially parallel to the first plane such that the mechanism still operate substantially in a planar manner.
Although an exemplary system has been described with reference to the figures other implementations may be deployed in other industrial, scientific, medical, commercial, and/or residential applications. For example, an access control unit 110 may be configured to track and/or control access to keys, barcode scanners, other assets, or some combination thereof. Although access control units 110 with 3 (e.g.,
In various embodiments an access control unit 110 and/or interlocking mechanism 140 may be configured as an IoT device. For example, a sensor (e.g., optical, presence, contact, Hall effect) may be provided which detects a presence and/or orientation of a key (e.g., a peg 120). By way of example and not limitation, an access control unit may be provided with at least one sensor configured to detect the presence of a first peg 120A, a second peg 120B, or both. A control and/or communication module may be configured to read a status of each sensor and transmit, display, and/or store the result. Accordingly, a user may query a present and/or historical status of keys to determine which keys are present and/or missing. For example, if a key is missing, a user may visually inspect a corresponding access control unit 110 to identify an access element (e.g., peg 120A) used to release the missing key (e.g., 120B).
In various embodiments, some bypass circuits implementations may be controlled in response to signals from analog or digital components, which may be discrete, integrated, or a combination of each. Some embodiments may include programmed, programmable devices, or some combination thereof (e.g., PLAs, PLDs, ASICs, microcontroller, microprocessor), and may include one or more data stores (e.g., cell, register, block, page) that provide single or multi-level digital data storage capability, and which may be volatile, non-volatile, or some combination thereof. Some control functions may be implemented in hardware, software, firmware, or a combination of any of them.
Computer program products may contain a set of instructions that, when executed by a processor device, cause the processor to perform prescribed functions. These functions may be performed in conjunction with controlled devices in operable communication with the processor. Computer program products, which may include software, may be stored in a data store tangibly embedded on a storage medium, such as an electronic, magnetic, or rotating storage device, and may be fixed or removable (e.g., hard disk, floppy disk, thumb drive, CD, DVD).
Although an example of a system, which may be portable, has been described with reference to the above figures, other implementations may be deployed in other processing applications, such as desktop and networked environments.
Temporary auxiliary energy inputs may be received, for example, from chargeable or single use batteries, which may enable use in portable or remote applications. Some embodiments may operate with other DC voltage sources, such as 1.5V, 9V, 12V, or other appropriate (nominal) voltage batteries, for example. Alternating current (AC) inputs, which may be provided, for example from a 50/60 Hz power port, or from a portable electric generator, may be received via a rectifier and appropriate scaling. Provision for AC (e.g., sine wave, square wave, triangular wave) inputs may include a line frequency transformer to provide voltage step-up, voltage step-down, and/or isolation.
Although particular features of an architecture have been described, other features may be incorporated to improve performance. For example, caching (e.g., L1, L2, . . . ) techniques may be used. Random access memory may be included, for example, to provide scratch pad memory and or to load executable code or parameter information stored for use during runtime operations. Other hardware and software may be provided to perform operations, such as network or other communications using one or more protocols, wireless (e.g., infrared) communications, stored operational energy and power supplies (e.g., batteries), switching and/or linear power supply circuits, software maintenance (e.g., self-test, upgrades), and the like. One or more communication interfaces may be provided in support of data storage and related operations.
Some systems may be implemented as a computer system that can be used with various implementations. For example, various implementations may include digital circuitry, analog circuitry, computer hardware, firmware, software, or combinations thereof. Apparatus can be implemented in a computer program product tangibly embodied in an information carrier, e.g., in a machine-readable storage device, for execution by a programmable processor; and methods can be performed by a programmable processor executing a program of instructions to perform functions of various embodiments by operating on input data and generating an output. Various embodiments can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and/or at least one output device. A computer program is a set of instructions that can be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
Suitable processors for the execution of a program of instructions include, by way of example, both general and special purpose microprocessors, which may include a single processor or one of multiple processors of any kind of computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memories for storing instructions and data. Generally, a computer will also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including, by way of example, semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).
In some implementations, each system may be programmed with the same or similar information and/or initialized with substantially identical information stored in volatile and/or non-volatile memory. For example, one data interface may be configured to perform auto configuration, auto download, and/or auto update functions when coupled to an appropriate host device, such as a desktop computer or a server.
In some implementations, one or more user-interface features may be custom configured to perform specific functions. Various embodiments may be implemented in a computer system that includes a graphical user interface and/or an Internet browser. To provide for interaction with a user, some implementations may be implemented on a computer having a display device, such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user, a keyboard, and a pointing device, such as a mouse or a trackball by which the user can provide input to the computer.
In various implementations, the system may communicate using suitable communication methods, equipment, and techniques. For example, the system may communicate with compatible devices (e.g., devices capable of transferring data to and/or from the system) using point-to-point communication in which a message is transported directly from the source to the receiver over a dedicated physical link (e.g., fiber optic link, point-to-point wiring, daisy-chain). The components of the system may exchange information by any form or medium of analog or digital data communication, including packet-based messages on a communication network. Examples of communication networks include, e.g., a LAN (local area network), a WAN (wide area network), MAN (metropolitan area network), wireless and/or optical networks, the computers and networks forming the Internet, or some combination thereof. Other implementations may transport messages by broadcasting to all or substantially all devices that are coupled together by a communication network, for example, by using omni-directional radio frequency (RF) signals. Still other implementations may transport messages characterized by high directivity, such as RF signals transmitted using directional (i.e., narrow beam) antennas or infrared signals that may optionally be used with focusing optics. Still other implementations are possible using appropriate interfaces and protocols such as, by way of example and not intended to be limiting, USB 2.0, Firewire, ATA/IDE, RS-232, RS-422, RS-485, 802.11 a/b/g, Wi-Fi, Ethernet, IrDA, FDDI (fiber distributed data interface), token-ring networks, multiplexing techniques based on frequency, time, or code division, or some combination thereof. Some implementations may optionally incorporate features such as error checking and correction (ECC) for data integrity, or security measures, such as encryption (e.g., WEP) and password protection.
In various embodiments, the computer system may include Internet of Things (IoT) devices. IoT devices may include objects embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to collect and exchange data. IoT devices may be in-use with wired or wireless devices by sending data through an interface to another device. IoT devices may collect useful data and then autonomously flow the data between other devices.
Various examples of modules may be implemented using circuitry, including various electronic hardware. By way of example and not limitation, the hardware may include transistors, resistors, capacitors, switches, integrated circuits, other modules, or some combination thereof. In various examples, the modules may include analog logic, digital logic, discrete components, traces and/or memory circuits fabricated on a silicon substrate including various integrated circuits (e.g., FPGAs, ASICs), or some combination thereof. In some embodiments, the module(s) may involve execution of preprogrammed instructions, software executed by a processor, or some combination thereof. For example, various modules may involve both hardware and software.
A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. For example, advantageous results may be achieved if the steps of the disclosed techniques were performed in a different sequence, or if components of the disclosed systems were combined in a different manner, or if the components were supplemented with other components. Accordingly, other implementations are contemplated within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
537311 | Schade | Apr 1895 | A |
2064474 | Hopkins | Dec 1936 | A |
2220786 | Grainger | Nov 1940 | A |
2762216 | Wasson | Sep 1956 | A |
3154938 | Cohen | Nov 1964 | A |
3744829 | Germer | Jul 1973 | A |
3899201 | Paioletti | Aug 1975 | A |
4441348 | Neilsen | Apr 1984 | A |
4472952 | Hollowell, Jr. | Sep 1984 | A |
4567741 | Trempala | Feb 1986 | A |
4641509 | Batchelor et al. | Feb 1987 | A |
4958508 | Lin | Sep 1990 | A |
5020347 | Logan | Jun 1991 | A |
5172944 | Munich | Dec 1992 | A |
5372021 | Smith | Dec 1994 | A |
5505066 | Baucom | Apr 1996 | A |
5842362 | DePonty et al. | Dec 1998 | A |
5878613 | Tabacchi et al. | Mar 1999 | A |
D407962 | Conder | Apr 1999 | S |
5951068 | Strong | Sep 1999 | A |
6178792 | Glazier | Jan 2001 | B1 |
6612142 | Capwell | Sep 2003 | B1 |
6837084 | Bailey et al. | Jan 2005 | B2 |
7965190 | Maloney | Jun 2011 | B2 |
8011216 | Mielonen et al. | Sep 2011 | B2 |
8661864 | Guessford | Mar 2014 | B1 |
8931812 | Hauber | Jan 2015 | B1 |
9041536 | Guessford | May 2015 | B2 |
9165442 | Guessford | Oct 2015 | B2 |
10580242 | Ray | Mar 2020 | B2 |
20040163977 | Sedon et al. | Aug 2004 | A1 |
20040227349 | Denys | Nov 2004 | A1 |
20040245784 | Tsai | Dec 2004 | A1 |
20060076783 | Tsai | Apr 2006 | A1 |
20060130543 | Alchin | Jun 2006 | A1 |
20060188304 | Yamazaki | Aug 2006 | A1 |
20070068205 | Timothy | Mar 2007 | A1 |
20070193318 | Churchill et al. | Aug 2007 | A1 |
20070290511 | Liang | Dec 2007 | A1 |
20080060400 | Ling | Mar 2008 | A1 |
20080256992 | Chung | Oct 2008 | A1 |
20090241619 | Kuester et al. | Oct 2009 | A1 |
20200325709 | Irwin et al. | Oct 2020 | A1 |
Number | Date | Country |
---|---|---|
3140243 | Apr 1983 | DE |
2878880 | Jun 2006 | FR |
2004108108 | Apr 2004 | JP |
Entry |
---|
Cobra Key Systems, Cobra Key Cabinets, Cobra Key Systems, 2016, retrieved from the internet https://cobrakey.com/. |
Keyper Systems, Mechanical Key Control & Peg Systems, 2020, retrieved from the internet https://www.keypersystems.com/products/mechanical-key-control/. |
Vanguard, Double-hook Mortise Lock, retrieved from the internet Apr. 15, 2021, https://www.reflectwindow.com/products/double-hook-mortise-lock. |
International Search Report and Written Opinion of the International Searching Authority in related International Application No. PCT/US2022/071748, dated Aug. 10, 2022, 12 pages. |
Number | Date | Country | |
---|---|---|---|
20220333415 A1 | Oct 2022 | US |