The present disclosure generally relates to systems and methods used to secure portable items, and more specifically to apparatus having an electronically releasable assembly configured to secure a portable item.
Due to their portability, monetary value, and utility, portable items such as personal electronic devices, parcels, and other valuables, are vulnerable to theft. Personal electronic devices such as mobile phones, tablet computers, laptop computers, and the like have become ubiquitous and almost essential to modern life. Due to their portability, monetary value, and utility, such devices are vulnerable to theft. Portable personal electronic devices left unattended, displayed for retail sale or demonstration, and institutional electronic devices for public or private use are also frequent targets. Additionally, home delivery services for on-line purchases have grown rapidly and significantly over recent years. During the COVID-19 pandemic, the volume of parcels delivered directly to the home surged dramatically, with many consumers today expecting same-day and next-day delivery of packages as a basic capability for retailers. This rapid growth in home delivery has led to a significant surge in the theft of parcels left outside homes on doorsteps, porches and driveways.
In summary, items of value are increasingly portable and likely to be transported, increasing both the opportunity and incentive for theft. Consequently, individuals are seeking a convenient and effective solution for securing valuables, for example, by directly attaching the valuable to an immovable surface or object.
Various aspects of at least one embodiment are discussed below with reference to the accompanying figures, which are not intended to be drawn to scale. Where technical features in the figures, detailed description or any claim are followed by reference signs, the reference signs have been included for the sole purpose of increasing the intelligibility of the figures, detailed description, and claims. Accordingly, neither the reference signs nor their absence is intended to have any limiting effect on the scope of any claim elements. In the figures, each identical or nearly identical component that is illustrated in various figures is represented by a like numeral. For purposes of clarity, not every component may be labeled in every figure. The figures are provided for the purposes of illustration and explanation and are not intended as a definition of the limits of embodiments of the disclosure. In the figures:
Personal devices such as mobile phones, tablet computers, laptop computers, and the like have become ubiquitous and almost essential to modern life. Due to their portability, monetary value, and utility, however, such devices are vulnerable to theft. Other portable items such as parcels, retail merchandise displayed for demonstration or sale, and institutional devices for public or private use are also frequent targets. Yet, many of these items lack standardized features for locking or otherwise securing them.
The mechanism for attaching a security apparatus to a valuable object may be different than the mechanism for attaching the security apparatus and its target object to an immovable anchor surface. For example, the security apparatus may attach to the object of value by wrapping around the object or by fully encapsulating the object. At the same time, the security apparatus may be attached physically to an anchor surface, or it may wrap around an object that is permanently attached to an anchor surface.
Potential mechanisms for attaching a security apparatus to an object of value and to an anchor surface may share certain common design characteristics. For purposes of illustration and not limitation, the security apparatus must be physically secured so that a person of bad intent cannot easily take the object of value. The attachment mechanisms of the security apparatus may be hidden from view or direct manipulation so that an unauthorized individual is unable to access those mechanisms to physically release the object from the anchor surface. The security apparatus may also be integrated into packaging which contains a valuable object.
An owner or authorized user of a valuable object should be able to easily detach or release the security apparatus from the object, upon establishing their authority over the object. Similarly, an owner should be able to easily detach or release the security apparatus and object from the anchor surface or feature of that anchor surface to which it is secured, upon establishing their authority. By doing so, the object can be removed from the anchor surface without extreme effort by an individual who has established their authority to do so.
Another potential design characteristic of the security apparatus is the ability to electronically release the security apparatus and object of value. For example, the security apparatus may rely upon encrypted wireless remote communications of instructions to secure and unsecure the mechanisms of attachment, so that only authorized owners or their delegates are permitted to release secured objects from anchor surfaces within an environment.
In certain embodiments, the individual may use their personal electronic device such as a smart phone, key fob, smart watch, pad device or laptop to wirelessly communicate with the security apparatus.
In certain embodiments, the individual may use the embedded biometric or password-based features of their personal electronic device to wirelessly and securely communicate with the security apparatus. In this manner, the authorization, authentication or other security features of the individual's personal electronic device may be used to establish their authority to access the object of value through the security apparatus.
Such security apparatus may also be augmented with specific features such as sensors, cables, brackets, pulleys, or fitments to further enhance the safety and security of objects of value.
Another potential design characteristic of the security apparatus is portability so that one can easily carry it along with objects of value. The mechanisms of attachment should also be physically secured in such a manner that they will not mar, damage or alter the object of value or the anchor surface.
In certain embodiments, an authorized individual or owner of a valuable object should be able to easily attach the security apparatus to the object, as well as to an anchor surface or feature of that anchor surface. By doing so, the object cannot be removed from the anchor surface without extreme effort, making removal arduous and impractical for unauthorized individuals.
Offered herein are apparatus and techniques for securing valuables using electronically releasable fasteners which may also be referred to herein as electromechanical releasable fasteners, wirelessly releasable security devices, active anchor mechanisms, or any similar combination thereof. An apparatus may be configured with one or more cables forming loops external to a housing of the apparatus that may wrap around and secure a portable item. One or both ends of the cable(s) may be retained by a one-way locking mechanism disposed within the housing. Additionally or alternatively, the apparatus may include two or more brackets protruding from the housing and configured to secure the portable item. One or more of the brackets may be retained by a one-way locking mechanism within the housing. The one-way locking mechanism may allow movement of the cable(s) in a first linear direction (e.g., to decrease a length of cable forming the loop) while preventing movement of the cable(s) in a second linear direction (e.g., to increase the length of cable forming the loop) unless and until a controller of the apparatus verifies a received electronic signal. The electronic signal may be, for example, a wireless signal received by an antenna of the apparatus. Upon verifying the electronic signal, the controller may actuate an electromechanical component to release the cable(s) and/or bracket(s) and allow movement in the first linear direction. The cable loop(s) may wrap around corners, protrusions, etc., of valuables to prevent removal from the apparatus. Similarly, the bracket(s) may include hooks configured to extend around and thereby retain edges or corners of the portable item.
The apparatus may include an anchor mechanism to prevent removal of the apparatus from an anchor surface or other fixed object. In some implementations, the apparatus may have one or more active anchor mechanisms that may be electronically actuated to secure and/or release the apparatus from the fixed object in response to a wireless electronic signal. The apparatus may include a controller configured to receive and verify an electronic signal from an authorized device. Upon verification of an electronic signal, the controller may cause the one-way locking mechanism to release the cable(s) and allow removal of the apparatus from the valuable and vice-versa. In some cases, the controller may be configured to recognize a second electronic and, upon verifying the signal, release the anchor mechanism to allow removal of the apparatus and valuables from the anchor surface.
In some implementations, the security apparatus may have a modular construction in which a separate controller module and fastener modules may interlock in various configurations. For example, a first fastener module may secure to a portable item, a second fastener module may lock to an anchor surface, and the controller module may join the fastener modules together unless and until the controller module verifies a received electronic signal. Upon verifying the electronic signal, the controller module may actuate an electromechanical component to release the locking mechanism of one or both of the fastener modules and/or release one or both of the fastener modules from the controller module. The modular construction of the security apparatus may allow a user to select fastener modules most appropriate for securing their particular portable item to an available anchor surface.
In some implementations, the modules may be joined together using a twist-lock mechanism. For example, the user may bring a fastener module and the controller module into contact with each other and rotate the fastener module with respect to the controller module to engage the twist-lock mechanism such that the modules cannot be separated unless the rotation is reversed. An electromechanical locking mechanism may prevent rotation of the modules with respect to each other unless and until the mechanism is released. For example, the controller module may have a solenoid and plunger arranged so that the plunger extends out of the controller module to engage with a cavity and/or protrusion of the fastener module to create a mechanical interference that prevents rotation of the modules with respect to each other. In another example, the controller module may include an electromagnet and/or permanent magnet configured to attract a moving component from a fastener module such that it engages with a cavity or protrusion of the controller module. The moving component may be a pin (e.g., analogous to the plunger of the solenoid), a hook (e.g., that rotates into position to catch a surface of the cavity or protrusion in the controller module), a plate that is hinged at one side to allow the plate to engage with the cavity or protrusion, and/or take various other configurations. The moving component may be magnetic or ferromagnetic such that it is attracted by the permanent magnet or electromagnet of the controller module. The user may release the electromechanical locking mechanism by sending an electromagnetic signal to the controller. Upon verifying electronic signal, the controller may cause the solenoid to retract the plunger out of the cavity or away from the protrusion in the fastener module, and/or release the movable component from the cavity or protrusion in the controller module, thereby allowing the fastener module to be rotated and detached from the controller module.
In some implementations, the modular security apparatus may include an electronically releasable surface treatment on one or more of the mating surfaces between the controller module and a fastener module. For example, the surface of the controller module may include the electrically or electronically controlled barbs that are mechanically deployed from the surfaces to affect the coefficient of friction that resists lateral and/or rotational sliding of the modules with respect to each other. In a first state, the controller may cause the barbs to deploy from the surface(s) and create friction that resists lateral/rotational movement. In a second state, the controller may cause the barbs to retract from the surface(s) and reduce the friction between the mating surface of the modules and permit lateral/rotational movement. The mating surface of the fastener module may also include the electronically controlled barbs and/or may include a passive surface treatment configured for robust engagement with the electronically controlled barbs when the latter are deployed.
In some implementations, the modular security apparatus may have a manual locking mechanism. For example, a pin may extend from a fastener module to engage with a cavity or protrusion of the controller module such that when the fastener module is anchored to the anchor surface the pin is not accessible, and the fastener module and controller module cannot be detached from one another. When the modular security apparatus is removed from the anchor surface (e.g., by unlocking the anchor mechanism via an electronic signal), the user may access the pin and retract it from the cavity or protrusion of the controller module, thereby allowing the controller module to be rotated and detached from the fastener module. Similarly, a second pin may extend from the controller module into a cavity of the second fastener module that secures the portable item. The first fastener module (e.g., which attaches to the anchor surface) may block access to the second pin until it is removed from the controller module. Once the first fastener module is detached from the controller module, the user may retract the second pin from the cavity in the second fastener module, allowing the second fastener module to be rotated and detached from the controller module. In some implementations, the modular security apparatus may be implemented as a two-part apparatus in which a single module acts as both the controller module and one of the fastener modules. The integrated controller/fastener module may act as an anchor module, while the second module may secure the portable item, or vice-versa. These features may be implemented alone or in combination with each other and/or other features as described herein.
The cables 120 may form one or more loops that can wrap around corners or protrusions of the device 101. For example, as shown in
The apparatus 100 may include electrical and/or mechanical features to prevent the cables 120 from being extracted when the apparatus 100 is locked. For example, the apparatus 100 may include a ratchet mechanism with an electronically releasable pawl as shown in
In some implementations, the cable(s) 120 may be releasably attached to the anchor(s) 322. For example, the first end 122 may slot into an anchor 322 (e.g., through a keyhole opening, a narrowing slot, etc.). If the cable 120 is loose, the first end 122 may be removable from the anchor 322 (e.g., by sliding, unhooking, etc.). If the cable 120 is tight, however, such as when secured around an object, the tension in the cable 120 may prevent the first end 122 from being removed from the anchor 322. Additionally or alternatively, anchoring the apparatus 100 itself (e.g., as illustrated in
The one-way locking mechanism may include various parts configured to receive and secure the cable(s) 120, unless and until the apparatus 100 receives and/or verifies an electronic signal. In the example implementation shown in
In an example operation, a cable 120 may form a loop, which may be positioned around a corner of the device 101. The loop may be shortened in various manners. In some implementations, the cable 120 may pass through the opening 324, and the second end of the cable may attach to the spool or pulley 332. A spring 338 may retract the cable 120 by exerting a torque on the spool or pulley 332 in a first rotational direction. In some implementations, the cable 120 may pass through the opening 324, wrap around at least a portion of the spool or pulley 332, and pass out of an additional opening in the housing 110. Rather than (or, in some cases, in addition to) the spring 338 retracting the cable 120, the user may pull the second, free end of the cable 120. Thus, in some implementations, the apparatus 100 may not include a spring for rotating the spool or pulley 332, relying on the user to move the cable(s) 120 into or out of the housing 110 manually. In some implementations, the apparatus 100 may have other manual and/or automatic electrical and/or mechanical features for adjusting the length of the cable(s) 120 extending from the housing 110. For example, the apparatus 100 may have a crank that a user may turn to rotate the spool or pulley 332. In some implementations, the apparatus 100 may have an electric motor for rotating the spool or pulley 332. The electric motor may be actuated by the controller 330; for example, using buttons or other input elements on the housing 110 and/or using a key or app executed on a user device. By shortening the loop in one of these manners, the device 101 may be secured by the apparatus 100 until/unless the one-way locking mechanism is released by, for example, lifting or rotating the pawl 334 to disengage it from the ratchet gear 336.
The one-way locking mechanism may be released by a controller 330 of the apparatus 100. The controller 330 may include an antenna and/or connector configured to receive an electronic signal. The controller 330 may include logic and/or software configured to verify the received signal. The controller 330 may further include a driver (e.g., an electromechanical relay or solid-state driver) configured to actuate an electromechanical part such as a solenoid or motor. Thus, upon verifying the received electronic signal, the controller 330 may actuate the electromechanical part to release the one-way locking mechanism (e.g., by lifting the pawl 334, retracting a plunger of the solenoid, etc.). A battery 335 may provide power to the controller 330 and/or electromechanical parts. The controller 330 and operation thereof are described in additional detail below with reference to
In some implementations, the user may control the apparatus 100 (e.g., to release the cable and/or anchor mechanism) using a phone app operatively coupled to the controller 330. The app may communicate with the controller 330 via wireless (e.g., near-field communication (NFC) or Bluetooth) and/or wired connection (e.g., USB). The user may open the app to control the apparatus 100. The app may require a login or other verification (e.g., including two-factor authentication) prior to signaling the controller 330 to release any of its locking mechanisms. The app may be configured with a unique code or identifier that the controller 330 may verify prior to releasing a locking mechanism. Once a locking mechanism has been released by the controller 330, the user may loosen a cable 120 to enlarge the loop and release the secured device 101 and/or remove the apparatus 100 from the anchor surface 700 to which it was secured. In some implementations, a user may interface with the controller 330 through various means such as a dongle, keycard, remote control, personal computing device executing a desktop or web application, etc.
In some implementations, release of locking mechanisms may be based on mere proximity of a device (e.g., computing device, keycard, or dongle, etc.) to the apparatus 100 and without a separate action (e.g., opening an app) performed by the user. For example, the apparatus 100 may respond to a mobile device and/or electronic key configured to transmit a wireless electronic signal. In some implementations, the device or key may transmit a near-field signal continuously or periodically—that is, automatically and not necessarily in response to a button press—such that proximity of the key to the apparatus 100 may result in the apparatus 100 detecting the signal and releasing the cables 120 and/or the anchor mechanism in response. Similarly, by moving the device or key away from the apparatus 100, the apparatus 100 may no longer detect the signal (or determine that an amplitude of the detected signal has fallen below a threshold) and lock the cables 120 and/or the anchor mechanism in response. In some implementations, the device or key may generate and emit multiple different signals, such as a first signal that may release the cables 120 to free the device 101 and a second signal that may release an anchor mechanism that secures the apparatus 100 to another object such as a surface, pole, rack, shelf, etc. (e.g., as shown in
In some implementations, the phone app may receive information back from the controller 330. For example, the controller 330 may send data regarding charge of the battery 335 and the status of one or more locking mechanisms of the apparatus 100. In some implementations, the controller 330 may interface with one or more sensors of the apparatus 100 that may detect tampering (e.g., tilting, movement, vibration, shock, pressure, structural deformation, etc.). In some implementations, the controller 330 may record data regarding attempts to unlock (e.g., release locking mechanisms) of the apparatus 100 via electronic means. In some implementations, the controller 330 may be provided with a constant or periodic network connectivity that may allow the apparatus 100 to send a notification to a user device to notify the user in the event of tampering.
In some implementations, the teeth of the gear 346 may have a “shark tooth” and/or triangular shape that allows the spool/pulley 332 to turn in a first rotational direction even when the plunger 344 is engaged with the gear 346, but not a second rotational direction. Thus, the example locking mechanism shown in
The cam 350 may allow the cable 120 to move in a first linear direction (e.g., that reduces a size of a loop 125 formed by the cable). When pulled in the first linear direction (e.g., by a user pulling on the free, second end 124), the cam 350 may rotate such that the radius from the axis of rotation of the cam 350 to the point of contact with the cable 120 decreases and the cable 120 pulls freely. The cam 350 may, however, prevent movement of the cable 120 in a second linear direction opposite the first linear direction. When pulled in the second linear direction (e.g., as when someone attempts to increase the size of the loop 125), the cam 350 may rotate such that the radius to the point of contact with the cable 120 increases, causing the teeth 352 to push into the cable 120. The cam 350 and a wall of the housing 110 may form a cam buckle or cam lock mechanism that clamps the cable 120 between the cam 350 and the wall of the housing 110, with the teeth 352 and/or wall holding the cable 120 by friction and/or mechanical interference caused by the teeth 352 digging into the cable 120 (e.g., a soft sheath of the cable, between braids of a stranded cable, the stitch texture of a strap, etc.). The cam 350 may retain the cable unless released via the solenoid 348 and plunger 344 (e.g., a first solenoid 348a and first plunger 344a corresponding to a first cam 350a, and a second solenoid 348b and second plunger 344b corresponding to a second cam 350b) under control of the controller 330. As shown in
In some implementations, the housing 110 may define a t-shaped hole (T-hole) 328 (e.g., a first T-hole 328a for receiving the first cable 120a and a second T-hole 328b for receiving the second cable 120b). The T-hole 328 may receive a first end 326 of the cable (e.g., a first end 326a of the first cable 120a and a first end 326b of the second cable 120b). The first end 326 may be enlarged relative to the diameter or width of the rest of the cable 120. The enlarged first end 326 may fit through a wide portion of the T-hole 328 but not through a narrow portion of the T-hole 328. Thus, if the cable 120 is pulled tight (e.g., such as when the apparatus 100 is locked to prevent removal of the cable 120 and/or enlargement of the loop 125), the first end 326 may be secured in the housing 110. When the cable 120 is loose, however, the first end may be moved further into the housing 110 and out of the wide portion of the T-hole 328. This configuration may lock the first end 326 to the housing 110 when the cable 120 is locked tight but allow for the first end 326 to be released when the cable 120 is unlocked and/or loose, thus allowing the user to conveniently wrap the cable 120 around an object to be secured by the apparatus 100 and/or thread the cable 120 through the object before tightening and locking the cable 120.
In some implementations, the apparatus 100 may include an anchor mechanism 380 such as one of the fixed and/or electronically releasable anchors shown in
As shown in
A channel 620 may be configured with a surface treatment and/or surface features that prevent movement of a cable 120 along a length of a cable. In this manner, locking of the spool/pulley 332 (e.g., preventing rotation of the spool/pulley 332) will prevent the cable 120 from being pulled out of and/or through the housing 110. For example, if the cable 120 is made of a chain or twisted and/or braided strands of wire, the channel 620 may have structural features such as a pattern of surface protrusions and/or indentations that mate with the links, twists, and/or braids of the cable 120. In some implementations, the channel 620 may be formed in a V shape such that engagement between the cable 120 and the structural features of the channel 620 increases the harder the cable 120 is pulled. In another example, the cable 120 may have a polymer shield that has a high coefficient of static and/or kinetic friction with a material of the channel 620 (e.g., a surface treatment, layer, and/or the material of the spool/pulley 332 itself). In some implementations, the channel 620 may grip the cable 120 using a combination of structural features and friction.
The spool/pulley 332 may define a cavity 632 that may fit the battery 335 and/or the controller 330, which may be attached to the housing 110 and/or other part of the apparatus 100. The apparatus 100 may include a ratchet and pawl mechanism and/or a solenoid and plunger mechanism for locking rotation of the spool/pulley 332. The pulley 332 may define the teeth of a gear 646 and/or be mechanically attached to a separate gear 646. In contrast with the gear 346 shown in
In certain embodiments, the inventive concepts described for the electronically releasable security apparatus 100 also apply to other ratchet mechanisms and electromechanical devices such as those including a ratchet gear 336, which may be engaged with an electronically controlled pawl 334, or linear rack with teeth engaged by an electronically controlled plunger 344, in a manner similar to that described in the implementations illustrated in
In some implementations, a gas generating cell may be connected to an electronic circuit comprised of a resistor and a switch. The controller 330 may actuate the switch to take the resistor in and out of contact with the positive and negative ends of the gas generating cell. The resistor may be selected with a resistance value to cause the gas generating cell to eject sufficient gas, such as hydrogen, to alleviate the vacuum in the headspace of the suction cup 830, thereby releasing the suction cup 830, along with the rest of the apparatus 100 and any device 101 secured thereto, from the anchor surface 700. The controller 330 may keep the switch open (e.g., breaking the circuit) until such time as it receives and verifies an electronic signal indicating that the apparatus 100 is to be released from the anchor surface. When the controller 330 receives and verifies the electronic signal, the controller 330 may close the circuit between the resistor and the gas generating cell, causing gas to enter the suction cup 830 and the suction cup 830 to release from the anchor surface 700.
In some implementations, a valve may open a passage between the headspace of the suction cup 830 and the air inside and/or surrounding the housing 110. The controller 330 may actuate the valve (e.g., using a solenoid or other electromechanical means). The controller 330 may keep the valve closed (e.g., blocking the passage of gas into or out of the suction cup 830) until such time as it receives and verifies an electronic signal indicating that the apparatus 100 is to be released from the anchor surface. When the controller 330 receives and verifies the electronic signal, the controller 330 may open the valve, causing air to enter the suction cup 830 and the suction cup 830 to release from the anchor surface 700. In some implementations, the valve may be a one-way valve configured to allow air flow out of the suction cup 830 (e.g., to form a vacuum when the suction cup 830 is pressed against the anchor surface 700), but not into the suction cup 830 until opened by the controller 330.
As shown in
The suction cup 830 may be made of an elastic and/or flexible material. The suction cup 830 may include a flat or curved rim that matches the flat or curved anchor surface 700 to which it attaches. The suction cup material can also be made of multiple materials, such as a composite designed for desirable features, such as gas permeability for low air leakage, high tensile strength for tamper or cut resistance, and high melt temperature for heat resistance, to name a few. The base of the suction cup illustrated in
A pressure difference between the atmosphere on the outside of the suction cup 830 and the low-pressure cavity on the inside of the suction cup 830 maintains the base of the suction cup 830 adhered to the anchor surface 700. The force exerted by this vacuum is conventionally calculated as Fv=AP where Fv is the vacuum force, A is the area of the surface covered by the cup (Pi times radius squared or A=πr2, for a circular suction cup 830), and P is the pressure outside the cup (for example, atmospheric pressure for an air suction cup 830 at sea level). The electronically releasable suction cup 830 can be designed for different use cases by adjusting the various design parameters herein described, such as the radius of suction cup 830, the materials comprising suction cup 830 or its component parts like the center head, base, and/or rim, to name a few. Also, one or more electronically releasable suction cup assemblies can be integrated into customized fastening systems for different use cases.
As shown in
Various other implementations of active anchor mechanisms are possible. In some implementations, an anchor mechanism may include an expansion bolt configured to insert into a hole pre-drilled into the anchor surface 700. This configuration may facilitate anchoring by electromechanical means with minimal preparation of the anchor surface 700. The expansion bolt may have an expanded state and a retracted state. In the expanded state, the expansion bolt may have a first diameter (e.g., in a direction perpendicular to an axis of the bolt and/or the hole in the anchor surface). In the retracted state, the expansion bolt may have a second diameter narrower than the first. In the retracted state, the expansion bolt may be easily inserted into or removed from the hole. In the expanded state, the expansion bolt may be secured in the hole; for example, by a combination of friction and/or mechanical interference. In some implementations, the expansion bolt may include one or more surface treatments such as protrusions, textures, and/or coatings that increase mechanical interference and/or friction with a wall of the hole. For example, the circumference of the expansion bolt may have knurling, teeth, rings, bumps, and/or other edges that may bite into the wall of the hole. Additionally or alternatively, the circumference of the bolt may be treated with a high-friction material such as a rubber, polymer, and/or adhesive that increases the coefficient of friction with the wall of the hole. In some cases, the wall of the hole itself may have one or more similar surface treatments. In some cases, the expansion bolt and the wall of the hole may define complementary (e.g., interlocking) features.
In some implementations, the apparatus 100 may be configured such that attempting to pull the apparatus 100 away from the anchor surface 700 when the expansion bolt is in the expanded state causes the expansion bolt to expand further, increasing the holding strength of the anchor mechanism. For example, the expansion bolt may include a wedge or ramp mechanism that translates a linear movement (e.g., out of the hole) of a first element to a lateral (e.g., into the wall(s) of the hole) of a second element. The first element may be, for example, a tapered mandrel (e.g., having a conical and/or flared shape) coupled to a bolt. The second element may be, for example, an expansion wedge or wedges coupled to a collar surrounding the bolt. Pulling the bolt out of the hole (e.g., moving the bolt relative to the collar with respect to the axis of the expansion bolt) may move the tapered mandrel relative to the expansion wedges, thereby pushing the expansion wedges outward toward and/or into the wall of the hole. In some implementations, the bolt may be fixed to the housing 110 while the collar is actuated by the controller 330. If an attempt is made to remove the apparatus 100 from the anchor surface 700 while the expansion bolt is in the expanded state, the movement of the bolt may increase the lateral force pushing the expansion wedges into the wall of the hole. To release the expansion bolt, the controller 330 may, via electromechanical means such as a solenoid and/or motor and subject to verifying a received wireless electronic signal, cause the collar to move relative to the bolt with respect to the axis of the expansion bolt to transition the expansion bolt to the retracted state, thereby releasing the expansion bolt from the hole and thus the apparatus 100 from the anchor surface.
In some implementations, the apparatus 100 may include manual elements such as a button, lever, dial, screw, etc. to facilitate manual release of the expansion bolt. The manual element(s) may be locked by the controller 330 subject to verifying a wireless electronic signal and/or blocked by an object secured to the apparatus 100 (e.g., a device 101 secured by one or more cables 120). Thus, apparatus 100 may remain locked in the hole of the anchor surface 700 with the expansion bolt in the expanded state until and unless the user provides the correct wireless electronic signal.
In some implementations, the electronically releasable mechanism(s) of the apparatus 100 may include electrically or electronically controlled barbs that are mechanically deployed from the base of an apparatus 100 to affect the coefficient of friction that resists lateral sliding of apparatus 100 along the anchor surface 700. In a first state, the controller 330 may cause the barbs to deploy from the base of an apparatus 100, thereby increasing friction to resist lateral sliding of an apparatus 100 along the anchor surface 700. In a second state, the controller 330 may cause the barbs to retract from the base of an apparatus 100, thereby reducing friction to permit lateral sliding of an apparatus 100 along the anchor surface 700. For purposes of illustration and not limitation, electronically releasable barbs enable the apparatus 100 to grip or release anchor surfaces 700. For an anchor surface 700 comprised of a porous or soft material like fabric, the electronically controlled barbs increase the adhesion of the apparatus 100 to the anchor surface 700.
In another embodiment, the electronically controllable barbs are designed to deploy at a variety of angles that affect the direction of incidence to the anchor surface 700. These angles and direction of incidence are designed to optimally affect the force of friction or level of grip along the 360 degrees of potential movement as the apparatus 100 slides across the anchor surface 700.
In another embodiment, the electronically controllable barbs are comprised of fibers whose stiffness varies along a continuity of values that are electronically controllable. Such fibers are comprised of materials whose measure of elasticity and stiffness varies based on externally applied conditions, causing the Young's modulus of the material to vary within a defined range. In both embodiments, the apparatus 100 receives wireless electronic signals that control the elasticity or stiffness of the barbs.
In some implementations, the apparatus 100 may be inserted, via a lateral movement, into a secure slot, shelf, cubby, nook, etc., having an anchor surface 700 to which the barbs may engage. When the electronically controlled barbs are deployed, they may secure the apparatus 100 within the slot by resisting or preventing lateral movement of the apparatus 100 back out of the slot unless and until the barbs are retracted (e.g., upon verification of the appropriate wireless electronic signal). In addition, the apparatus 100 may be configured with a cavity for receiving one or more valuable objects. Inserting the apparatus 100 into the slot may prevent removal of the valuables from the cavity by, for example, blocking access to mechanism securing a cable 120 or strap 1120, obstructing an opening of the cavity (e.g., by enclosing the apparatus 100 on one or more sides in addition to the anchor surface 700), preventing a lid covering the cavity from being opened, etc. When the barbs are retracted, the authorized user is able to slide the object and its security apparatus 100 into and out of the slot. When the barbs are deployed, the high friction interface between the surface(s) of the security apparatus 100 and the surface(s) 700 of the slot resist the insertion or removal of the object. In another embodiment, the electronically deployable barbs are integrated in one or more surface 700 of the secure slot, while in yet another embodiment, the barbs or similar features like interlocking hooks and loops are integrated in the anchor surface(s) 700 of the secure slot and one or more outer surfaces of the housing 110.
In some implementations, the barbs may resist or prevent upward movement (e.g., away from the anchor surface 700 in a direction perpendicular to the anchor surface 700) of the apparatus 100 when deployed and allow upward movement of the apparatus 100 when retracted. The barbs may act in a manner similar or analogous to the hooks of hook-and-loop tape. Various means may be used to deploy and/or retract the barbs. In a first example implementation, the barbs may include a shape-memory alloy or polymer. A shape-memory alloy such as ninitol, CoNiAl, NiMnGa, etc., may respond to an electric current or field by changing shape or volume. Ninitol, for example, is an alloy of nickel and titanium which may be deformed (e.g., curved into a hook shape) at a first temperature and recover its original shape (e.g., relaxed into a straight or only slightly curved shape) when heated; for example, by an electric current. When the shape-memory alloy hook is heated, it may retract by uncurling, thereby releasing it from loops or other features on the opposing surface (e.g., the anchor surface 700 and/or a material adhered to the anchor surface). Other shapes may be used such as protrusions with an enlarged end (e.g., like a mushroom with a cap) where the enlarged end can be enlarged or shrunk based on an electric signal.
In a second example implementation, the barbs may be formed from a hollow, flexible material. The barbs may be formed into a hook shape. Application of pressure inside the hollowed-out portion of a barb may cause it to retract by uncurling, thereby releasing it from loops or other features on the opposing surface. Pressure may be applied by forcing a fluid (e.g., gas or liquid) into the hollowed-out portion; for example, using a piston. Many such barbs may be actuated in unison in this manner. In another example, flexible hollow hooks may be retracted (e.g., uncurled and/or straightened) by inserting a rigid member (e.g., a rod or needle) into the curved portion of the barb. Thus, a “bed-of-nails” array of rods may be inserted into a complementary array of hollow hooks to release many hooks based on a single actuation.
In a third example implementation, rigid barbs may be rotated and/or shifted laterally to catch or release a porous, fibrous, or otherwise textured material on the opposing surface. For example, barbs may be arranged in columns, rows, patches, or other types of sections in which barbs in different sections deploy and retract in different directions. Thus, if the apparatus 100 is moved in one direction, certain barbs may “unhook” from the opposing surface while others remain attached and possibly increase their attachment points (e.g., by hooking more loops). Such a configuration may resist or prevent movement of the apparatus 100 both laterally and/or away from the anchor surface 700.
In a fourth example implementations, the barbs may be bent or flexed backwards—that is, in a direction away from the curl of the hook. The barbs may be anchored on a first surface and pass through holes of a second surface. Moving the two surfaces relative to each other may flex the hooks backwards and partially or completely cause the hooks to release from loops or other features on the opposing surface.
The features of the various examples of electrically actuatable barbs described above may be used individually and/or in combination; for example, by flexing the barbs to partially unhook from loops on the opposing surface while using an electric current to further uncurl the hooks of the barbs. The controller 330, upon verification of a wireless electronic signal, may actuate one or more electromechanical components (e.g., a solenoid, piston, motor, etc.) to retract the barbs by one or more of the means described above.
In another embodiment, electronically releasable barbs may grip and release certain components of the apparatus 100 including a cable 120. In some embodiments, the electronically releasable barbs may be used as a releasable locking mechanism in a modular security apparatus 1300 as described beginning at
As shown in
As shown in
The plunger 922 of the solenoid 920 (and/or other latching mechanism) may extend to block lateral movement of the shoulder screw 910 out of the narrower second portion of the opening 930, thus securing the apparatus 100 to the anchor surface 700. In some implementations, the solenoid 920 and/or latching mechanism may engage automatically (e.g., using a spring), while in other implementations the solenoid 920 may be engaged actively by the controller 330. The controller 330 may actuate the solenoid 920 to retract the plunger 922 and allow lateral movement of the shoulder screw 910 out of the second narrow portion of the opening 930. The controller 330 may be the same as or different from the controller 330 that controls the electronically releasable one-way locking mechanism that locks the cables 120.
In certain embodiments, the inventive concepts described for the electronically releasable anchor mechanism may also apply to fasteners where a solenoid 920 and plunger 922 mechanism is used to block the fastener from opening. For purposes of illustration and not limitation, such a device might also be described as an electronically or wirelessly releasable fastener, clasp, shackle, bolt snap, snap hook, carabiner, or locking gate. Such a device may comprise a manually operated bolt action slide or gate which is locked into a latched or secured position by the solenoid 920 and plunger 922. A release mechanism may be mounted within the housing 110 and operatively connected to the plunger 922 for extending into a primary latched position or retracting into a secondary unlatched position. An electronic circuit such as the controller 330 may activate the release mechanism so as to move the plunger 922 into a retracted or deployed position, with a wireless radio to communicate authenticated commands or controls to/from a user device (e.g., such as one of the devices 1210 shown in
The buckles 1020 may be positioned on an underside of the bag 1000 such that they are positioned between the bag 1000 and the anchor surface 700 when the apparatus 100 is secured to the anchor surface 700. Although
In another embodiment, electronically releasable barbs grip and release certain components of the apparatus 100 including the strap 1010.
In some implementations, the housing 110 may define a t-shaped hole (T-hole) 1128. A wide portion of the T-hole 1128 may be defined in a bottom surface of the housing 110. The wide portion of the T-hole 1128 may be contiguous with a narrow portion of the T-hole that extends around an edge of the housing 110 to a side of the housing 110. The T-hole 1128 may receive a first end 1126 of the strap 1120. The first end 1126 may have a bar 1136 that may fit through the wide portion of the T-hole 1128 but not through the narrow portion. Thus, if the strap 1120 is pulled tight (e.g., such as when the apparatus 100 is locked to prevent removal of the strap 1120 and/or enlargement of the loop 1125), the first end 1126 may be secured in the housing 110 by the bar 1136. When the strap 1120 is loose, however, the bar 1136 may be moved further into the housing 110 and out of the wide portion of the T-hole 1128. This configuration may lock the first end 1126 to the housing 110 when the strap 1120 is locked tight but allow for the first end 1126 to be released when the cable 120 is unlocked or loose, thus allowing the user to conveniently wrap the strap 1120 around an object to be secured by the apparatus 100 and/or thread the strap 1120 through the object.
In some implementations, the apparatus 100 may include an anchor mechanism 380 such as one of fixed and/or electronically releasable anchors shown in
In some implementations, the apparatus 100 may include an anchor mechanism 380 such as one of fixed and/or electronically releasable anchors shown in
As shown in
In certain embodiments, the inventive concepts described for the electronically releasable security apparatus 100 also apply to other mechanisms and devices for gripping a strap, rope or cable via friction and/or by mechanically biting into the strap, rope or cable. For purposes of illustration and not limitation, such a device might be described as a wirelessly releasable cable lock, a wirelessly releasable pulley, or wirelessly releasable rope lock.
The techniques described herein for securing objects and/or containers may be applied to any object. Electronically releasable cables and/or anchor mechanisms may be designed into and/or designed to secure portable electronic devices, such as laptops, mobile phones, and pad devices; electronic devices, such as computers, appliances, and audio/video equipment; tools and tool boxes; toys and video games; artwork and collectibles; containers such as boxes, brief cases, purses, suitcases, safes, and jewelry boxes; security bags made, for example, out of Kevlar or other robust materials; musical instruments; sports equipment; medical equipment; drug access and control; industrial equipment and material; commercial appliances and equipment; consumer appliances; any object of actual or perceived value; any container intended to hold one or more objects of actual or perceived value.
Having thus described several aspects of at least one embodiment of this disclosure, it is to be appreciated various alterations, modifications, and improvements will readily occur to those skilled in the art. Such alterations, modifications, and improvements are intended to be part of this disclosure and are intended to be within the spirit and scope of the disclosure. Accordingly, the foregoing description and drawings are by way of example only.
Computer instructions for operating the controller 330 and its various components may be executed by the processor(s) 1204, using the memory 1206 as temporary “working” storage at runtime. A device's computer instructions may be stored in a non-transitory manner in non-volatile memory 1206, data storage component 1208, or an external device(s). Alternatively, some or all of the executable instructions may be embedded in hardware or firmware on the respective device in addition to or instead of software.
The controller 330 may include input/output device interfaces 1202. A variety of components may be connected through the input/output device interfaces 1202, as will be discussed further below. Additionally, the controller 330 may include an address/data bus 1224 for conveying data among components of the respective device. Each component within the controller 330 may also be directly connected to other components in addition to (or instead of) being connected to other components across the data bus 1224.
The controller 330 may include input/output device interfaces 1202 that connect to a variety of components such as an accelerometer and/or vibration sensor 1212 (e.g., to detect tampering with the apparatus 100), a global-positioning system (GPS) 1214 component for determining a location of the apparatus 100, and/or the antenna(s) 1222. In some implementations, the input/output device interfaces 1202 may connect to additional components such as a fingerprint reader, scanner, and/or camera for biometric identification which may, in some implementations, be used as an additional or alternative method of unlocking the apparatus 100 from a secured device 101 and/or an anchor. In some implementations, the input/output device interfaces 1202 may connect to a speaker and/or microphone.
Via the antenna(s) 1222, the input/output device interfaces 1202 may connect to one or more networks 199 via communication links 1299 such as a wireless local area network (WLAN) (such as Wi-Fi) radio, Bluetooth, near-field communication (NFC), and/or wireless network radio, such as a radio capable of communication with a wireless communication network such as a Long Term Evolution (LTE) network, WiMAX network, 3G network, 4G network, 5G network, etc. A wired connection such as Ethernet or USB may also be supported. Through the network(s) 199, the system may be distributed across a networked environment. The I/O device interface 1202 may also include communication components that allow data to be exchanged between devices such as different physical servers in a collection of servers or other components.
In some implementations, the apparatus 100 may be programmed to recognize an authorized user when a transmitting device such as the proximal device 1210a and/or the key fob 1240 is in local proximity to the apparatus 100. As part of a set-up procedure, the authorized user may physically activate a feature in the apparatus 100 that causes the apparatus 100 to enter a binding mode that allows pairing between the controller 330 (e.g., via the antenna(s) 1222) and the transmitting device (e.g., using an app on a mobile phone, tablet, smart watch, laptop, etc.). Once the apparatus 100 and the transmitting device are communicatively coupled via a communication link 1299, the authorized user may operate the transmitting device to instruct the controller 330 of the apparatus 100 to store the unique radio-frequency identifier (RFID) of the authorized user's transmitting device (e.g., the user device 1210a and/or the key fob 1240) in its non-volatile memory.
In some implementations, the apparatus 100 may be programmed to periodically broadcast its unique RFID and to scan for other radio frequency signals (e.g., a Bluetooth identifier and/or other identifier) from transmitting devices. A transmitting device may also broadcast its unique RFID periodically and/or on command and scan for other radio frequency signals. When the authorized user carries the transmitting device in local proximity to the apparatus 100 (e.g., as shown by the key fob 1240 and/or proximal user device 1210a in
In some implementations, the transmitting device (the key fob 1240 and/or user device 1210a) may remember an RFID of apparatus 100. This procedure also works for multiple apparatus 100 and multiple transmitting devices, with each device (e.g., the apparatus 100 and the transmitting device) storing the unique RFID of those other devices with which it has been paired.
In some implementations, the apparatus 100 may execute different software programs or defined protocols using this proximity-based information. For example, the apparatus 100 may additionally or alternatively communicate over the network(s) 199 to communicate with a server 1230 and/or pair with a user device 1210b that is remote from the apparatus 100.
In some implementations, the apparatus 100 may be paired with an authorized user's device 1210, such that apparatus recognizes when the authorized user is present in the local proximity or absent and remote, as illustrated by the communication link 1299a. Based on that information, the apparatus 100 may be programmed to allow or deny attempts to unlock the cables 120 and/or anchor mechanism by an unauthorized user who does not have the properly recognized unique RFID of the authorized user's device 1210 and/or key fob 1240. In this case, the authorized RFID pairing can act as a proximity-based electronic key in a single factor authentication protocol, or can act as an additional proximity-based factor within a multi-factor authorization or identity authentication security protocol.
In some implementations, the apparatus 100 may be paired with a device such as a smart home device (e.g., a smart speaker), desktop computer, proximal user device 1210a, in-home/in-office server 1230, etc. that may be configured as a room monitoring device. Such a room monitoring device may be configured to run an application or app that uses communication facilities of the room monitoring device to regularly (e.g., continually, periodically, occasionally, etc.) monitor for the RFID of the apparatus 100 in its local proximity. If the room monitoring device detects that the apparatus 100 has been removed from the local proximity of the room monitoring device, the application or app running on the room monitoring device may report the absence of the apparatus to the authorized user's device 1210b (e.g., via the server 1230 and/or the communication links 1299d and 1299e). The apparatus 100 and/or the room monitoring device may further alert the user device 1210b if other tampering of the apparatus 100 is detected; for example, by movement using the accelerometer/vibration sensor 1212 and/or GPS module 1214.
In some implementations, the apparatus 100 may transmit status information periodically and/or upon request. For example, the apparatus 100 may generate wireless electronic signal indicating whether the apparatus 100 is locked or unlocked (e.g., to a device 101) and/or anchored or unanchored. The apparatus 100 may indicate the status of individual electromechanical components (e.g., whether they are in an rest state or actuated state). The apparatus 100 may indicate whether it detects the presence and/or proximity of a key fob 1240 and/or other authorized device. The user device 1210 may receive the indication directly (e.g., by receiving the wireless electronic signal) and/or indirectly (e.g., via the server 1230 or another device 1210).
In some implementations, the apparatus 100 may also include an accelerometer/vibration sensor 1212 and/or GPS module 1214. If the apparatus 100 (e.g., while attached to a device 101) determines from these sensors that the device 101 and/or the apparatus 100 is being moved, lifted or otherwise tampered with, the apparatus 100 may take one or more predefined actions triggered by the sensed event. For example, if the apparatus is currently paired to a room monitoring device, it can inform the room monitoring device of the unauthorized tampering. The room monitoring device may alert the authorized user about the tampering via the network 199; for example, by sending a message to the user's device 1210, which may not be in local proximity. The apparatus 100 may also take other actions, including triggering an audible alert and/or visible lights that draw attention to the tampering attempt. In some implementations, the apparatus 100 may combine the previously described proximity detection feature with the motion detection feature to monitor for tampering and take appropriate action when the authorized owner is not present, thereby reducing false tampering alerts or actions when the authorized user is present.
In some implementations, the apparatus may be configured with one or more electronic authentication mechanisms, such as a fingerprint scanner and/or other biometric scanner (e.g., using face recognition, iris recognition, voice recognition, etc.). Fingerprint scanning may provide an easy alternative manner of unlocking the apparatus 100 from the device 101 and/or an anchor. In some implementations, the apparatus 100 may be configured to unlock via a positive fingerprint read only if the proximity detection feature confirms the presence of an authorized individual as confirmed by recognizing the unique RFID of a previously paired and authorized user device 1210.
In some implementations, the apparatus 100 may be used to secure a user device 1210 that is configured to operate the apparatus 100. In such cases, proximity-based control of the apparatus 100 may be temporarily or permanently deactivated such that user authentication by the user device 1210 is required to cause the user device 1210 to send to the apparatus 100 an electronic signal that will release the user device 1210 and/or release an anchored apparatus 100 from the surface or object to which it is anchored. User authentication may be by means of a user pin, password, biometric reading, etc., for unlocking the user device 1210 and/or a separate user pin, password, biometric reading, etc., for unlocking the app.
In some implementations, the apparatus 100 may be in communication with one or more servers 1230 via a communication link 1299b. The server 1230 may be local to the apparatus 100 (e.g., in a same room or building and in communication via a direct wired or wireless link). The server 1230 may be remote from the apparatus 100 (e.g., in another room or building, in the cloud, and/or in communication via the network 199). The server 1230 may facilitate communication between one or more apparatus 100 and one or more user device 1210. In some implementations, the server 1230 may host a web app or other user-facing software that may facilitate binding/pairing between apparatus 100 and a user device 1210, provide status information regarding an apparatus 100 to a user device 1210 (e.g., location information, lock/unlock events, movement, etc.), and/or remote locking/unlocking of cables 120 and/or anchor mechanisms. A “server” as used herein may refer to a traditional server as understood in a server/client computing structure but may also refer to a number of different computing components that may assist with the operations discussed herein. For example, a server may include one or more physical computing components (such as a rack server) that are connected to other devices/components either physically and/or over a network and is capable of performing computing operations. A server may also include one or more virtual machines that emulates a computer system and is run on one or across multiple devices. A server may also include other combinations of hardware, software, firmware, or the like to perform operations discussed herein. The server(s) may be configured to operate using one or more of a client-server model, a computer bureau model, grid computing techniques, fog computing techniques, mainframe techniques, utility computing techniques, a peer-to-peer model, sandbox techniques, or other computing techniques.
Computer instructions for operating the controller 330 and its various components may be executed by the processor(s) 1204, using the memory 1206 as temporary “working” storage at runtime. A device's computer instructions may be stored in a non-transitory manner in non-volatile memory 1206, data storage component 1208, or an external device(s). Alternatively, some or all of the executable instructions may be embedded in hardware or firmware on the respective device in addition to or instead of software.
The controller 330 may include input/output device interfaces 1202. A variety of components may be connected through the input/output device interfaces 1202, as will be discussed further below. Additionally, the controller 330 may include an address/data bus 1224 for conveying data among components of the respective device. Each component within the controller 330 may also be directly connected to other components in addition to (or instead of) being connected to other components across the data bus 1224.
In some implementations, the controller 330 may transmit status information periodically and/or upon request. For example, the controller 330 may generate wireless electronic signal indicating whether the modular security apparatus 1300 is locked or unlocked (e.g., to a device 101) and/or anchored or unanchored. The controller 330 may indicate whether one or both fastener modules are attached to/detached from the controller module 1330. The controller 330 may indicate the status of individual electromechanical components of the modular security apparatus 1300 (e.g., whether in the controller module 1330 or one of the fastener modules). The controller 330 may indicate whether it detects the presence and/or proximity of a key fob 1240 and/or other authorized device. The user device 1210 may receive the indication directly (e.g., by receiving the wireless electronic signal) and/or indirectly (e.g., via the server 1230 or another device 1210).
The controller 330 may include input/output device interfaces 1202 that connect to a variety of components such as an accelerometer and/or vibration sensor 1212 (e.g., to detect tampering with the apparatus 100), a global-positioning system (GPS) 1214 component for determining a location of the apparatus 100, and/or the antenna(s) 1222. In some implementations, the input/output device interfaces 1202 may connect to additional components such as a fingerprint reader, scanner, and/or camera for biometric identification which may, in some implementations, be used as an additional or alternative method of unlocking the apparatus 100 from a secured device 101 and/or an anchor surface or other fixed object. In some implementations, the input/output device interfaces 1202 may connect to a speaker and/or microphone.
Via the antenna(s) 1222, the input/output device interfaces 1202 may connect to one or more networks 199 via communication links 1299 such as a radio-frequency (RF) wireless local area network (WLAN) using Wi-Fi, Bluetooth, near-field communication (NFC), and/or a low power wide area network (LPWAN) using Long-Range (LoRa), LoRaWAN, or Chirp Spread Spectrum (CSS), as well as a wireless network radio capable of communication with a wireless communication network such as a Long-Term Evolution (LTE) network, WiMAX network, 3G network, 4G network, 5G network, etc. A wired connection such as Ethernet or USB may also be supported. Through the network(s) 199, the system may be distributed across a networked environment. The I/O device interface 1202 may also include communication components that allow data to be exchanged with internet-of-things (IoT) edge computing devices, or between devices such as different physical servers in a collection of servers or other components.
The controller module 1330 may include components for powering the various functions of the modular security apparatus 1300. For example, the controller module 1330 may include a battery 1335, which may be charged by a power adapter 1336 receiving power from a USB connector 1334. In some implementations, the modular security apparatus 1300 may be configured such that the USB connector 1334 is accessible only when the modular security apparatus 1300 is disassembled; for example, by positioning the USB connector 1334 on a surface of the controller module 1330 that is covered by one of the fastener modules when the modular security apparatus 1300 is assembled. This may prevent access to the USB connector 1334 when the modular security apparatus 1300 is locked, thereby enhancing the security of the modular security apparatus 1300. In some implementations, the controller module 1330 may be configured such that the USB connector 1334 receives power only and not data. This may enhance the security of the modular security apparatus 1300 by preventing hacking via a wired digital connection to the controller 330, while still allowing charging of the battery 1335 when the modular security apparatus 1300 is locked. In this manner, the user will not be prevented from unlocking the modular security apparatus 1300 (e.g., via one or more lock/release mechanisms 1332) if the battery 1335 does not have enough charge to release any of the locking mechanisms. In some implementations, the modular security apparatus 1300 may be configured such that the battery 1335 located within the controller module 1330, provides power to one or more fastener modules 1410/1420 when one or more of the fastener modules 1410/1420 are locked onto the controller module 1330 within the modular security apparatus 1300.
The lock/release mechanisms 1332 may include one or more devices configured to lock and/or release an object of value such as a device 101, lock and/or release one or more fastener modules 1410/1420 of the modular security apparatus 1300 with respect to each other, and/or lock and/or release the modular security apparatus 1300 to/from the anchor surface 700 and/or other fixed or immovable object. For example, various lock/release mechanisms 1332 may include, for example and without limitation, a solenoid, motor, valve, gas generating cell, etc. In some cases, the lock/release mechanism 1332 may be in a fastener module and controlled by the controller 330 via electrodes on the modular security apparatus 1300 and fastener module 1410/1420, where the electrodes are brought into electrical communication when the controller module 1330 and fastener module are attached to one another (e.g., via the twist-lock mechanism illustrated in
Although the modular security apparatus 1300 illustrated in
In some implementations, the modular security apparatus 1300 may be programmed to recognize an authorized user when a transmitting device such as the proximal device 1210a and/or the key fob 1240 is in local proximity to the modular security apparatus 1300. As part of a set-up procedure, the authorized user may physically activate a feature in the modular security apparatus 1300 that causes the controller 330 to enter a binding mode that allows pairing between the controller 330 (e.g., via the antenna(s) 1222) and the transmitting device (e.g., using an app on a mobile phone, tablet, smart watch, laptop, etc.). Once the modular security apparatus 1300 and the transmitting device are communicatively coupled via a communication link 1299, the authorized user may operate the transmitting device to instruct the controller 330 to store the unique radio-frequency identifier (RFID) of the authorized user's transmitting device (e.g., the user device 1210a and/or the key fob 1240) in its non-volatile memory.
In some implementations, the controller 330 may be programmed to periodically broadcast its unique RFID and to scan for other radio frequency signals (e.g., a Bluetooth identifier and/or other identifier) from transmitting devices. A transmitting device may also broadcast its unique RFID periodically and/or on command and scan for other radio frequency signals. When the authorized user carries the transmitting device in local proximity to the modular security apparatus 1300 (e.g., as shown by the key fob 1240 and/or proximal user device 1210a in
In some implementations, the transmitting device (the key fob 1240 and/or user device 1210a) may remember an RFID of the controller 330. This procedure also works for multiple modular security apparatus 1300 and multiple transmitting devices, with each device (e.g., the modular security apparatus 1300 and the transmitting device) storing the unique RFID of those other devices with which it has been paired.
In some implementations, the controller 330 may execute different software programs or defined protocols using this proximity-based information. For example, the controller 330 may additionally or alternatively communicate over the network(s) 199 to communicate with a server 1230 and/or pair with a user device 1210b that is remote from the apparatus 100.
In some implementations, the controller 330 may be paired with an authorized user's device 1210, such that apparatus recognizes when the authorized user is present in the local proximity or absent and remote, as illustrated by the communication link 1299a. Based on that information, the controller 330 may be programmed to allow or deny attempts to unlock the fastener modules, cables 120, and/or anchor mechanism by an unauthorized user who does not have the properly recognized unique RFID of the authorized user's device 1210 and/or key fob 1240. In this case, the authorized RFID pairing can act as a proximity-based electronic key in a single factor authentication protocol, or can act as an additional proximity-based factor within a multi-factor authorization or identity authentication security protocol.
In some implementations, the controller 330 may be paired with a device such as a smart home device (e.g., a smart speaker), desktop computer, proximal user device 1210a, in-home/in-office server 1230, etc. that may be configured as a room monitoring device. Such a room monitoring device may be configured to run an application or app that uses communication facilities of the room monitoring device to regularly (e.g., continually, periodically, occasionally, etc.) monitor for the RFID of the controller 330 in its local proximity. If the room monitoring device detects that the controller 330 has been removed from the local proximity of the room monitoring device, the application or app running on the room monitoring device may report the absence of the apparatus to the authorized user's device 1210b (e.g., via the server 1230 and/or the communication links 1299d and 1299e). The controller 330 and/or the room monitoring device may further alert the user device 1210b if other tampering of the modular security apparatus 1300 is detected; for example, by movement using the accelerometer/vibration sensor 1212 and/or GPS module 1214.
In some implementations, the controller 330 and/or the controller module 1330 may also include an accelerometer/vibration sensor 1212 and/or GPS module 1214 (e.g., as shown in
In some implementations, the controller module 1330 may be configured with one or more electronic authentication mechanisms, such as a fingerprint scanner and/or other biometric scanner (e.g., using face recognition, iris recognition, voice recognition, etc.). Fingerprint scanning may provide an easy alternative manner of unlocking the modular security apparatus 1300 from the device 101 and/or an anchor. In some implementations, the modular security apparatus 1300 may be configured to unlock via a positive fingerprint read only if the proximity detection feature confirms the presence of an authorized individual as confirmed by recognizing the unique RFID of a previously paired and authorized user device 1210.
In some implementations, the modular security apparatus 1300 may be used to secure a user device 1210 that is configured to operate the modular security apparatus 1300. In such cases, proximity-based control of the modular security apparatus 1300 may be temporarily or permanently deactivated such that user authentication by the user device 1210 is required to cause the user device 1210 to send to the modular security apparatus 1300 an electronic signal that will release the user device 1210 and/or release an anchored modular security apparatus 1300 from the surface or object to which it is anchored. User authentication may be by means of a user pin, password, biometric reading, etc., for unlocking the user device 1210 and/or a separate user pin, password, biometric reading, etc., for unlocking the app.
In some implementations, the controller module 1330 may be in communication with one or more servers 1230 via a communication link 1299b. The server 1230 may be local to the modular security apparatus 1300 (e.g., in a same room or building and in communication via a direct wired or wireless link). The server 1230 may be remote from the modular security apparatus 1300 (e.g., in another room or building, in the cloud, and/or in communication via the network 199). The server 1230 may facilitate communication between one or more modular security apparatus 1300 and one or more user device 1210. In some implementations, the server 1230 may host a web app or other user-facing software that may facilitate binding/pairing between apparatus 100 and a user device 1210, provide status information regarding a modular security apparatus 1300 to a user device 1210 (e.g., location information, lock/unlock events, movement, etc.), and/or remote locking/unlocking of fastener modules, cables 120, and/or anchor mechanisms. A “server” as used herein may refer to a traditional server as understood in a server/client computing structure but may also refer to a number of different computing components that may assist with the operations discussed herein. For example, a server may include one or more physical computing components (such as a rack server) that are connected to other devices/components either physically and/or over a network and is capable of performing computing operations. A server may also include one or more virtual machines that emulates a computer system and is run on one or across multiple devices. A server may also include internet of things edge computing devices or other combinations of hardware, software, firmware, or the like to perform operations discussed herein. The server(s) may be configured to operate using one or more of a client-server model, a computer bureau model, grid computing techniques, fog computing techniques, mainframe techniques, utility computing techniques, a peer-to-peer model, edge computing, sandbox techniques, or other computing techniques.
The modular security apparatus 1300 may include a controller module and one or more fastener modules that may be releasably attached to each other. A first fastener module may be configured to secure a personal electronic device, such as the device 101 shown in
The controller module 1330 may be configured to electronically actuate the lock/release mechanisms of one or both of the fastener modules 1410, 1420. For example, the controller 330 may, upon verifying an electronic signal as previously described, may send an electronic signal to electrode(s) 1414 arranged on a surface of the controller module 1330. When the first fastener module 1410 is attached to the controller module 1330, electrode(s) 1412 arranged on a surface of the first fastener module 1410 may make contact and form an electrical connection between the controller module 1330 and the first fastener module 1410. The electronic signal may actuate a lock/release mechanism of the first fastener module 1410 to, for example, cause the solenoid 348 to retract the plunger 344 from teeth of the gear 646, allowing the cables to be released (e.g., to release the device 101 and/or lengthen the cables to wrap around the device 101). Similarly, the controller 330 may send an electronic signal to electrode(s) 1416 arranged on a second surface of the controller module 1330. When the second fastener module 1420 is attached to the controller module 1330, electrode(s) 1418 arranged on a surface of the second fastener module 1420 may make contact and form an electrical connection between the controller module 1330 and the second fastener module 1420. The electronic signal may actuate a lock/release mechanism of the second fastener module 1420 to, for example, actuate the cell/valve 840 to allow gas to flow into the suction cup, thereby releasing it from the anchor surface. Although the example implementation in
Similarly, the controller module may include a solenoid 1550 and a plunger 1546 configured to extend into the fastener module 1420 to actuate the cell/valve 840. To release the modular security apparatus 1300 from the anchor surface 700, the controller 330 may send an actuation signal to the solenoid 1550, causing the solenoid 1550 to extend the plunger 1546 to actuate the cell/valve 840, thereby releasing gas into the suction cup and releasing the modular security apparatus 1300 from the anchor surface 700.
In some implementations, the modular security apparatus 1300 may include a combination of the lock/release mechanisms shown in
The second fastener module 1420 may include a cavity 1690, channel 1650, ridge 1660, and gap 1670 that may be the same or similar to the cavity 1600, channel 1610, ridge 1620, and gap 1630, allowing a second tab 1680 of the controller module 1330 to pass into the cavity 1690 and past the ridge 1660 when the controller module 1330 and the second fastener module 1420 are brought together. In some implementations, the position of the tabs and cavities may be reversed with respect to the controller module 1330 and one or both of the fastener modules 1410, 1420. In some implementations, the controller module 1330 may include two cavities while the fastener modules 1410, 1420 include tabs, or vice versa.
In
In another example, the controller module 1330 may include an electromagnet and/or permanent magnet configured to attract a moving component from a fastener module such that it engages with a cavity or protrusion of the controller module 1330. The magnet/moving component mechanism may be similar to a solenoid/plunger mechanism; but rather than having the electromagnet and plunger in the same module, the electromagnet may be disposed within the controller module 1330 while the moving component is disposed in the fastener module 1410 and/or 1420. The moving component may be a pin, a hook (e.g., that rotates into position to catch a surface of a cavity or protrusion in the controller module 1330), a hinged plate that can rotate to engage with the cavity or protrusion, and/or take various other configurations. The moving component may be magnetic or ferromagnetic such that it is attracted by the permanent magnet or electromagnet disposed in and/or on the controller module 1330. To release the moving component and allow separation of the modules, the controller 330 may release the electromagnet or, if the moving component is attracted by a permanent magnet, the controller 330 may activate an electromagnet to counteract the attraction of the permanent magnet to release the moving component.
The pins 1844, 1846 may be accessed when the bottom surface of the controller module 1330 or second fastener module 1420, respectively, is exposed. When the modular security apparatus 1300 is anchored to the anchor surface 700, however, access to the pin 1846 is blocked and the pin 1846 cannot be retracted from the cavity 1856. This may prevent the controller module 1330 from being removed from the second fastener module 1420 as long as the second fastener module 1420 is anchored to the anchor surface 700. Similarly, when the second fastener module 1420 is attached to the controller module 1330, access to the pin 1844 is blocked and the pin 1844 cannot be retracted from the cavity 1754. This may prevent the first fastener module 1410 from being removed from the controller module 1330 as long as the controller module 1330 is attached to the second fastener module 1420. Therefore, to disassemble the modular security apparatus 1300, the modular security apparatus 1300 must first be unanchored from the anchor surface 700 as shown in
Once the modular security apparatus 1300 is unanchored, a user may access the pin 1846 and remove it from the cavity 1856. This may allow the second fastener module 1420 to be rotated with respect to the controller module 1330 and detached as shown in
In some implementations, the modular security apparatus 1300 may secure the controller module 1330 and faster modules 1410 and/or 1420 in various other ways including the use of an electronically releasable surface treatment on one or more of the mating surfaces between the modules. For example, a surface of the controller module 1330 may include the electrically or electronically controlled barbs (e.g., similar to those discussed previously with reference to
In the example shown in
Similar to the cables 120, the brackets 2020 may protrude from the housing 1411 and be retained by a one-way locking mechanism within the housing 1411. For example, the one-way locking mechanism may include a pawl 2034 that engages with teeth of a gear 2036. This may allow a user to close the brackets 2020 around the device 101 until the device is secured by the hooks 2022. The user may release the device 101 from the fastener module 1410 (and the modular security apparatus 1300) by sending a wireless electronic signal to the modular security apparatus 1300. Upon verifying the wireless electronic signal, the controller 330 may actuate the pawl 2034 (e.g., by sending an electric signal to a solenoid, motor, etc. connected to the pawl 2034) to cause the pawl 2034 to disengage from the gear 2036 and allow the bracket 2020 to move, and a corner of the device 101 to be removed from the hook 2022. In some implementations, both brackets 2020 may be configured with a one-way locking mechanism. In some implementations, one of the brackets 2020 may be fixed while the other may be electronically releasable using a one-way locking mechanism. In some implementations, one or more of the brackets 2020 may be electronically releasable by other means; for example, using a solenoid and plunger to engage with the gears in a manner similar to the mechanism that locks the spool/pully 332 illustrated in
It is to be appreciated that embodiments of the systems and methods discussed herein are not limited in application to the details of construction and the arrangement of components set forth in this description or illustrated in the accompanying drawings. The methods and apparatuses are capable of implementation in other embodiments and of being practiced or of being carried out in various ways. Examples of specific implementations are provided herein for illustrative purposes only and are not intended to be limiting. In particular, acts, elements and features discussed in connection with any one or more embodiments are not intended to be excluded from a similar role in any other embodiments.
Also, the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. Any references to embodiments or elements or acts of the systems and methods herein referred to in the singular may also embrace embodiments including a plurality of these elements, and any references in plural to any embodiment or element or act herein may also embrace embodiments including only a single element. References in the singular or plural form are not intended to limit the presently disclosed systems or methods, their components, acts, or elements. The use herein of “including,” “comprising,” “having,” “containing,” “involving,” and variations thereof is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. References to “or” may be construed as inclusive so that any terms described using “or” may indicate any of a single, more than one, and all of the described terms. Any references to front and back, left and right, top and bottom, upper and lower, and vertical and horizontal are intended for convenience of description, not to limit the present systems and methods or their components to any one positional or spatial orientation.
Item 1. A modular electronically releasable security apparatus comprising:
Item 2. The modular electronically releasable security apparatus of item 1, further comprising:
Item 3. The modular electronically releasable security apparatus of item 2, the one or more processors further configured to, upon verification of a third wireless electronic signal, actuate the third electromechanical component to release the first fastener module, thereby allowing movement of the first fastener module with respect to the controller module in the first direction.
Item 4. The modular electronically releasable security apparatus of item 3, wherein moving the first fastener module with respect to the controller module in the first direction allows the controller module to be detached from the first fastener module.
Item 5. The modular electronically releasable security apparatus of item 4 wherein the first direction is a rotational direction.
Item 6. The modular electronically releasable security apparatus of item 1, further comprising:
Item 7. The modular electronically releasable security apparatus of item 5, the one or more processors further configured to, upon verification of a third wireless electronic signal, actuate the third electromechanical component to release the second fastener module, thereby allowing movement of the second fastener module with respect to the controller module in the first direction.
Item 8. The modular electronically releasable security apparatus of item 7, wherein moving the second fastener module with respect to the controller module in the first direction allows the second fastener module to be detached from the controller module.
Item 9. The modular electronically releasable security apparatus of item 8 wherein the first direction is a rotational direction.
Item 10. The modular electronically releasable security apparatus of item 1, further comprising:
Item 11. The modular electronically releasable security apparatus of item 10, the controller module further comprising:
Item 12. The modular electronically releasable security apparatus of item 11, wherein moving the first fastener module with respect to the controller module in the first direction allows the controller module to be detached from the first fastener module.
Item 13. The modular electronically releasable security apparatus of item 12 wherein the first direction is a rotational direction.
Item 14. The modular electronically releasable security apparatus of item 11, wherein the second fastener module, when attached to the controller module, blocks access to the second end.
Item 15. The modular electronically releasable security apparatus of item 1, further comprising:
Item 16. The modular electronically releasable security apparatus of item 15, the controller module further comprising:
Item 17. The modular electronically releasable security apparatus of item 16, wherein moving the second fastener module with respect to the controller module in the first direction allows the second fastener module to be detached from the controller module.
Item 18. The modular electronically releasable security apparatus of item 17 wherein the first direction is a rotational direction.
Item 19. The modular electronically releasable security apparatus of item 16, wherein the second fastener module, when anchored to the fixed object, blocks access to the second end.
Item 20. The modular electronically releasable security apparatus of item 1, further comprising:
Item 21. The modular electronically releasable security apparatus of item 20, the first fastener module further comprising:
Item 22. The modular electronically releasable security apparatus of item 21, wherein the first loop wraps around a first portion of the portable item and the second loop wraps around a second portion of the portable item, thereby securing the portable item.
Item 23. The modular electronically releasable security apparatus of item 22, wherein releasing the first locking mechanism allows the movement of the first cable through the first opening to increase a length of the first cable that forms the first loop.
Item 24. The modular electronically releasable security apparatus of item 1, further comprising:
Item 25. The modular electronically releasable security apparatus of item 24, the first fastener module further comprising:
Item 26. The modular electronically releasable security apparatus of item 25, wherein the first bracket engages with a first portion of the portable item and the second bracket engages with a second portion of the portable item, thereby securing the portable item.
Item 27. The modular electronically releasable security apparatus of item 26, wherein releasing the first locking mechanism allows the movement of the first bracket through the first opening to increase a distance between the first end and the third end.
Item 28. A method comprising:
Item 29. The method of item 28, further comprising:
Item 30. The method of item 28, further comprising:
Item 31. The method of item 28, further comprising:
Item 32. The method of item 28, further comprising:
This application is a continuation-in-part of U.S. patent application Ser. No. 18/207,830, filed Jun. 9, 2023, entitled “ELECTRONICALLY RELEASABLE APPARATUS,” the entire contents of which are incorporated herein by references for all purposes.
Number | Date | Country | |
---|---|---|---|
Parent | 18207830 | Jun 2023 | US |
Child | 18983611 | US |