The present disclosure relates generally to peer-to-peer object sharing, and in particular, to bike sharing and rental.
With the high growth of urban population and the number of automobiles, cycling has become a popular mobility option for short distance urban travel. To discourage automobile dependence and encourage cycling, geographically dense communities such as cities and/or college campuses, have adopted bicycle sharing systems.
The bicycle sharing systems typically employ a locking station or rental kiosk. In these systems, credit card payments can be made through the rental kiosk based on the selected bicycle and rental duration. Solar panels is typically use to power these rental stations along with backup batteries to ensure reliability in case of power outage. In addition, bicycle stations must maintain a wireless communication link to an administration server to perform the payment transaction and remote monitoring. Such station-based bicycle rental systems require installation of expensive infrastructure, and incur high land acquisition costs as well as wireless data subscription fees.
The excessive cost and the amount of work and operation necessary to set up and start each station severely limit growth and prevent scalability of these systems. Moreover, users have to return the bicycles to specific locations/stations only.
Other alternative station-less bicycle rental systems typically employ a lock which includes a lock box and U-shaped retainer mounted and attached to each bicycle to secure the bicycle to any generic bicycle rack. The bicycles are equipped with a Global Positioning system (GPS) device for tracking. In addition, the bicycles include a solar panel or an internal dynamo hub (generator) along with a rechargeable battery to power the electronics and the lock. Each of the bicycles must maintain a constant wireless data connection over mobile communication network to the administration server.
Although such station-less bicycle sharing systems incur less setup and infrastructure installation costs, they yet require a separate GPS tracking device, battery, solar panel or internal hub dynamo for each bicycle. The mobile data connection also imposes recurring data subscription fees for each bicycle.
The present disclosure removes the aforementioned down-sides from bike sharing systems and dramatically reduces bike sharing implementation cost.
A lock according to one embodiment includes, in part, a shackle, a first housing, and a second housing that is positioned within the first housing. The shackle has a first and a second ends. The first housing has a first and a second side openings which are configured to receive the first and second ends of the shackle, respectively. The second housing includes, in part, a battery recess configured to receive a battery, a motor assembly, a locking cam, a motor control and a sensor. The motor assembly is positioned within a motor assembly recess of the second housing. The motor assembly includes a rotatable shaft that is drivable by the motor. The locking cam is coupled to the rotatable shaft and includes a first protuberance. The locking cam is rotatable between a locked position in which the first protuberance locks the first end within the first opening, and an unlocked position in which the first protuberance unlocks the first end within the first opening. The motor control circuitry is communicatively coupled to the motor. In one embodiment, the motor control circuitry includes a transceiver and a push button. The sensor (e.g., a Hall effect sensor) is positioned adjacent to the locking cam and is communicatively coupled to the motor control circuitry.
In one embodiment, the second housing further includes a removable, conductive battery cover. The battery cover electrically couples the battery and the motor control circuitry when the recess cover is removably attached to the second housing. In one embodiment, the first housing further includes one or more end openings configured to receive one or more end caps. In one embodiment, the lock further includes, a press-fit disc disposed within the first housing and between the locking cam and an end opening of the first housing. In one embodiment, the first end of the shackle includes a boss and the second end of the shackle is bent.
In one embodiment, the second housing further includes a second protuberance positioned on an exterior surface of the second housing. The second protuberance is configured to limit a range of rotation of the locking cam when the shaft is driven by the motor and a notch of the locking cam contacts the second protuberance. In one embodiment, the second housing is positioned between the first and the second side openings of the first housing.
A lock, according to one embodiment includes, in part, a shackle having first and second ends, a first housing and a second housing which is housed within the first housing. The first housing has first and second side openings which are configured to receive the first and second ends of the shackle, respectively. The second housing includes a battery, a motor assembly, a locking cam, a motor control circuitry and a sensor. The motor assembly includes a rotatable shaft drivable by a motor of the motor assembly. The locking cam is coupled to the rotatable shaft and includes a first protuberance. The locking cam is rotatable between a locked position where the first protuberance locks the first end within the first opening and an unlocked position where the first protuberance unlocks the first end within the first opening.
In one embodiment, the motor control circuitry is communicatively coupled to the motor. The motor control circuitry includes at least one of a transceiver and a push button. The push button is accessible via first and second button holes in the first and second housings, respectively. The sensor is positioned adjacent to the locking cam and is communicatively coupled to the motor control circuitry. The sensor is configured to determine whether the locking cam is in the locked position or the unlocked position. In one embodiment, upon receiving a user input at the motor control circuitry, the motor control circuitry instructs the motor to rotate the locking cam via the shaft to the locked position when the sensor determines that the locking cam is in the unlocked position. Similarly, the locking cam is rotated to the unlocked position when the sensor determines that the locking cam is in the locked position.
In one embodiment, the user input corresponds to at least one of a wireless communication received by the transceiver and a depression of the push button. In one embodiment, the motor includes a gearbox. In one embodiment, the motor control circuitry includes a microprocessor. In one embodiment, the transceiver is configured to exit a power sleep mode upon receiving an input. In one embodiment, the input corresponds to at least one of a depression of the push button and physically touching the lock.
Certain embodiments provide a method of sharing a bike. The method includes, in part, initializing a session on a lock in response to an input from a user. The lock being adapted to enable/disable operation of the bike when engaged with the bike. The method further includes, in part, causing a mobile device associated with the user to communicate with the lock in response to the initialization, accessing a server via the mobile device to verify if the mobile device is authorized to operate the lock, and causing the lock to open if the mobile device is authorized to operate the lock. When the lock is opened, the user is enabled to operate and ride the bike in accordance with a predefined agreement, such as a rental agreement.
In one embodiment, the mobile device communicates with the lock using a short-range wireless communication method. In one embodiment, the mobile device receives one or more parameters from the lock and transmits the one or more parameters to a server. The server verifies if the mobile device is authorized to operate the lock based at least on the one or more parameters. In one embodiment, the method further includes deactivating the lock if the session takes longer than a predefined time duration.
An understanding of the nature and advantages of various embodiments may be realized by reference to the following figures. In the appended figures, similar components or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label by a dash and a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments or designs.
As used herein, the term “base station” includes any wireless communication station and/or device, typically installed at a fixed terrestrial location and used to facilitate communication in a wireless communications system. For example, a base station may comprise a wireless local area network (WLAN) access point, eNode B, Node B, or the like.
As used herein, the term “mobile device” refers to a device that may from time to time have a position location that changes. For example, a mobile device may comprise a cellular telephone, wireless communication device, user equipment, laptop computer, a personal communication system (PCS) device, personal digital assistant (PDA), personal audio device (PAD), portable navigational device, and/or other portable communication devices.
Certain embodiments describe an object sharing system with a minimal implementation and set up cost. In general, the objects may be any kind of moving devices and/or vehicles such as bikes (e.g., bicycles, motor bikes, etc.), mopeds, boats, cars, and the like. With the abundance of mobile devices equipped with integrated GPS tracking devices, short range radios such as Bluetooth and near field communication (NFC) interfaces, and availability of wireless data subscription on most mobile devices, the present disclosure eliminates the need to mount and integrate these components into the object sharing system. Instead, the infrastructure is shifted to the users' mobile phones and/or devices to create a much simpler system.
A portable lock according to one embodiment is capable of communicating with a mobile device. The mobile device communicates with an administration server through internet and/or data connection to gain authorization to open/close the lock. The lock includes one or more interlocking pieces that can be secured to an object. For example, the lock can be used to secure a bike to a pole. The lock may also include a U-shaped shackle and a tube. In addition, the lock includes an electric actuator, microcontroller, a short range radio module, and a battery. In one embodiment, a mobile device interacts with the lock and a remote administration server.
One embodiment creates a platform for peer-to-peer bike sharing and opens a new market for individuals and/or groups of people to rent or share objects, such as bikes. For example, college students can decide to collaboratively share their bicycles with other students while the bicycles are not in use. As an example, each user can purchase a lock and register the lock and his or her bicycle with the administration server through a web interface. The users can set a rental price on each bicycle and get compensated through an integrated payment service managed by the remote administration server when their bicycles are used by other people. Also, owners can devise a custom policy on return locations, or create virtual kiosks and stations for each bicycle or a group of bicycles. For example, mobility can get financially incentivized through a dynamic pricing system based on different parameters such as pick-up and drop-off locations, rental time, duration and the like.
At step 202, the lock generates a unique session challenge number. The challenge number can be generated using any technique. As an example, a true random number generator generates a random number that can be used as the challenge number. At step 204, the lock attempts to establish a radio connection to a mobile device in its vicinity. According to one embodiment, if the lock is unable to establish a connection with the mobile device within a pre-specified period of time (step 205), the session expires and the lock refuses to accept any response. After the session is expired, the lock goes back into deep sleep mode to conserve battery energy.
Once the radio connection is established with a mobile device, at step 206, the lock transmits the generated session challenge number along with the lock unique identification number to the mobile device. The lock then waits for a response from the mobile device. If the lock does not receive a valid response from the mobile device within the pre-specified time frame (at 210), the session expires by refusing to accept any further response.
If the received response from the mobile device is valid (at 212), the lock accepts “lock” or “unlock” commands from the mobile device for a predefined time duration as long as the connection is maintained (step 214). It should be noted the lock may use any other method to authenticate a mobile device, and the steps presented in
At 306, the mobile device checks its local memory and/or cache to determine if the secret key of the lock is locally stored on the mobile device. If yes, the mobile device is authorized to provide input to the lock (e.g., with the unique identification number). At 308, the mobile device generates a response based on secret key of the lock if the secret key is found in the local memory of the mobile device. At 312, if a cached secret key is not found, the mobile device sends a message to the administration server over the internet and/or through data service. In one embodiment, the message includes the session challenge, the lock serial number, and one or more user parameters such as user's location obtained from the phone's GPS tracking device, and the like.
The remote administration server upon the receipt of the message from the mobile device, check a database to determine whether the user is authorized to perform the requested lock/unlock action. In one embodiment, a user may be authorized to perform lock/unlock operations on the lock at specific locations and during specific time frames based on the bicycle's availability and/or permissions set by the owner. If the user is authorized to perform the requested actions, then the lock's secret key is retrieved from the database and a response is generated at the remote server. At 314, the mobile device receives the response from the remote server. At 310, the mobile device sends the response (e.g., either the response generated by the mobile device or the response received from the server) to the lock over the short range radio interface.
Both the shackle 480 and the tube 432 are made from strong substances to provide high resistance to any attempt to cut through the lock with a cutting device such as a bolt cutter, a hacksaw and the like. In this example, the shackle is U-shaped, however, in general, the shackle in the lock can have any form (e.g., D-shaped or even a non-uniform shape such as a set of interlocked chains) without departing from the teachings of the present disclosure. The shackle 480 has a pair of parallel legs 481 and 482 of substantially the same length. The leg 481 terminates in a bent end 438 which is curved outwardly. The leg 482 is straight and terminates in a cutaway section 444 with an inwardly facing boss 442 in the middle of the cutaway section.
In one embodiment, the boss 442 is a cylindrical protuberance that allows free rotational movement of the cam 402, as illustrated in
Two plugs 446 and 400 fit at both ends of the tube 432 as illustrated in
Referring back to
In one embodiment, the lock mechanism allows a user to replace the battery, if needed. The metal contact 418 on the cap 420 establishes an electrical connection between a terminal of the battery 417 and the spring loaded contact 416 on the motor controller circuit board 412 once the cap is screwed on the housing 500, as illustrated in
Hole 600 on the periphery of cam 402, as illustrated in
In one embodiment, solid pegs 422 and 424 sit on the top of buttons 416 and 415 and a translucent peg 426 sits on LEDs 411, respectively. Referring back to
In one embodiment, to replace the battery, the lock is released and the shackle is removed. After that the cap 420 at the end of the water proof housing 500 can be un-screwed and removed. Removing the cap allows the battery 417 to slide out of the tube 432. In one embodiment, a rescue power connector 409 is added to the lock to provide power to the lock in case the internal battery is depleted. The rescue power connector 409, as illustrated in
As illustrated in
In one embodiment, multiple apertures 435 are created on the tube to allow the electromagnetic radiation to pass through the tube walls. In one embodiment, surface of the tube is covered with a layer of watertight flexible plastic skin 448 to prevent water from reaching the openings on the surface of the tube and damage the electronics.
At 1506, a server is accessed via the mobile device to verify if the mobile device is authorized to operate the lock. For example, the one or more parameters that are received from the lock are transmitted to a server for authorization. The server then verifies if the mobile device is authorized to operate the lock by searching a database. If there is a match between the parameters associate with the user and the parameters associated with the lock, then the user is allowed to unlock the lock and use the secured bike. At 1508, the lock is caused to open if the mobile device is authorized to operate the lock. Therefore, the user is enabled to operate and ride the bike in accordance with a predefined agreement (e.g., rental agreement and the like). According to one embodiment, the lock is deactivated if the session takes longer than a predefined time duration.
Various embodiments of the present invention can be implemented in the form of logic in software or hardware or a combination of both. The logic may be stored in a computer readable or machine-readable non-transitory storage medium as a set of instructions adapted to direct a processor of a computer system to perform a set of steps disclosed in embodiments of the present invention. The logic may form part of a computer program product adapted to direct an information-processing device to perform a set of steps disclosed in embodiments of the present invention. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the present invention.
The data structures and code described herein may be partially or fully stored on a computer-readable storage medium and/or a hardware module and/or hardware apparatus. A computer-readable storage medium includes, but is not limited to, volatile memory, non-volatile memory, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs), DVDs (digital versatile discs or digital video discs), or other media, now known or later developed, that are capable of storing code and/or data. Hardware modules or apparatuses described herein include, but are not limited to, application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), dedicated or shared processors, and/or other hardware modules or apparatuses now known or later developed.
The methods and processes described herein may be partially or fully embodied as code and/or data stored in a computer-readable storage medium or device, so that when a computer system reads and executes the code and/or data, the computer system performs the associated methods and processes. The methods and processes may also be partially or fully embodied in hardware modules or apparatuses, so that when the hardware modules or apparatuses are activated, they perform the associated methods and processes. The methods and processes disclosed herein may be embodied using a combination of code, data, and hardware modules or apparatuses.
The above descriptions of embodiments of the present invention are illustrative and not limitative. Other modifications and variations will be apparent to those skilled in the art and are intended to full within the scope of the appended claims. For example, the shackle, cam, and the housings could have any shapes without departing from the teachings of the present disclosure.
The present application claims priority to Provisional Application No. 61/786,470, entitled “Peer-to-Peer Sharing System,” filed Mar. 15, 2013, which is assigned to the Assignee hereof and expressly incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
61786470 | Mar 2013 | US |