Portable lock with integrity sensors

Information

  • Patent Grant
  • 11879273
  • Patent Number
    11,879,273
  • Date Filed
    Friday, May 1, 2020
    4 years ago
  • Date Issued
    Tuesday, January 23, 2024
    4 months ago
Abstract
Disclosed herein are lock assemblies that include, in particular embodiments, a cable assembly, a housing, a sensor assembly, and a wireless transceiver. The cable assembly includes a cable having a sensor element disposed along its length, a first shackle pin on its first end, and a second shackle pin on its opposing end. The housing defines a first pinway for receiving the first shackle pin, a second pinway for receiving the second shackle pin, and a locking mechanism for securing the shackle pins to the housing. The sensor assembly is located within the housing and in communication with the cable assembly for sensing a cable type and a cable condition related to the cable assembly. The wireless transceiver is connected to a power source, in communication with the sensor assembly, and operated by a microcontroller within the housing.
Description
TECHNICAL FIELD

Certain disclosed embodiments relate to the field of portable locking devices.


BACKGROUND

Existing portable locking devices, such as padlocks, are generally limited to operation with a shackle that is permanently connected at one end to the lock body, or with one specific type of shackle element. Existing cables and cable-like shackle assemblies are equipped with only rudimentary sensors for monitoring and detecting the condition of the cable. Padlocks with wireless capability typically report condition using a simple, binary message (for example, Lock OK or Lock Not OK) and lack the capacity to transmit or receive signals in remote areas.


Thus, there is need in the art for improved portable locking devices.


SUMMARY

According to some embodiments, a lock assembly includes a cable assembly comprising a cable having a sensor element disposed along its length, a first shackle pin on its first end, and a second shackle pin on its opposing end; a housing defining a first pinway for receiving the first shackle pin, a second pinway for receiving the second shackle pin, and a locking mechanism for securing the shackle pins to the housing; a sensor assembly within the housing and in communication with the cable assembly for sensing a cable type and a cable condition related to the cable assembly; and a wireless transceiver connected to a power source, in communication with the sensor assembly, and operated by a microcontroller within the housing, wherein the transceiver is configured to communicate with a remote mobile device and a remote server.


According to some embodiments, a smart cable assembly includes a sensor element disposed along a length of cable, the sensor element comprising a resistive wire, carbon filaments, or a coaxial conductive element; and a cable sensor array in communication with a microcontroller and a power source, the sensory array comprising at least one of (a) a cable type sensor for detecting cable type and length, and (b) a cable status sensor for detecting cable integrity.


According to some embodiments, a secure mesh communication network includes one or more remote lock assemblies, each including a wireless transceiver and a microcontroller; an access system configured to allow a user to communicate with and select the one or more remote lock assemblies for participation in a defined mesh; and a mesh control system in communication with each the microcontroller and configured to coordinate and control a transfer of signals between and among the one or more remote lock assemblies, one or more remote servers, and one or more remote mobile devices, wherein the signals are encrypted or otherwise secured.





BRIEF DESCRIPTION OF THE DRAWING

Features of the various embodiments disclosed will become more apparent in the following detailed description, in which reference is made to the appended drawing figures, which are incorporated in and constitute a part of this specification, and wherein:



FIG. 1A is a diagram illustrating an exemplary network in which systems and methods consistent with the disclosed embodiments may be implemented.



FIG. 1B is a diagram illustrating an exemplary server, with which systems and methods consistent with the disclosed embodiments may be implemented.



FIG. 1C is a diagram illustrating a remote or mobile device, with which systems and methods consistent with the disclosed embodiments may be implemented.



FIG. 2 is a perspective illustration of an item of personal property, such as a kayak, secured by the cable of a lock assembly, according to particular embodiments.



FIG. 3 is a perspective illustration of a lock assembly with one or more LED lamp assemblies, according to particular embodiments.



FIG. 4 is a schematic illustration depicting the connections among and between a battery, antenna, sensors, microcontroller, interfaces, and communications modules for a lock assembly, according to particular embodiments.



FIG. 5 is a flow chart depicting the some of the steps for a lock assembly, according to particular embodiments.



FIG. 6 is a schematic illustration depicting the connections among and between a mobile device, a server, and a lock assembly, according to particular embodiments.



FIG. 7 is an illustration of a sample display screen on a mobile device, showing the pairing process, according to particular embodiments.



FIG. 8 is an illustration of a sample display screen on a mobile device, showing the status of selected lock assembly, according to particular embodiments.



FIG. 9 is an illustration of a sample display screen on a mobile device, showing the status of a number of lock assemblies, according to particular embodiments.





Corresponding reference numbers indicate corresponding parts or elements throughout the several views of the drawing.


DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS

The present systems and apparatuses and methods are understood more readily by reference to the following detailed description, examples, drawings, and claims, and their previous and following description. However, before the present devices, systems, and/or methods are disclosed and described, it is to be understood that this invention is not limited to the specific devices, systems, and/or methods disclosed unless otherwise specified, as such can, of course, vary. It is also to be understood that the terminology used herein is for the purpose of describing particular aspects only and is not intended to be limiting.


Like parts are marked throughout the following description and drawings with the same reference numerals. The drawings may not be to scale and certain features may be shown exaggerated in scale or in somewhat schematic format in the interest of clarity, conciseness, and to convey information.


The following description of the invention is provided as an enabling teaching of the invention in its best, currently known embodiment. To this end, those skilled in the relevant art will recognize and appreciate that many changes can be made to the various aspects of the invention described herein, while still obtaining the beneficial results of the present invention. It will also be apparent that some of the desired benefits of the present invention can be obtained by selecting some of the features of the present invention without utilizing other features. Accordingly, those who work in the art will recognize that many modifications and adaptations to the present invention are possible and can even be desirable in certain circumstances and are a part of the present invention. Thus, the following description is provided as illustrative of the principles of the present invention and not in limitation thereof.


As used throughout, the singular forms “a,” “an” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to a component can include two or more such components unless the context indicates otherwise.


Ranges can be expressed herein as from “about” one particular value, and/or to “about” another particular value. When such a range is expressed, another aspect includes from the one particular value and/or to the other particular value. Similarly, when values are expressed as approximations, by use of the antecedent “about,” it will be understood that the particular value forms another aspect. It will be further understood that the endpoints of each of the ranges are significant both in relation to the other endpoint, and independently of the other endpoint.


As used herein, the terms “optional” or “optionally” mean that the subsequently described event or circumstance may or may not occur, and that the description includes instances where said event or circumstance occurs and instances where it does not.


Computer System Overview


FIG. 1A illustrates an example of the basic components of a computer system 10 including an access system 60 for use in connection with a preferred embodiment. As shown, the system 10 includes a server 11 and one or more remote devices 15, 17, 18, 19, 20 including wireless mobile devices.


Each remote device 15, 17-20 includes applications and each device may have access to a local database 16. The server 11 includes applications and a database 12 that may be accessed by remote devices 15, 17-20 via connections 14(A-E), respectively, over a network 13. The server 11 runs administrative software for a computer network and controls access to itself and to the database 12. The remote devices 15, 17-20 may access the database 12 over a network 13. The network 13 may include but is not limited to the Internet, a local area network (LAN), a wide area network (WAN), a telephone line using a modem (POTS), Bluetooth, WiFi, cellular, optical, satellite, RF, Ethernet, magnetic induction, coax, RS-485, and the like, or other like networks. The server 11 may also be connected to the local area network (LAN) within an organization.


The remote devices 15, 17-20 may each be located at a location remote from the server 11. Remote devices 15, 17-20 include but are not limited to PCs, desktop computers, workstations, printers, WAP devices, non-WAP devices, and any of a variety of mobile computing devices such as handheld computers, laptop computers, tablet computers, personal digital assistants (PDAs), pagers, mobile telephone, and the like.



FIG. 1B is a block diagram illustrating the functional elements of a server 11, such as the one shown in FIG. 1A. The server 11 includes but is not limited to a workstation, desktop computer, PC, and any of a variety of mobile computer devices.


Generally, in terms of hardware architecture, as shown in FIG. 1B, the server 11 may include a processor 41, memory 42, and one or more input and/or output (I/O) devices (or peripherals) that are communicatively coupled via a local interface 43. The local interface 43 may be, for example, but is not limited to, one or more buses or other wired or wireless connections, as is known in the art. The local interface 43 may have additional elements to facilitate communications, which are omitted for simplicity, such as controllers, buffers (caches), drivers, repeaters, and receivers. Moreover, the local interface 43 may include address, control, and/or data connections to enable appropriate communications among the aforementioned components.


The processor 41 is a hardware device for executing software that can be stored in memory 42. The processor 41 can be virtually any custom-made or commercially available processor, a central processing unit (CPU), data signal processor (DSP), or an auxiliary processor, among several processors associated with the server 11, and a semiconductor based microprocessor (in the form of a microchip) or a macro-processor. Examples of suitable commercially available microprocessors include but are not limited to: an 80x86, Pentium series, or later-series microprocessor from Intel Corporation, a PowerPC microprocessor from IBM, a SPARC microprocessor from Oracle Corporation (formerly Sun Microsystems, Inc.), a PA-RISC series microprocessor from Hewlett-Packard Company, or a 68000 or 88000 series microprocessor from Freescale Semiconductor, Inc. (formerly Motorola, Inc.).


The memory 42 may include any one or combination of volatile memory elements (e.g., random access memory (RAM, such as dynamic random access memory (DRAM), static random access memory (SRAM), etc.)) and nonvolatile memory elements (e.g., ROM, erasable programmable read only memory (EPROM), electronically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), tape, compact disc read only memory (CD-ROM), disk, diskette, cartridge, cassette or the like, etc.). Moreover, the memory 42 may incorporate electronic, magnetic, optical, and/or other types of storage media. Note that the memory 42 can have a distributed architecture, where various components are situated remote from one another, but can be accessed by the processor 41.


The software in memory 42 may include one or more separate programs, each of which comprises an ordered listing of executable instructions for implementing logical functions. In the example illustrated in FIG. 1B, the software in the memory 42 includes a suitable operating system (O/S) 49 and one or more programs on the accounts system 100.


A non-exhaustive list of examples of a commercially available and suitable operating system 49 includes: (a) a Windows operating system available from Microsoft Corporation; (b) a Netware operating system available from Novell, Inc.; (c) a Macintosh operating system available from Apple Computer, Inc.; (d) a UNIX operating system, which is available for purchase from many vendors, such as the Hewlett-Packard Company, Sun Microsystems, Inc., and AT&T Corporation; (e) a LINUX operating system, which is freeware that is readily available on the Internet; (f) a run time Vxworks operating system from WindRiver Systems, Inc.; or (g) an appliance-based operating system, such as that implemented in handheld computers or personal data assistants (PDAs) (e.g., Symbian OS available from Symbian, Inc., PalmOS available from Palm Computing, Inc., and Windows CE available from Microsoft Corporation). The operating system 49 essentially controls the execution of other computer programs, such as the accounts system 100, and provides scheduling, input-output control, file and data management, memory management, and communication control and related services.


The accounts system 100 may be a source program, an executable program (object code), a script, or any other entity comprising a set of instructions to be performed. For embodiments in which it is a source program, then the program is usually translated via a compiler, assembler, interpreter, or the like, which may or may not be included within the memory 42, so as to operate properly in connection with the operating system 49. Moreover, the accounts system 100 may be written as (a) an object-oriented programming language, which has classes of data and methods, or (b) a procedure programming language, which has routines, subroutines, and/or functions, for example but not limited to, C, C++, C #, Pascal, BASIC, API calls, HTML, XHTML, XML, ASP scripts, FORTRAN, COBOL, Perl, Java, ADA, .NET, and the like.


The input/output (I/O) devices may include any of a variety of input devices, including but not limited to a mouse 44, keyboard 45, scanner (not shown), microphone (not shown), touch-sensitive screen (on the display 46), a gesture-responsive interface, and any of a variety of other input devices. Moreover, the I/O devices may also include output devices, including but not limited to a printer (not shown), the display 46, etc. Finally, the I/O devices may further include devices that communicate both inputs and outputs, including instance but not limited to a network interface controller (NIC) or a modem (modulator/demodulator) 47 (for accessing remote devices, other files, devices, systems, or a network), a radio frequency (RF) or other transceiver (not shown), a telephonic interface (not shown), a bridge (not shown), a router (not shown), etc.


If the server 11 is a PC, workstation, intelligent device, or the like, the software in the memory 42 may further include a basic input output system (BIOS) (omitted for simplicity). The BIOS is a set of essential software routines that initialize and test hardware at startup, start the operating system 49, and support the transfer of data among the hardware devices. The BIOS is stored in some type of read-only-memory, such as ROM, PROM, EPROM, EEPROM or the like, so that the BIOS can be executed when the server 11 is activated.


When the server 11 is in operation, the processor 41 is configured to execute software stored within the memory 42, to communicate data to and from the memory 42, and generally to control operations of the server 11 are pursuant to the software. The accounts system 100 and the operating system 49 are read, in whole or in part, by the processor 41, perhaps buffered within the processor 41, and then executed.


The accounts system 100 may be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.


In the context of this document, a “computer-readable medium” includes any means that can store, communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, propagation medium, or other physical device or means that can contain or store a computer program for use by or in connection with a computer related system or method. More specific examples of a computer-readable medium, in a non-exhaustive list, includes the following: an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic or optical), a random access memory (RAM) (electronic), a read-only memory (ROM) (electronic), an erasable programmable read-only memory (EPROM, EEPROM, or Flash memory) (electronic), an optical fiber (optical), and a portable compact disc memory (CDROM, CD R/W) (optical). Note that the computer-readable medium could even be paper or another suitable medium, upon which the program is printed or punched (as in paper tape, punched cards, etc.), because the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.


In an alternative embodiment, the accounts system 100 may be implemented in hardware, using for example any one or a combination of the following technologies, each of which is well known in the art: one or more discrete logic circuits having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, one or more programmable gate array (PGA), a field programmable gate array (FPGA), and the like.



FIG. 1C is a block diagram illustrating the functional elements of the one or more remote devices 15, 17-20 that facilitate access to and operation of an access system 60. As illustrated, the elements in each remote device 15, 17-20 are similar in type, function, and operation to those described with respect to the server 11 in FIG. 1B. In the embodiment shown, the access system 60 may be installed on and operated by the remote device 15, 17-20. Hereinafter, the remote devices 15, 17-20 will be referred to as mobile device 15 for the sake of brevity.


The mobile device 15 may include a processor 51, a memory 52, and one or more input and/or output (I/O) devices (or peripherals) that are communicatively coupled via a local interface 53. The I/O devices include any of a variety of input devices, including but not limited to a mouse 54, keyboard 55, a touch-sensitive screen (on the display 56), a gesture-responsive interface, and any of a variety of other input devices. The memory 52, as described herein, may include a volatile memory cache.


The access system 60 may be a source program, an executable program (object code), a script, or any other entity comprising a set of instructions to be performed. For embodiments in which the access system 60 is a source program, the program is usually translated via a compiler, assembler, interpreter, or the like, which may or may not be included within the memory 52, so as to operate properly in connection with the operating system 59. Moreover, the access system 60 may be written as (a) an object-oriented programming language, which has classes of data and methods, or (b) a procedure programming language, which has routines, subroutines, and/or functions, for example but not limited to, C, C++, C #, Pascal, BASIC, API calls, HTML, XHTML, XML, ASP scripts, FORTRAN, COBOL, Perl, Java, ADA, .NET, and the like.


Portable Lock Assemblies

Although many of the systems and methods described herein are discussed in the context of a portable locking device with a cable, the technology disclosed herein is also useful and applicable in a variety of other contexts. For example, the devices and systems described herein would be useful and applicable for all types of locks and security devices where wireless connectivity and functionality would be beneficial.



FIG. 2 is a perspective illustration of an item of personal property 150, such as a kayak, secured by the cable 235 of a lock assembly 200, according to particular embodiments. As shown, the housing 210 of the lock assembly 200 is resting on the kayak's rail and the cable 235 extends around a tree or post. In use, the lock assembly 200 can secure one (or several) items of personal property 150 using a cable 235. The cable 235 selected may be relatively long, or shorter, as selected by the user. As described herein, the lock assembly 200 is configured for use with cables 235 of different lengths, or with a solid U-shaped shackle (like that of a traditional padlock), or with other types of shackles. The cable 235 may include a sensor element 236, as shown and described herein, according to particular embodiments.


A traditional padlock has a solid U-shaped shackle and a body or housing with openings for receiving the heel and toe ends of the shackle, and for receiving a key that operates a locking mechanism inside the housing. In many padlock designs, the shackle heel is secured in the housing and may be spring-mounted. The shackle toe or free end includes a notch or recess, which engages with a locking bar to secure or lock the shackle within the housing when locked. The locking mechanism includes a keyway for receiving a key, which may turn a series of tumblers and pins for operating the lock.


Referring to FIG. 3, the lock assembly 200 of the present invention includes a housing 210 and first and second pinways 251, 252 that are sized and shaped to receive first and second shackle pins 231, 232, respectively. The lock assembly 200 may include a keyway 258 and a key, or an alternative locking assembly for securing and locking the shackle pins 231, 232 once inserted into the housing 210. For example, an alternative locking assembly may include a padlock having a shackle for insertion into and through the housing 210 at a position where it secures the shackle pins 231, 232 inside the housing 210.


Each shackle pin 231, 232 may be selectively removable from the housing 210, unlike most padlock designs. The shackle pins 231, 232 may be located on the opposing ends of a cable 235. In this aspect, the cable 235 acts as a flexible shackle. One or both shackle pins 231, 232 may include a recess that is sized and shaped to engage with a locking bar inside the housing, which is operated using a key in the keyway 258 or by using an alternative locking assembly, as described.


As shown, the housing 210 may include may include one or more slots or holes 300 for receiving straps, ropes, or other tethering devices which may be useful for carrying the lock assembly 200 or for positioning or securing it at a desired location.


The housing 210 may include one or more lamps 285 for displaying the status or condition of the lock assembly, to indicate Ready, Locked, Alarm, and the like. The lamps 285 may be light-emitting diodes (LEDs) and may be configurable by the user, including variations in color, brightness, and blink pattern. The lamps 285 may include one or more lamps positioned on one or more sides of the housing 210 in order to facilitate viewing from different perspectives.


The openings to the first and second pinways 251, 252 may be positioned on the rear face of the housing 210. According to one embodiment, the pinways 251, 252 are spaced 1.25 inches apart. The pinway openings and/or other openings on the housing 210 may be protected with a door, a flap, or other type of covering in order to protect the interior components from water and the elements. According to particular embodiments, the other openings on the housing 210 may include a power button, a charging port, and a camera.



FIG. 4 is a schematic illustration depicting the connections between and among a power supply 215 or battery, and NFC interface and antenna 299, one or more sensors, a microcontroller 220, and interfaces with one or more communications modules, according to particular disclosed embodiments. The microcontroller 220, often abbreviated uC or μC (as in the figure), is a small computer on an integrated circuit board which is used to control electronic devices. The microcontroller 220 typically includes a processor core, a memory, and programmable input/output peripherals.


The elements shown schematically in FIG. 4 are located within the housing 210 of the lock assembly 200. The power supply 215 or battery, as shown, may include a secondary or backup battery, and may be connected to the microcontroller or uC 220 which is positioned on an integrated circuit board which is labeled as the Main goLock Board. Also on the board is a charging and voltage regulator (Vreg) circuit. The charging interface may be wireless and/or may include a charging port such as a micro-USB type.


Also on the Main goLock Board, according to particular embodiments, is a BLE transceiver 290. Bluetooth Low-Energy (BLE or Bluetooth Smart) is a wireless network technology designed and marketed by the Bluetooth Special Interest Group. BLE is intended to provide a communication range similar to Classic Bluetooth but with considerably reduced power consumption and cost. The BLE transceiver 290 is configured to communicate with one or more remote or mobile devices 15, 17-20 including a smart phone 20 or tablet computer 18, as described herein. The microcontroller 220 includes a memory and a processor core capable of executing a number of commands and responses.


Instead of (or in addition to) the BLE transceiver 290, the system may include one or more other communications modules, as shown in FIG. 4, including a cellular modular, a WiFi module, a sub-gigahertz radio, and a locator module (for example, GPS or GLONASS). The system may also include UART, SPi, i2C, or other types of interfaces, as shown.


The sensor assembly 240 may include sensors to detect whether a pin has been inserted into one of the pinways, according to particular embodiments. In this aspect, the sensors may include a first pinway sensor (positioned to sense the presence or absence of a first shackle pin 231 in the first pinway 251, as illustrated in FIG. 3) and a second pinway sensor (positioned to sense the presence or absence of a second shackle pin 232 in the second pinway 252).


The sensor assembly 240 may also include a cable type sensor 245 for detecting the type of cable that is inserted, including its length (as described herein). The sensor assembly 240 may also include a cable status sensor 246 for detecting the status, integrity, or condition of the cable. For example, the cable status sensor 246 may be configured to sense a cable interrupt event, such as a cable break or cut, and to sense cable tampering (a shock or insult to the cable without necessarily breaking it). The sensor assembly 240 may also include a variety of other types of electromechanical sensors for detecting temperature, shock, motion, and other conditions. The sensor assembly 240 may also include a camera.


Cable Type and Status:


The cable assembly 230, according to particular embodiments, includes a cable 235, first and second shackle pins 231, 232 at the cable ends, and a sensor element 236 (as illustrated schematically in FIG. 2) such as a resistive wire, carbon filaments, a coaxial conductor, or the like. The sensor element 236 may be positioned along all or part of the length of the cable 235.


In use, the sensor element 236 enables the cable type sensor 245 to sense and detect the type of cable currently in use, including its type (cord, wire, plastic-coated cable, for example) and its length. The cable type and length may be sensed, transmitted, registered, and stored on the access system 60 (mobile app) which is running on a mobile device 15. In this aspect, a specific cable 235 may be associated with a particular lock assembly 200. Any change in the cable type or length will trigger an alarm status.


In use, the sensor element 236 enables the cable status sensor 246 to sense and detect the status, integrity, or condition of the cable. For example, a sensor element 236 such as a coaxial conductor running along the entire length of the cable 235 would sense a cable interrupt event, including a cable break or cut. The sensor element 236 may also be configured to sense cable tampering, such as a shock or insult to the cable that does not completely break it.



FIG. 5 is a flow chart depicting the some of the steps in controlling the power and wake status for the lock assembly 200, according to particular embodiments. Starting with the Power On event 401, the Initialize routine 402 may include setup steps, verification, and communications routines, as shown, before the system enters Run status 403. As shown, the system may enter a sleep or Hibernate mode 404 during periods of inactive use, while of course maintaining sensor vigilance for detecting any Interrupt condition 405.


Setup and Operation


FIG. 6 is an illustration of the system, according to particular embodiments, which may include a mobile device 15 such as a smart phone, a server 11, and one or more lock assemblies 200. As shown, the three elements—the mobile device 15, the server 11, and the one or more lock assemblies 200—may be in communication with one another, over a network such as the Internet, as described herein. A mobile application, referred to herein as the access system 60, may be installed on a user's mobile device 15. A database 12 may be installed on the server 11, as shown. The server 11 may be a cloud-based server configured to connect via the Internet, as described herein.


The lock assembly 200 may include a battery, as described herein. The battery may be disabled during the manufacturing process in order to maintain its integrity during packaging, shipment, and transit. Once enabled, the battery provides electric power to components in the lock assembly 200 such as the microcontroller 220 and the BLE transceiver 290, shown in FIG. 4. The BLE transceiver 290 may be configured to communicate over a network (such as the Internet) with both the mobile device 15 and with the remote server 11.


The access system 60 or mobile app may include a user interface for creating a new account, for sensing and pairing with a particular lock assembly 200, and for registering user information and information about the lock assembly 200. After creating a new account, the mobile device 15 may be configured to verify the account, confirm that a user account does not already exist, and open a new account on the server 11. The access system 60 may be configured to send the data about the new account to the server 11.


Next, the access system 60 may send a signal to the lock assembly 200 that contains instructions to turn on or otherwise activate the onboard BLE transceiver 290. The BLE transceiver 290 may be configured to search for nearby lock assemblies 200 that are not already paired with the access system 60 on the mobile device 15. As described herein, the BLE transceiver 290 supports a two-way Bluetooth communication between the access system 60 and the lock assembly 200 in order to enable a pairing process. For example, the access system 60 may display to the user an identifier associated with a particular lock assembly 200 (such as a serial number) and start the process of pairing the lock assembly 200 with the access system 60. Once pairing is completed, the user may have the option of assigning a custom name for the lock assembly 200 (such as “Kayak” as illustrated in FIG. 7) and the access system 60 may send data and information related to the pairing to the server 11 for registration and storage in the database 12.


The access system 60 may be configured to send a request to the lock assembly 200 and thereby retrieve the current configuration and status, which can then be presented on the display 56 for the mobile device 15.


The access system 60 may include a menu of options for the user, including an Arm command associated with each of the registered lock assemblies 200. If the mobile device 15 is within Bluetooth range of the lock assembly 200, the Arm command may be sent via Bluetooth signal. If the mobile device 15 is not within Bluetooth range, the Arm command may be sent over a network such as the Internet to the server 11, and the server 11 will relay the Arm command to the lock assembly 200. Then, in turn, a confirmation from the lock assembly 200 will be relayed by the server 11 to the mobile device 15.


When an Alarm condition arises for the lock assembly 200, the lock assembly 200 may (1) sound a local alarm, (2) broadcast an alarm message via Bluetooth in the event the mobile device 15 is within range, (3) transmit an alarm message to the mobile device 15, and/or (4) transmit an alarm message to the server 11. The server 11 may send the alarm message via push notification to the mobile device 15. The alarm message may include the nature or detected cause of the alarm condition—for example, a cable break, cable pin removal, or cable insult.


The lock assembly 200 may also be configured to sound a local alarm. The local alarm may be configurable for type (audible siren, tactile vibration, LED display, for example) and for characteristic (pattern, tone, volume, duration, repetitions, and the like). The local alarm, for example, may include flashing and/or changing the color of the lamps 285 on the housing 210.


In response to the incoming alarm, the access system 60 on the mobile device 15 may be configured to silence or otherwise react to the alarm on the mobile device 15. The mobile device 15 may be configured to silence the local alarm at the lock assembly 200, without disarming the locking mechanism.


During normal operation, the access system 60 on the mobile device 15 may be configured to occasionally poll the lock assembly 200 in order to retrieve operational and status information, including such data as battery level, signal strength, cable status, and the like. The data may be displayed on the mobile device 15, as illustrated in FIG. 8. The polling request may be relayed by the server 11 to the lock assembly 200; the server 11 in turn will relay the information back to the mobile device 15. As shown in FIG. 5, the microcontroller 220 may be configured to include various operational modes, including Initialize, Run, Interrupt, Sleep, and Hibernate. As shown, receiving a Check State or other command received from the mobile device 15 (or from the server 11) will temporarily stop the Hibernate mode and/or Sleep mode and the microcontroller 220 will process the incoming command(s) and send the appropriate response.


The access system 60 on the mobile device 15 may be configured to register a number of contacts, some of whom are authorized using the access system 60 to access and open one or more select lock assemblies 200. A number of different lock assemblies 200 may be monitored and controlled using the access system 60 on the mobile device 15, as illustrated in a screen capture in FIG. 9.


An authorized contact may install the mobile app (access system 60) on their mobile device 15 and thereby interact with the user. In this aspect, the user may select and authorize certain contacts to access and use one or more of the select lock assemblies 200. For example, the user may authorize Adam to access and open the “Kayak” lock assembly 200; and may authorize Betty to access and open the “Kayak” and the “Bicycle” lock assemblies 200 using the access system 60. The access system 60 may be configured to include ready access to the telephone and text-messaging systems on the mobile device 15 so that the user may communicate with a selected contact, such Adam or Betty, for example, who may be near an item of locked personal property 150 and seeking access to the lock assembly 200.


The access system 60 on the mobile device 15 facilitates remote control and operation of the lock assembly 200 by a user, including situations where a contact or another person is near the lock assembly 200. For example, the user may use the mobile device 15 to send a Disarm signal to unlock a selected lock assembly 200 so that the local person can access and use the item. After the Disarm signal is received and the lock assembly 200 is unlocked, the local person can remove one or both shackle pins 231, 232 (which opens or releases the cable assembly 230) and use the property 150. In another aspect, the lock assembly 200 may also include a shackle pin ejector 260 that is configured to selectively and forcefully eject one or both shackle pins 231, 232 of the cable assembly 230.


Command Sets:


In another aspect, according to particular embodiments, the systems described herein may include a command set, including a series of commands, responses, parameters, and selected users. The command set, as described, is common to all the systems, including (1) the microcontroller 220 inside the housing 210 of the lock assembly 200, (2) the access system 60 (or mobile app) on the mobile device 15, and (3) the account system 100 on the remote server 11. The command set operates with any communication module that might be in use between and among the lock assembly 200, the mobile device 15, and the server 11. In this aspect, the command set is mode-agnostic.
















COMMAND
PARAMETERS
RESPONSE
USER
NOTES







Get Firmware
None
Current firmware
Owner



Version

version on the




goLock assembly.


Get Firmware
None
Checksum of current
Owner
To verify integrity of


Checksum

firmware image

firmware; e.g., after an






update and/or to ensure






firmware has not been






tampered with.


Arm Lock
None
OK
Owner and
Owner has full access.





assigned
Other shared users can






be assigned access level






by the owner.


Disarm Lock
None
OK
Owner and





assigned


Silence Alarm
None
OK
Owner and





assigned


Acknowledge
None
OK
All
Causes Lock or Server to


Alert Message


Receivers
stop sending Alert






messages to the sending






user ID. This Command






functions on a per user






basis.


Get Device
Data Type
Battery level, lock
Owner and
Data Type meaning


Status

status, cable status,
assigned
which status data to




cable type, signal

return, Summary,




strength for each

Critical, All, etc.




radio, temperature,

Selectable to save GSM




configurable settings

bandwidth.




such as LED, alarm




delay, etc.


Set LED
Brightness Value
OK
Owner
Assumes brightness can



(1 to 10)


be controlled via PWM.






All colors would have to






change together or else






you are shifting the hue.


Alarm Off
Value in seconds,
OK
Owner
Allow user to configure


Delay
Alert Type


the amount of time the






Alarm sounds before






turning off, if not






otherwise reset by the






user. Settable for each






different Alarm type






(Alert, Warn, Etc.)


Set Sensor
Sensor ID, Level
OK
Owner
Setting (Low, Med,


Sensitivity
Setting


High, Off) of selected






analog Sensor.


Update User
User identifier,
OK
Owner
Register (or remove) a


List
access level


Contact, for additional






users of the lock, and set






the access level for each






user. Only the Owner/






Primary user has access






to all admin functions.


Get User List
None
Current User list and
Owner
Return the Contact info




settings

and access settings for






additional users of the






lock, and set access level






for each user.


Set Broadcast
Updated
OK
Owner
Set the Broadcast


Message
Broadcast Level


message level which


Mode



determines with groups






of Contacts who get






notified about certain






Lock Status changes.


Get Broadcast
None
Current Broadcast
Owner
Return the current


Message

Level

Broadcast message level,


Mode



which determines which






Contacts or groups of






contacts get notified






about certain Lock Status






changes.









The following command sets may be available only in diagnostic or development builds, and/or may be accessible for service and troubleshooting purposes, and may be hidden from the end user.
















COMMAND
PARAMETERS
RESPONSE
USER
NOTES







Get Device
None
All relevant
Development
Diagnostic and


Serial

ID's

manufacturing only.


Numbers and



Removed when


Identifiers



shipped.


Set Alarm
Off, Low,
OK
Development


Level
Medium, Hi


Set Alarm
Value between 0
OK
Development
For testing and setup


Frequency
and 4Fh


only. This would be to






tweak and tune the






PWM Frequency for






different speaker






selections.


Disable
Amount of time to
OK
Development
For testing only.


Bluetooth
disable


Device will re-enable






Bluetooth after the






specified time frame.


Disable Radio
Radio, true/false
OK
Development
Enable or disable






GSM, LTE, Sub-






Gigahertz, or other






radio used.


Sensor
Sensor,
OK
Development
Alert and Warn


Thresholds
Threshold, Level


Thresholds and



Setting


Hysteresis of analog






sensors.


Update
Binary image
OK
Diagnostics
For uC and any other


Firmware


and/or
programmable





Development
devices. Final






solution may allow for






maintenance push






from server.


Get Cable
None
Continuity or
Diagnostics


State

No Continuity;
and/or




Cable
Development




Impedance (if




connected)


Tune LEDs
RGB brightness
OK
Development
For testing and setup



values as percent


only. This would be to






tweak and tune the






color projection in






different case setups.


Dump Diags
Requested Data
Requested Data
Diagnostics
Store selected



Identifier

and/or
diagnostic data in





Development
non-volatile memory.


Heartbeat
None or State
OK
Development
Development



Summary


configurable






“heartbeat” interval.






App to Lock.


Get Extended
Sensor Number
Raw Sensor
Diagnostics
Allows server to


Sensor Data

Data
and/or Server
collect and develop





(long-term
trends using long-term





analysis
sensor data; may be





software)
used to analyze trends,






predict failures, etc.


Change
New Key
OK, encrypted
Customer
In the event a lock


Encryption

with new key.
Support
gets hacked, change


Key



the encryption key to






protect the device.









The following command sets may be sent unsolicited and asynchronously from the lock assembly 200 to the server 11 and/or to the mobile device 15.
















COMMAND
PARAMETERS
RESPONSE
USER
NOTES







Alarm Alert
Source, Severity
OK
Lock
Cable break, motion sensor, Shock sensor,






Temp, Signal or other. Red or Yellow.


Lock
None or State
OK
Lock
Development configurable “heartbeat”


Heartbeat
Summary


interval. Start of Day and/or Enter






Runtime Notification.









Mesh of Nodes in a Network:


In another aspect, one or more lock assemblies 200 may be used in a network or mesh for the purpose of communicating with one or more selected mobile devices 15 and/or with one or more remote servers 11. For example, a user (or set of users) may have a number of lock assemblies 200 deployed in a particular area, which may be in remote or wilderness areas. The local computer or microcontroller 220 on each lock assembly 200 may be configured to communicate with other lock assemblies 200 (selected and identified through an interface, or selected by default to participate in the mesh) so that a superset of lock assemblies 200 together may act as a communication network. The network or mesh 113 may be secured and limited to lock assemblies 200 only, excluding participation by other wireless devices. In use, the network or mesh 113 of lock assemblies 200 will facilitate communication, across remote wilderness or other wide areas, which would otherwise be more difficult or impossible. In this aspect, the lock assemblies 200 are configured to act as nodes in the mesh so that signals, including alarm messages, can be relayed among and between participating elements in the mesh, to further insure that the user will receive current information and data on his or her mobile device 15.


Although several embodiments have been described herein, those of ordinary skill in art, with the benefit of the teachings of this disclosure, will understand and comprehend many other embodiments and modifications for this technology. The invention therefore is not limited to the specific embodiments disclosed or discussed herein, and that may other embodiments and modifications are intended to be included within the scope of the appended claims. Moreover, although specific terms are occasionally used herein, as well as in the claims that follow, such terms are used in a generic and descriptive sense only, and should not be construed as limiting the described invention or the claims that follow.

Claims
  • 1. A secure mesh communication network, comprising: a first lock assembly and a plurality of other lock assemblies, wherein each lock assembly comprises a power source, a sensor assembly, a microcontroller, a memory storing a command set, and a wireless transceiver configured to communicate a signal with the other lock assemblies over a local network;at least one mobile device configured for wireless communication over a wireless network; andat least one server in communication with both the local network and the wireless network, such that said signal associated with said one or more lock assemblies is relayed to said at least one mobile device, wherein said server comprises an account system also storing said command set, wherein execution of said command set by a first microcontroller coupled with a first lock assembly configures said first lock assembly to perform functions, including functions to:broadcast a first signal to each of said other lock assemblies, wherein each of said other lock assemblies is further configured to relay said first signal (a) to each of said other lock assemblies and (b) to said at least one server;transmit said first signal to said at least one mobile device, which is further configured to relay said first signal to said at least one server; andtransmit said first signal to said at least one server, which is further configured to push said first signal to said at least one mobile device, such that said at least one mobile device receives said first signal from at least one of: said first lock assembly, one or more of said other lock assemblies, and said at least one server.
  • 2. The secure mesh communication network of claim 1, wherein said at least one server receives said first signal from at least one of: said first lock assembly, one or more of said other lock assemblies, and said at least one mobile device.
  • 3. The secure mesh communication network of claim 1, wherein said execution further configures said first lock assembly to: execute tasks, in response to one or more wake commands received over said mesh communication network from an owner or a user, until completed; andenter a sleep mode in which said first select lock assembly is configured to wake in response to (a) interrupt data received from said sensor assembly or (b) said one or more wake commands.
  • 4. The secure mesh communication network of claim 3, wherein said one or more wake commands comprises: a poll requesting one or more items of operational data, wherein said poll is generated by at least one of said at least one mobile device and said at least one server.
  • 5. The secure mesh communication network of claim 4, wherein said poll is transmitted at one or more configurable dates or clock times, periodically at a configurable time interval, or in response to a request from said owner or said user.
CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. application Ser. No. 15/998,905, filed Aug. 16, 2018, which is a Section 371 national-stage entry into the U.S. of International Application No. PCT/US2017/018215, filed Feb. 16, 2017, which claims the benefit of and priority to U.S. Provisional Application No. 62/296,011, filed Feb. 16, 2016. The contents of each application identified in this paragraph is incorporated herein by reference in its entirety.

US Referenced Citations (515)
Number Name Date Kind
3754419 Taylor Aug 1973 A
3755778 Kennedy et al. Aug 1973 A
3824540 Smith Jul 1974 A
4027276 Shaughnessy May 1977 A
4032848 Shaughnessy Jun 1977 A
4095211 Shaughnessy Jun 1978 A
4188614 Habib, Jr. Feb 1980 A
4229811 Salem Oct 1980 A
4242743 Salem Dec 1980 A
4260928 Salem Apr 1981 A
4525702 Kitagawa et al. Jun 1985 A
4531115 Black et al. Jul 1985 A
4538107 Varone Aug 1985 A
4576022 Gamble Mar 1986 A
4626799 Matievic Dec 1986 A
4672365 Gehman et al. Jun 1987 A
4682155 Shirley Jul 1987 A
4734680 Gehman et al. Mar 1988 A
4737771 Coash Apr 1988 A
4755792 Pezzolo et al. Jul 1988 A
4776188 Dalaba et al. Oct 1988 A
4878045 Tanaka et al. Oct 1989 A
4920334 DeVolpi Apr 1990 A
4965909 Matievic Jun 1990 A
5066943 Demirel Nov 1991 A
5268670 Brasch et al. Dec 1993 A
5270681 Jack Dec 1993 A
5274353 Bianchi Dec 1993 A
5408213 Ungarsohn Apr 1995 A
5477152 Hayhurst Dec 1995 A
5699065 Murray Dec 1997 A
D391469 Foushee Mar 1998 S
5748078 Escolar May 1998 A
5852402 Perry Dec 1998 A
5877957 Bennett Mar 1999 A
5898397 Murray Apr 1999 A
5912941 Schmitt Jun 1999 A
5926100 Escolar Jul 1999 A
5959532 Fujiuchi et al. Sep 1999 A
6112127 Bennett Aug 2000 A
6166644 Stroda Dec 2000 A
6170019 Dresel et al. Jan 2001 B1
6385495 Bennett May 2002 B1
6400265 Saylor et al. Jun 2002 B1
6439008 Keil Aug 2002 B1
6570498 Frost et al. May 2003 B1
6578393 Yarborought Jun 2003 B2
6624750 Marman et al. Sep 2003 B1
6640141 Bennett Oct 2003 B2
6661340 Saylor et al. Dec 2003 B1
6684668 Hsueh Lee Feb 2004 B1
6720861 Rodenbeck et al. Apr 2004 B1
6731908 Berliner et al. May 2004 B2
6807564 Zellner et al. Oct 2004 B1
6813770 Pereira et al. Oct 2004 B1
6842650 Bennett Jan 2005 B2
6859761 Bensky et al. Feb 2005 B2
6961541 Overy et al. Nov 2005 B2
6963289 Aljadeff et al. Nov 2005 B2
6965313 Saylor et al. Nov 2005 B1
6968194 Aljadeff et al. Nov 2005 B2
7027878 Bennett Apr 2006 B2
D523729 Gorst Jun 2006 S
D527296 Concari Aug 2006 S
7104091 Kuhblank Sep 2006 B2
7113090 Saylor et al. Sep 2006 B1
7123030 Robar et al. Oct 2006 B2
7155783 Nessel et al. Jan 2007 B2
7178205 Nessel et al. Feb 2007 B2
D539181 Concari Mar 2007 S
7186914 Knight Mar 2007 B1
7221984 Bennett May 2007 B2
7233245 O'Neill Jun 2007 B2
D545710 Concari Jul 2007 S
D545760 Concari Jul 2007 S
7253733 Krieger Aug 2007 B2
7262690 Heaton et al. Aug 2007 B2
7274293 Bradus et al. Sep 2007 B2
7295115 Aljadeff et al. Nov 2007 B2
7296447 Priest et al. Nov 2007 B2
7319395 Puzio et al. Jan 2008 B2
7319398 Marino Jan 2008 B2
7337963 Harper et al. Mar 2008 B2
7339475 Concari et al. Mar 2008 B2
7339477 Puzio et al. Mar 2008 B2
7343328 Smith et al. Mar 2008 B1
7366544 Tegreene Apr 2008 B2
7389295 Jung et al. Jun 2008 B2
7391315 Friar Jun 2008 B2
7391326 Puzio et al. Jun 2008 B2
7403108 Aljadeff et al. Jul 2008 B2
7406353 Bennett Jul 2008 B2
7418238 Tegreene Aug 2008 B2
D581303 Concari Nov 2008 S
7454826 Nessel et al. Nov 2008 B2
7525411 Strader et al. Apr 2009 B2
7543467 Sheehan Jun 2009 B2
7555528 Rezvani et al. Jun 2009 B2
7619512 Trundle et al. Nov 2009 B2
7633385 Cohn et al. Dec 2009 B2
7648065 Marino Jan 2010 B2
7649464 Puzio et al. Jan 2010 B2
7665289 DeAngelis Feb 2010 B2
7669765 Harper et al. Mar 2010 B2
7675413 Watts et al. Mar 2010 B2
7692542 Outzs Apr 2010 B2
7711796 Gutt et al. May 2010 B2
7733213 Levine Jun 2010 B2
7734724 Rezvani et al. Jun 2010 B2
7750811 Puzio et al. Jul 2010 B2
7753272 Harper et al. Jul 2010 B2
7832064 Nessel et al. Nov 2010 B2
7855635 Cohn et al. Dec 2010 B2
7866245 Kempf et al. Jan 2011 B2
7916036 Pope et al. Mar 2011 B1
7920841 Martin et al. Apr 2011 B2
7920842 Martin et al. Apr 2011 B2
7920843 Martin et al. Apr 2011 B2
7926215 Riker et al. Apr 2011 B2
7956736 Cohn et al. Jun 2011 B2
7961088 Watts et al. Jun 2011 B2
D640911 Yang Jul 2011 S
D642119 Baetica et al. Jul 2011 S
7986228 Friar et al. Jul 2011 B2
8002180 Harper et al. Aug 2011 B2
8022807 Martin et al. Sep 2011 B2
8073931 Dawes et al. Dec 2011 B2
8098281 Croak et al. Jan 2012 B1
8103047 Griess et al. Jan 2012 B1
8140048 Martin et al. Mar 2012 B2
8161097 Jung et al. Apr 2012 B2
8200744 Jung et al. Jun 2012 B2
8209400 Baum et al. Jun 2012 B2
8214494 Slavin Jul 2012 B1
8218810 Griess et al. Jul 2012 B1
8219219 Bennett Jul 2012 B2
8248226 Fiar Aug 2012 B2
8255090 Frader-Thompson et al. Aug 2012 B2
8264322 Rodenbeck et al. Sep 2012 B2
8271449 Jung et al. Sep 2012 B2
8275824 Jung et al. Sep 2012 B2
8284689 Jung et al. Oct 2012 B2
8313024 Marino Nov 2012 B2
8325033 Feldstein et al. Dec 2012 B2
8335842 Raji et al. Dec 2012 B2
8350694 Trundle et al. Jan 2013 B1
8350697 Trundle et al. Jan 2013 B2
8358198 Harper et al. Jan 2013 B2
8360208 DeAngelis Jan 2013 B2
8395494 Trundle et al. Mar 2013 B2
8456293 Trundle et al. Jun 2013 B1
8467763 Martin et al. Jun 2013 B2
8473619 Baum et al. Jun 2013 B2
8478844 Baum et al. Jul 2013 B2
8478871 Gutt et al. Jul 2013 B2
8493202 Trundle et al. Jul 2013 B1
8520072 Slavin et al. Aug 2013 B1
8525665 Trundle et al. Sep 2013 B1
8531286 Friar et al. Sep 2013 B2
8531294 Slavin et al. Sep 2013 B2
8612591 Dawes et al. Dec 2013 B2
8638211 Cohn et al. Jan 2014 B2
8659417 Trundle et al. Feb 2014 B1
8665064 Rodenbeck et al. Mar 2014 B1
8674816 Trundle et al. Mar 2014 B2
8675066 Trundle et al. Mar 2014 B2
8675071 Slavin et al. Mar 2014 B1
8675920 Hanson et al. Mar 2014 B2
8680982 Trundle et al. Mar 2014 B2
8698614 Trundle et al. Apr 2014 B1
8746074 Lambert Jun 2014 B2
8786425 Hutz Jul 2014 B1
8810408 Hanson et al. Aug 2014 B2
8810657 Slavin et al. Aug 2014 B1
8819178 Baum et al. Aug 2014 B2
8850858 Nave Oct 2014 B2
8854207 Williams Oct 2014 B2
8860804 Rezvani et al. Oct 2014 B2
8870078 Webb et al. Oct 2014 B2
8897740 Martin et al. Nov 2014 B2
D719012 Alexander Dec 2014 S
8902061 Feldstein et al. Dec 2014 B2
8919211 Hanson et al. Dec 2014 B1
8928463 Landau et al. Jan 2015 B2
8937661 Slavin et al. Jan 2015 B1
8954201 Tepper et al. Feb 2015 B2
8957757 Le Burge et al. Feb 2015 B1
8988215 Trundle et al. Mar 2015 B1
8996188 Frader-Thompson et al. Mar 2015 B2
9013294 Trundle Apr 2015 B1
9013295 Trundle et al. Apr 2015 B1
9026648 Slavin May 2015 B1
9036019 Hanson et al. May 2015 B2
D731873 Harder Jun 2015 S
9064394 Trundle Jun 2015 B1
9070267 Hanson et al. Jun 2015 B2
9089952 Gatling et al. Jul 2015 B2
9115511 Schmidt et al. Aug 2015 B1
9119236 Martin Aug 2015 B1
9123229 Slavin et al. Sep 2015 B2
9141150 Trundle et al. Sep 2015 B1
9141276 Dawes et al. Sep 2015 B2
9153111 Trundle et al. Oct 2015 B2
9160987 Kasmir Oct 2015 B1
9165455 Hutz Oct 2015 B1
9171321 Trundle et al. Oct 2015 B1
9172553 Dawes et al. Oct 2015 B2
9182751 Reeder Nov 2015 B1
9189663 Goren et al. Nov 2015 B2
9196148 Hutz Nov 2015 B1
9197867 Scalisi Nov 2015 B1
9224285 Trundle Dec 2015 B1
9230374 Burge et al. Jan 2016 B1
9244116 Kabler et al. Jan 2016 B2
9293036 Trundle et al. Mar 2016 B2
9354271 Kabler et al. May 2016 B2
9368023 Cobb et al. Jun 2016 B2
9386281 Trundle et al. Jul 2016 B2
9390572 Almomani Jul 2016 B2
9406181 Almomani Aug 2016 B2
9424700 Lovett et al. Aug 2016 B2
9432259 Hutz et al. Aug 2016 B1
9449268 Goren et al. Sep 2016 B2
9450776 Baum et al. Sep 2016 B2
9476935 Kabler et al. Oct 2016 B2
9478112 Slavin et al. Oct 2016 B1
9489826 Hutz Nov 2016 B1
9494473 Hanson et al. Nov 2016 B2
9494936 Kerzner Nov 2016 B2
9495855 Hanson et al. Nov 2016 B2
9495864 Trundle et al. Nov 2016 B1
9501613 Hanson et al. Nov 2016 B1
9503539 Trundle et al. Nov 2016 B1
9508249 Trundle et al. Nov 2016 B2
9514584 Burge et al. Dec 2016 B1
9521301 Bart Dec 2016 B2
9523218 McGraw et al. Dec 2016 B1
9536410 Hutz Jan 2017 B2
9542829 Martin et al. Jan 2017 B2
9547963 Trundle et al. Jan 2017 B1
9547965 Goren et al. Jan 2017 B2
9547973 Hutz Jan 2017 B1
9590863 Martin Mar 2017 B1
9609721 Hutz et al. Mar 2017 B1
9625518 Kabler et al. Apr 2017 B2
9631987 Hanson et al. Apr 2017 B1
9633551 Aljadeff et al. Apr 2017 B2
9635224 Bart et al. Apr 2017 B2
9638431 Frader-Thompson et al. May 2017 B2
9639722 Landau et al. May 2017 B2
9646486 Trundle May 2017 B1
9647890 Hutz et al. May 2017 B1
9652971 Trundle May 2017 B1
9665778 Trundle May 2017 B1
9666045 Trundle May 2017 B2
9666047 Slavin et al. May 2017 B2
9672707 Kerzner Jun 2017 B2
9672708 Goren et al. Jun 2017 B2
9672717 Slavin et al. Jun 2017 B1
9672727 Alexander et al. Jun 2017 B1
9684028 Kabler et al. Jun 2017 B1
9691207 Almomani Jun 2017 B2
9696055 Goodman et al. Jul 2017 B1
9697302 Nguyen et al. Jul 2017 B2
9709431 Kinney et al. Jul 2017 B1
9714771 Goodman et al. Jul 2017 B1
9761099 Barth et al. Sep 2017 B1
9761119 Trundle Sep 2017 B1
9767680 Trundle Sep 2017 B1
9781348 Bart et al. Oct 2017 B1
9792422 Trundle et al. Oct 2017 B1
9804596 Slavin Oct 2017 B1
9805586 Alexander et al. Oct 2017 B1
9811990 Kerzner Nov 2017 B2
9823283 Kabler et al. Nov 2017 B2
9829871 Goodman et al. Nov 2017 B1
9830759 Hilton et al. Nov 2017 B2
9830805 Trundle et al. Nov 2017 B2
9842195 Hanson et al. Dec 2017 B2
9847912 Hutz et al. Dec 2017 B1
9852599 Slavin et al. Dec 2017 B1
9854050 Trundle et al. Dec 2017 B1
9858739 Johnson et al. Jan 2018 B1
9865155 Cobb et al. Jan 2018 B2
9871692 Hutz Jan 2018 B1
9886839 Martin Feb 2018 B2
9922540 Hutz Mar 2018 B1
9929929 Slavin Mar 2018 B1
9933766 Trundle et al. Apr 2018 B2
9934636 Burge et al. Apr 2018 B1
9942965 Hutz et al. Apr 2018 B1
9948902 Trundle Apr 2018 B1
9972185 Hutz May 2018 B2
9978240 Trundle May 2018 B1
9978255 Trundle May 2018 B1
9978257 Trundle et al. May 2018 B1
9989397 Kinney et al. Jun 2018 B1
9995502 Reeder Jun 2018 B1
9997042 Hutz Jun 2018 B2
10026300 Hutz Jul 2018 B1
10037669 Hanson et al. Jul 2018 B2
10043331 Johnson et al. Aug 2018 B1
10049544 Kerzner Aug 2018 B2
10049560 Alexander et al. Aug 2018 B1
10054329 Hutz et al. Aug 2018 B1
10057123 Knight et al. Aug 2018 B1
10062233 Rogers et al. Aug 2018 B1
10070035 Slavin et al. Sep 2018 B2
10088841 Kerzner Oct 2018 B2
10089843 Trundle et al. Oct 2018 B2
10096219 Maurer et al. Oct 2018 B1
10096231 Slavin et al. Oct 2018 B1
10096236 Trundle Oct 2018 B1
10122600 Hutz et al. Nov 2018 B1
10127782 Barth et al. Nov 2018 B1
10127798 Trundle et al. Nov 2018 B1
10147306 Kinney et al. Dec 2018 B2
10153966 Trundle Dec 2018 B1
10163331 Martin et al. Dec 2018 B2
10169665 Zhang et al. Jan 2019 B1
10200272 Trundle Feb 2019 B1
10200621 Bart et al. Feb 2019 B1
10209687 Tepper et al. Feb 2019 B2
10217305 Johnson et al. Feb 2019 B1
10218855 Kerzner Feb 2019 B2
10223901 Trundle et al. Mar 2019 B2
10228695 Rezvani Mar 2019 B2
10229585 Alexander et al. Mar 2019 B1
10234163 Bart Mar 2019 B1
10237948 Hutz et al. Mar 2019 B1
10241528 Frader-Thompson et al. Mar 2019 B1
10249069 Kerzner et al. Apr 2019 B1
10253998 Goodman et al. Apr 2019 B1
10255787 Bart et al. Apr 2019 B1
10257295 Alpert et al. Apr 2019 B1
10267668 Slavin et al. Apr 2019 B1
10270959 Bart et al. Apr 2019 B1
10271019 Berg et al. Apr 2019 B1
10274382 Trundle Apr 2019 B1
10276014 Trundle Apr 2019 B1
10276032 Hutz et al. Apr 2019 B1
10281166 Hutz May 2019 B1
10281896 Goodman et al. May 2019 B1
10282521 Hanson et al. May 2019 B2
10282927 Hutz et al. May 2019 B1
10282974 Trundle et al. May 2019 B1
10311710 Bart et al. Jun 2019 B1
10325469 Hutz Jun 2019 B2
10326644 Hutz Jun 2019 B1
10332383 Giles Jun 2019 B1
10332386 Trundle Jun 2019 B1
10332387 Trundle et al. Jun 2019 B1
10339388 Trundle Jul 2019 B1
10339787 Trundle Jul 2019 B1
10339788 Martin Jul 2019 B2
10347063 LaRovere et al. Jul 2019 B1
10347065 Burge et al. Jul 2019 B1
10354059 Trundle et al. Jul 2019 B1
10356192 Trundle et al. Jul 2019 B1
10360744 Kerzner Jul 2019 B1
10360746 Giles et al. Jul 2019 B1
10360779 Correnti Jul 2019 B2
10366588 Slavin et al. Jul 2019 B2
10374890 Hutz et al. Aug 2019 B1
10375361 Trundle Aug 2019 B1
10377438 Prommel et al. Aug 2019 B2
10379515 Martin Aug 2019 B1
10380875 Roberts et al. Aug 2019 B1
10388134 Slavin et al. Aug 2019 B1
10395504 Hutz et al. Aug 2019 B1
10401811 Trundle et al. Sep 2019 B2
10410490 Barth et al. Sep 2019 B2
10419331 Trundle Sep 2019 B1
10419908 Hutz et al. Sep 2019 B1
10438465 Bart et al. Oct 2019 B1
10443873 Johnson et al. Oct 2019 B1
10462366 Bart et al. Oct 2019 B1
10467885 Trundle et al. Nov 2019 B2
10467891 Bart et al. Nov 2019 B1
10469283 Kinney et al. Nov 2019 B1
10474904 Correnti Nov 2019 B1
10482901 Maurer et al. Nov 2019 B1
10497235 Rogers Dec 2019 B1
10497241 Maurer et al. Dec 2019 B1
10499337 Bart Dec 2019 B1
10504348 Kerzner Dec 2019 B2
10511404 Trundle et al. Dec 2019 B2
10511719 Kerzner Dec 2019 B2
10514264 Correnti et al. Dec 2019 B2
10522029 Alexander et al. Dec 2019 B1
10529101 Kerzner et al. Jan 2020 B1
10530651 Knight et al. Jan 2020 B1
10535251 Trundle et al. Jan 2020 B1
10535253 Trundle Jan 2020 B1
10537195 Giles et al. Jan 2020 B1
10541865 Brophy et al. Jan 2020 B1
10541902 Slavin Jan 2020 B1
10545092 Goodman et al. Jan 2020 B2
10546483 Hutz et al. Jan 2020 B1
10546485 Hutz Jan 2020 B1
10546486 Kinney et al. Jan 2020 B2
10574891 Bart et al. Feb 2020 B1
10574945 Seyfi et al. Feb 2020 B1
10581872 Berg et al. Mar 2020 B1
10586437 Slavin et al. Mar 2020 B1
10600297 Kerzner Mar 2020 B2
10612960 Slavin et al. Apr 2020 B1
10613497 Goodman et al. Apr 2020 B1
10614700 Martin et al. Apr 2020 B2
10623622 Slavin et al. Apr 2020 B1
10629015 Burge et al. Apr 2020 B1
10629045 Trundle Apr 2020 B1
10636173 Beach et al. Apr 2020 B1
10636283 Trundle et al. Apr 2020 B2
10636284 Trundle et al. Apr 2020 B1
10638096 Lin Apr 2020 B1
10641013 Yates et al. May 2020 B2
10641030 Trundle et al. May 2020 B2
10642289 Reeder May 2020 B1
10643079 Li et al. May 2020 B2
10643441 Sanchez May 2020 B1
10643450 Bart et al. May 2020 B1
10645347 Ure et al. May 2020 B2
10650629 Hutz et al. May 2020 B1
10650652 Weingart et al. May 2020 B1
10650666 Bart et al. May 2020 B1
10655874 Reeder May 2020 B1
10655876 Goodman et al. May 2020 B1
10655968 Rezvani May 2020 B2
10657742 Kerzner May 2020 B1
10663321 Martin et al. May 2020 B1
10665070 Picardi May 2020 B1
10665089 Trundle May 2020 B1
10666768 Johnson May 2020 B1
10679442 Rogers et al. Jun 2020 B1
10679756 Hanson et al. Jun 2020 B1
10685227 Kerzner et al. Jun 2020 B2
10685558 Roberts et al. Jun 2020 B2
10692342 Trundle et al. Jun 2020 B2
10692353 Kerzner et al. Jun 2020 B1
10693982 Alpert et al. Jun 2020 B1
10698403 Kerzner Jun 2020 B2
10706699 Kerzner et al. Jul 2020 B1
10706712 Trundle Jul 2020 B1
10706714 Hutz Jul 2020 B1
10726650 Giles et al. Jul 2020 B1
10733822 Roberts et al. Aug 2020 B1
10740821 Hutz Aug 2020 B1
10741087 Picardi et al. Aug 2020 B1
10748362 Trundle et al. Aug 2020 B2
10754405 Picardi Aug 2020 B1
10755443 Trundle et al. Aug 2020 B1
10755730 Maurer et al. Aug 2020 B1
10756919 Kerzner et al. Aug 2020 B1
10762354 Correnti Sep 2020 B1
10768625 Rezvani Sep 2020 B2
10769844 Rezvani et al. Sep 2020 B1
10769926 Rogers et al. Sep 2020 B1
10771360 Hutz et al. Sep 2020 B1
10771576 Trundle et al. Sep 2020 B1
10782044 Bart Sep 2020 B1
10782204 Picardi et al. Sep 2020 B2
10782681 Slavin Sep 2020 B1
10783768 Martin Sep 2020 B2
10783770 Alexander et al. Sep 2020 B1
10789789 Edman Sep 2020 B1
10789820 Jones et al. Sep 2020 B1
10789832 Hutz et al. Sep 2020 B2
20030089144 Hoffman May 2003 A1
20030228846 Berliner et al. Dec 2003 A1
20040066202 Pereira et al. Apr 2004 A1
20040119583 Linden et al. Jun 2004 A1
20050016232 Baloga Jan 2005 A1
20050079756 Kawai et al. Apr 2005 A1
20050116120 Maruyama Jun 2005 A1
20050242246 Maruyama Nov 2005 A1
20060109103 Bradus May 2006 A1
20060123229 Holloway et al. Jun 2006 A1
20060139861 Krieger et al. Jun 2006 A1
20060283216 Marcelle et al. Dec 2006 A1
20070262853 Bradus et al. Nov 2007 A1
20080068159 Bradus et al. Mar 2008 A1
20080126126 Ballai May 2008 A1
20080242945 Gugliotti et al. Oct 2008 A1
20090031766 Stobbe Feb 2009 A1
20090033491 Saunders Feb 2009 A1
20090102610 Lance Apr 2009 A1
20090160427 Drake et al. Jun 2009 A1
20090236486 Matsuno et al. Sep 2009 A1
20090273465 Shamir et al. Nov 2009 A1
20100033325 Vilkomirski et al. Feb 2010 A1
20100052907 Shannon et al. Mar 2010 A1
20110195701 Cook et al. Aug 2011 A1
20120299755 Jones Nov 2012 A1
20140020295 Bonahoom et al. Jan 2014 A1
20140113563 Almomani et al. Apr 2014 A1
20140157842 Almomani et al. Jun 2014 A1
20140176305 Aljadeff Jun 2014 A1
20140267740 Almomani et al. Sep 2014 A1
20150091696 Fisher Apr 2015 A1
20150197408 St. Germain Jul 2015 A1
20160089303 Latorraca Mar 2016 A1
20160110637 Lehovetzki Apr 2016 A1
20160117899 Chevalier et al. Apr 2016 A1
20160140432 Lehovetzki May 2016 A1
20170085843 Scalisi Mar 2017 A1
20170098335 Payack, Jr. Apr 2017 A1
20170206385 Barney Jul 2017 A1
20170239565 Morishita et al. Aug 2017 A1
20180007504 Kumar Jan 2018 A1
20200149316 Parker et al. May 2020 A1
20200312072 Myers Oct 2020 A1
20210298363 Daugherty Sep 2021 A1
20210402885 Boyd Dec 2021 A1
20220117314 Daugherty Apr 2022 A1
Foreign Referenced Citations (10)
Number Date Country
103896122 Jul 2014 CN
103502549 Nov 2015 CN
2299251 Mar 2011 EP
2878290 Jun 2015 EP
2002004280 Jan 2002 WO
WO 2005028790 Mar 2005 WO
WO-2012122697 Sep 2012 WO
WO 2014012564 Jan 2014 WO
WO 2014012677 Jan 2014 WO
WO 2017123949 Jul 2017 WO
Non-Patent Literature Citations (12)
Entry
USPTO as International Searching Authority (ISA); International Search Report and Written Opinion of the ISA; pp. 1-12; dated Jun. 6, 2017 (dated Jun. 6, 2017) (USPTO Alexandria, Virginia US).
Attorney for Go Lock Technology, Inc.; Amendments under Article 34; total of 14 pages; submitted in International Application PCT/US2017/018215 “Portable Lock with Integrity Sensors” dated Sep. 15, 2017 (dated Sep. 15, 2017) (USPTO Alexandria Virginia US).
USPTO as International Searching Authority (ISA); International Preliminary Report on Patentability; pp. 1-4; dated Feb. 5, 2018 (dated Feb. 5, 2018) (USPTO Alexandria, Virginia US).
USPTO as International Searching Authority (ISA); International Search Report and Written Opinion of the ISA; pp. 1-8; dated Mar. 26, 2018 (dated Mar. 26, 2018) (USPTO Alexandria, Virginia US).
USPTO; Office Action (non-final); issued for U.S. Appl. No. 29/589,832, filed by Keller et al.; submitting cover page, Office Action Summary, Detailed Action, and Notice of References Cited; total of 5 pages; relevant passages include those on pp. 3-4; dated Nov. 1, 2017 (dated Nov. 1, 2017) (USPTO Alexandria, Virginia).
Attorney for Keller et al.; Amendment and Response to Office Action; total of 6 pages; relevant passages include those on pp. 2-6; submitted in U.S. Appl. No. 29/589,832 dated Jan. 26, 2018 (dated Jan. 26, 2018) (USPTO Alexandria, Virginia).
USPTO; Notice of Allowance; issued for U.S. Appl. No. 29/589,832, filed by Keller et al.; submitting Notice of Allowance and Fee(s) Due and Notice of Allowability for Design Application; total of 6 pages; relevant passages include those on pp. 5-6; dated Feb. 26, 2018 (dated Feb. 26, 2018) (USPTO Alexandria, Virginia).
CIPO (Canada Intellectual Property Office); Examiner's Report; issued for Canada Application 175,754; total of 2 pages; relevant passages include those on pp. 1-2; dated Feb. 20, 2018 (dated Feb. 20, 2018) (CIPO Gaineau, Quebec, Canada).
Attorney for Go Look Technology, Inc.; Letter with amendments; total of 12 pages; relevant passages include those on pp. 1-12; submitted in Canada Application 175,754 dated Apr. 15, 2018 (dated May 14, 2018) (CIPO Gaineau, Québec, Canada).
Attorney for Keller et al.; Preliminary Amendment; total of 16 pages; submitted in U.S. Appl. No. 29/648,661 (a Continuation of U.S. Appl. No. 29/589,832) dated May 23, 2018 (dated May 23, 2018) (USPTO Alexandria, Virginia).
DeWalt DS500S MobileLock Portable Alarm with GPS, “Product & Accessories,” archived webpage at http://www.DeWaltMobileLock.com:80/product -overview-and-specs, dated Nov. 8, 2014 (Nov. 8, 2014) captured via Internet Archive (https://web.archive.org).
DeWalt MobileLock “Portable Alarm Features,” archived webpage at http://www.DeWaltMobileLock.com:80/product -portable-alarm-features, dated Nov. 19, 2014 (Nov. 19, 2014) captured via Internet Archive (https://web.archive.org).
Related Publications (1)
Number Date Country
20200270909 A1 Aug 2020 US
Provisional Applications (1)
Number Date Country
62296011 Feb 2016 US
Continuations (1)
Number Date Country
Parent 15998905 US
Child 16864334 US