Exemplary systems, devices, and methods are directed to secure storage.
Many people own guns, jewelry, and other dangerous or valuable objects that they wish to keep securely hidden from view in their homes. However, it is difficult to securely store items in devices that require a passcode or physical key, as passcodes and keys may be difficult to locate or remember, especially in an emergency. Particularly for gun owners, who may wish to access a gun quickly in the event of a home invasion or other safety threat, it is desirable to be able to access a storage device without having to locate a key or remember a code.
It is also desirable to remotely monitor the status of a storage device and determine if it is open or closed, as well as to be able to open or close a storage device remotely. It is further desirable to be able to monitor which person(s) may have access to a storage device.
Homeowners who desire quick access to their valuables recognize that it is ideal if such valuables are stored in the main living quarters, hidden in “plain sight.” This allows homeowners to easily and quickly access their belongings without having to walk down to a basement, attic, or closet where many people otherwise store their guns and valuables.
Exemplary embodiments described herein address these problems and more. Exemplary embodiments provide a secure storage device that uses a biometric sensor to ensure that only approved persons can access stored objects. Exemplary embodiments provide a secure storage device with multiple compartments, allowing for access to each compartment to be monitored, recorded, and only given to authorized persons. Exemplary embodiments also provide a device that can be used as a coffee table, has a bidirectional table top that can move in two directions to provide access to multiple compartments, and also has a drawer for storage.
Other aspects and features of the invention will become apparent to those skilled in the art upon review of the following detailed description of exemplary embodiments along with the accompanying drawing figures.
In addition to the features mentioned above, other aspects of the present invention will be readily apparent from the following descriptions of the drawings and exemplary embodiments, wherein like reference numerals across the several views refer to identical or equivalent features, and wherein:
Various embodiments of the present invention will now be described in detail with reference to the accompanying drawings. In the following description, specific details such as detailed configuration and components are merely provided to assist the overall understanding of these embodiments of the present invention. Therefore, it should be apparent to those skilled in the art that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present invention. In addition, descriptions of well-known functions and constructions are omitted for clarity and conciseness.
Embodiments of the invention are described herein with reference to illustrations of idealized embodiments (and intermediate structures) of the invention. As such, variations from the shapes of the illustrations as a result, for example, of manufacturing techniques and/or tolerances, are to be expected. Thus, embodiments of the invention should not be construed as limited to the particular shapes of regions illustrated herein but are to include deviations in shapes that result, for example, from manufacturing.
Referring to the figures, an exemplary embodiment of a storage device is shown. As shown in at least
Internally, the device 10 may be generally comprised of an upper compartment 30 and a lower compartment 32. A drawer 34 may be located in the lower compartment 32, and the drawer 34 may be slidably mounted to the chest 12 such that it opens through an aperture 36 in the front side 15 of the outer chest 12. The drawer 34 may be slidably mounted to the chest 12 through a pair of drawer slide assemblies 38 located on either side of the drawer 34.
The upper compartment 30 of the chest 12 may contain two storage areas 40 separated from one another and defined in part by a central motor compartment 42 that spans the inner depth of the upper compartment 30. A shelf 41 may provide the bottom surface for the two storage areas 40 and the central motor compartment 42.
The table top 18 is able to move relative to the inner cavity from a closed position, wherein it covers the entire inner cavity 22, as shown in
The means for moving the table top 18 is illustrated in at least
As illustrated in
Referring to
The drives 56 may comprise one or more drive mechanisms 57, such as but not limited to a gear, for coupling to a motor 58. Such coupling may be done directly or indirectly, such as through associated equipment (e.g., gears, belts, chains, racks, pinions, cams, levers, etc.) Regardless, operation of the motor may engage the drive mechanisms 57 and cause rotation of the drives 56, which may in turn result in rotation of, or other engagement with, a locking mechanism 54C for the respective cam lock(s) 54. Such engagement of the locking mechanism 54C may cause a locking device to be rotated or otherwise moved between a locked position and an unlocked position. In the locked position, the locking mechanism 54C may be operated such that the lower portion 54A of the cam lock 54 is secured to the upper portion 54B of the cam lock 54. In this way, the table top 18 may be prevented or otherwise obstructed from movement such that the compartments 30 and 32 located thereunder may not be accessed. In the unlocked position, the locking mechanism 54C may be operated such that the lower portion 54A of the cam lock 54 is not secured to the upper portion 54B of the cam lock 54. In this way, the table top 18 may be moved such that the compartments 30 and 32 located thereunder may not be accessed.
Referring to
A hex long bar 62 may be located along the rear wall of the chest 12 such that the cam locks 60 may be mounted thereto. The hex long bar 62 may extend through each locking mechanism 60C of the respective cam lock 60 and may be rotated or otherwise operated by a dedicated motor. Alternatively, or in addition, the hex long bar 62 may be rotated or otherwise operated, directly or indirectly, by the motor 58. Regardless, rotation of the hex long bar 62 may cause the upper portions 60B and lower portions 60A of the cam locks 60 to engage or disengage one another similar to as described with regard to
An embodiment of 90-degree drive assembly 56 is shown in
In an exemplary embodiment, operation of each motor (e.g., pinion motor 50 and motor 58) may be controlled by a central computer 80 located inside the lower compartment 32. The central computer 80 may comprise a processor, network communications device, and electronic storage device. The electronic storage device may be a non-transitory storage medium and may comprise software instructions, which when executed cause the processor to perform various functions as described herein. Information may be communicated to one or more remote devices by way of the network communication device which may be connected to such remote devices by way of a network such as the internet, intranet, cellular network, world wide web, or the like. Such remote devise may include, but are not limited to, a smartphone, tablet, personal computer, smart watch, or the like. Connection of the network connection device to the network may be made by wired or wireless connection.
The central computer 80 may be located underneath the front drawer 34 as shown in
As shown in
The central computer 80 may be configured to prevent the motors from moving into an unlocked position until appropriate verification or identity is received from the biometric sensor 84 or another device. In other exemplary embodiments, the central computer 80 may be configured leave the device 10 in a locked position unless and until appropriate verification of identity is received from the biometric sensor 84 or other device, at which time the central computer 80 may be configured to automatically move the device 10 into an unlocked position.
The central computer 80 may be programmed to direct different types of access to the device based on the fingerprint of a user. For example, programming may dictate that if a particular user places their index finger on the sensor 84 and it is accepted, the table top 18 may slide to the left, exposing the upper right compartment 30 and allowing a user to either access items in the upper right compartment 30 or leave items in the upper right compartment 30. The same user may then place their index finger on the sensor 84 and the table top 18 will close and keep the upper right compartment 30 secure. However, if the same user places their ring finger on the sensor 84 and it is accepted, the central computer 80 may grant access to the upper left compartment 30 and may direct the movement of the table top motor 50 to move the table top 18 to the right, thereby exposing the upper left compartment 30. Similarly, a thumb print by the same user may allow access to the drawer 34.
The central computer 80 may also be programmed to give different access permissions to different users. For example, one user may only have access to the upper compartments 30, while other users may only have access to the front drawer 34. This may be done through the establishment role-based permissions, where an administrator sets up different roles and corresponding access to be executed by the central computer 80 in communication with both the biometric sensor 84 and the motors.
In some embodiments, the device 10 may be programmed to expose the upper compartments 30 and/or open the bottom drawer 34 while also sending an alert to notify security, police, or other emergency personnel that someone is in danger. For example, in an embodiment the same fingers on an approved user may allow for the same functions (e.g., each thumb opens the bottom drawer 34, each index finger slides the table top to the left exposing the upper right compartment). However, if the user uses their left hand, the device may not only allow access to the desired compartment 30 or 32 or drawer 34, but it may also send a silent alert to a police department by way of the network communications device. This may allow a user in a confrontational setting (such as a home break-in) to access the device 10 while also alerting authorities that they are in danger. One of ordinary skill in the art will recognize that the device 10 may be programmed in variety of various ways and that different types of biometric information may be used to allow access. For example, in some embodiments voice recognition or retinal scan technology may be used, as well as radio frequency identification devices (“RFID”). The voice reorganization may be utilized to accept verbal commands from the user. Such verbal commands may include, for example without limitation, commands to open, close, arm, or disarm the device 10. The RFID device may be embedded in an ordinary object such as, but not limited to, a wedding band, bracelet, or the like. Alternatively, or in addition, non-biometric devices may be utilized such as, without limitation, keypads or keyboards configured to receive a password, a lock configured to receive a key, a series of buttons configured to be depressed in a sequence, or the like.
In an exemplary embodiment the device 10 may be powered through a hardwire connection to a power source. The hardwiring may be routed through one of the legs of the chest, which also serves to keep it hidden. In some embodiments the device may also contain an internal battery backup for power outage events. In some embodiments the particular leg of the chest where the wiring is routed may be reinforced with steel or other materials to prohibit removal and/or sawing off of the leg to cut power to the device. In other embodiments the device may also have a power cord that can be plugged into an outlet. As shown in
While the embodiments of the figures could be used as a coffee table, chest, or other table in a household setting, it will be appreciated by one of ordinary skill in the art that other embodiments could be modified to be used as kitchen islands or other types of furniture in a home, office, or commercial setting, making their secure storage functions unknown to visitors and intruders. Furthermore, it will be recognized that the location and number of drawers 34 and compartments 30 and 32 may be modified as desired.
In certain embodiments the device may be remotely controlled and monitored, such as through the use of a smart phone. In such embodiments, communications between the smart phone and device may be made through the use of cell and/or internet and may be encrypted to protect security. Encryption may be achieved through use of Tor network encryption or other type of network encryption. In such embodiments, a user may receive notifications and alerts on their smart phone or other device regarding operation of the device 10. For example, without limitation, one or more users may be notified each time the device 10 is accessed, or when an attempt to access is made, with notification of whether access was allowed or denied.
Exemplary embodiments may include safety sensors installed on the table top 18 or in the upper compartments 30 to prevent the table top from moving when a hand or other object is in the way. Safety sensors may use infrared technology or other motion detecting technology.
Exemplary embodiments may include one or more vibration and/or motion sensors located in one or more positions around the device 10 that can be used to detect the presence of others around the device 10. Such embodiments may further include means to engage cameras or additional sensors located in proximity to the device 10 to visually record or otherwise monitor the actions of unauthorized persons. In one embodiment, a user can “arm” the device 10 either remotely or manually. In the “armed” mode, the device 10 will close and engage all locks. The device 10 may also detect vibration and/or motion and if detected, will cause cameras in close proximity to activate and record, as well as push video footage to smart phones and other mobile devices. This embodiment allows a user to monitor their home and know not only if an unauthorized person is in their home but can let them see what the unauthorized person is doing in their home.
In some embodiments, the central computer 80 may further comprise a GPS beacon or other location detection device that is communication with smart phone or other mobile user device. The device 10 may automatically go into “armed” mode when a user's phone (or other mobile device) is located beyond a pre-determined radius from the device 10. For example, if a user syncs their smart phone with the central computer 80 having the location detection functionality, the user can program the device to automatically arm when the user's phone is no longer within a 100-foot radius of the device 10. This feature can help ensure that the device 10 is armed when the user leaves the home and reduce the amount of user error. Those of skill in the art will recognize that any radius or other type of geofencing may be programmed. In other exemplary embodiments, the location of the device 10 may be programmed into the central computer 80 such that similar functionality may be achieved.
While in some embodiments the chest may be made primarily of wood, in other embodiments the chest may be made of metal, plastic, and other materials, and combinations thereof, as desired.
While certain exemplary systems, devices, and methods are described in detail above, the scope of the invention is not considered limited by such disclosure, and one of ordinary skill in the art would appreciate that modifications are possible without departing from the spirit of the invention. As such, it is intended that the present invention only be limited by the terms of the appended claims.
This application is a continuation-in-part of and claims the filing benefit of PCT Application No. PCT/US2017/024867 having an international filing date of Mar. 29, 2017, which claims the benefit of U.S. Provisional Application No. 62/314,904, filed Mar. 29, 2016, and makes a claim of priority thereto. The entire contents of the '904 provisional application and the '867 PCT application are hereby incorporated by reference as if fully recited herein.
Number | Name | Date | Kind |
---|---|---|---|
895640 | Hullhorst | Aug 1908 | A |
4893885 | Borello | Jan 1990 | A |
D331334 | Hollington | Dec 1992 | S |
6209977 | Vondrejs | Apr 2001 | B1 |
9534422 | Andersen | Jan 2017 | B1 |
9962316 | Latorraca | May 2018 | B2 |
20020078865 | Kuvshinikov | Jun 2002 | A1 |
20040123780 | Butts, Jr. | Jul 2004 | A1 |
20040173127 | Chiang | Sep 2004 | A1 |
20050251687 | Bachinski et al. | Nov 2005 | A1 |
20100111598 | Baur | May 2010 | A1 |
20110001407 | Stradiota | Jan 2011 | A1 |
20110074543 | Kaczmarz | Mar 2011 | A1 |
20110199183 | Marsden | Aug 2011 | A1 |
20150250312 | Barrett | Sep 2015 | A1 |
20160138300 | Dias | May 2016 | A1 |
20170356219 | Roatis | Dec 2017 | A1 |
20180216369 | Roatis | Aug 2018 | A1 |
Entry |
---|
Rustic Oak Storage Coffee Table with Sliding Top and Drawers, Sarta.co.uk. Apr. 13, 2015 US. |
Number | Date | Country | |
---|---|---|---|
20190053621 A1 | Feb 2019 | US |
Number | Date | Country | |
---|---|---|---|
62314904 | Mar 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/US2017/024867 | Mar 2017 | US |
Child | 16146510 | US |