The present disclosure relates to a smart lock and a system comprising such a smart lock.
Smart locks are electromechanical locks that are designed to perform locking and unlocking operations when instructions are received from an authorised user or device. Such instructions are often received using a wireless communication protocol. Smart locks typically require two main constituents in order to work: the lock and the key. In the case of smart locks, the key is not usually a physical key but may be a cryptographic key, which may be provided by a smartphone or a card or key fob configured for this purpose. Such cryptographic keys can be used for the authentication needed to unlock the smart lock. This key can be sent to the recipient smartphone over standard messaging protocols. Once this key is received, the recipient will be able to unlock the smart lock, for example during a specified period of time. Many smart locks are able to grant or deny access remotely via a mobile application. Moreover, certain smart locks include built-in internet connections that allow for monitoring, such as access notifications or cameras to show the person requesting access. Smart locks are most commonly provided for controlling access to buildings, although smart bicycle locks have also been described.
Bicycle-sharing systems allow bicycles to be made available for shared use to individuals on a short-term basis. Many bicycle-sharing systems allow people to borrow a bicycle from a dock and return it at another dock belonging to the same system. Docks are special bicycle racks that lock bicycles and allow them to be released by computer control. Typically, a user enters payment information, and the computer unlocks a bicycle. The user returns the bicycle by placing it in the dock, which locks it in place. Dockless systems also exist and in such systems, bicycles may be left in an immobilised state in the street (rather than locked to a physical object) for the next user to use. From the user's perspective, an advantage of such systems is that they do not need to carry a bicycle or a lock.
While existing smart locking systems and bicycle-sharing systems offer some advantages, there is a need for more flexible systems. Moreover, rented bicycles are not always kept in good condition, meaning that a rented bicycle may not be safe. It is an object of the present to disclosure to address these and other problems with known locking and bicycle-sharing systems.
Against this background and in accordance with a first aspect, there is provided a smart lock according to claim 1. A system according to claim 24 is also provided. The present disclosure relates to electronic smart locks that can be retrofitted to existing bicycle racks and which are typically operated (opened and closed, or locked and unlocked) by a user's smartphone. To this end, a bicycle rack attachment is provided, which configured to attach a smart lock to a bicycle rack, and thereby to allow the smart locks described herein to be retrofitted to existing bicycle racks.
Preferred locks described herein have no external keyholes, ports, or interfaces (e.g. keypad, fingerprint reader etc.). Moreover, the smart locks described herein generally do not connect to the internet and the smart locking mechanisms can be operated without a direct internet connection. Additionally, the locks described herein are capable of being retrofitted without the need to modify existing infrastructure. Thus, the smart locks described herein are convenient, durable and can have low power requirements.
Because the locks described herein can be retrofitted to existing bicycle racks, they can be provided with rechargeable batteries avoiding the need for connections to external power sources. Moreover, the locks can be extremely secure and durable, because they do not need to be transported by a user on their bicycle. Accordingly, a 4 mm thick (or more) hardened steel body can be used in combination with a 12 mm thick (or thicker) chain, and the locks described herein may weight 15 kg (or more) per unit. The smart locks described herein may have different grades and thicknesses of chain (or cable) to suit different levels of risk in the environments where they will be deployed. For example, an indoor office lock may only require a lighter and easier to use 8 mm chain or a Kevlar-braided security cable. Nevertheless, the locks described herein can be significantly more robust than the locks that bicycle users typically carry around when bicycling. Moreover, because a user can use their own bicycle, rather than a shared bicycle, they do not run the risk of using a bicycle that is poorly-maintained, so safety is improved.
Access keys for the smart locks are generated by servers of the systems described herein and sent to a user's phone while the phone is connected to the internet. These keys are temporarily stored on the user's phone to be used with the smart locks of the present disclosure. In the context of this disclosure, any reference to a “key” or “keys” refers to a sting of code that gives access to a digital system and not to a physical key. The keys described herein may comprise a message (containing a time-stamp, user ID, access information, and any logs) that has been encrypted with a cipher. Only the server and the lock may be aware of what cipher is required to decrypt the message. Different locks will have different ciphers so that even if a thief steals the hardware and manages to obtain the code from the chip's memory, they would not be able to access other locks because of the unique cipher used.
It will be appreciated that bicycles and bicycle racks are referred to extensively herein but are not themselves part of the aspects and embodiments of this disclosure. The disclosure relates to smart locks that are suitable for attaching existing bicycles to existing bicycle racks.
The present disclosure will now be described by way of example, with reference to the accompanying figures, in which:
In
In
The lock 100 itself has no internet capabilities and so the lower half of
The phone 195 acts as a data mule for the data log of the lock 100, so that the lock 100 can be installed and used in areas with no internet connection (e.g. in underground parking, etc.). In particular, the phone 195 temporarily stores data logs before transmitting the data logs to the cloud server 190 once the phone 195 regains internet connectivity. If the user's phone 195 has internet access when the lock 100 sends its status data logs, then they are immediately sent to the cloud server 190. Thus, connectivity is assured even in scenarios in which a mobile connection is not typically available. Accordingly, the architecture shown in
In
A user's cloud-generated key is only capable of activating LMS1, 130A, which is shown on the left of
A system operator (otherwise known as a system administrator) is able to activate both of the LMS units 130A, LMS1 and 130B, LMS2 with an operator key. This operator key allows them to replace the chain should it be damaged (by removing both ends from the LMS units 130A, LMS1 and 130B, LMS2), but also allows them to access the security bolt cover 124 The security bolt cover 124 may be accessible by removing the B side of the securing element, which allows the back-end of the lock to be removed (as explained later with reference to
In generalised language, the bicycle rack attachments described herein may be configured so that at least a portion of the bicycle rack attachment (e.g. one or more fasteners, such as bolts 123A and/or 123B, or any other part of the bicycle rack attachment that might be vulnerable to tampering) is concealed by a body (e.g. the main body 125) of the smart lock when the smart lock is attached to the bicycle rack. Additionally or alternatively the fasteners may be concealed by the bicycle rack attachment itself. In some embodiments, the bicycle rack attachment and the body of the smart lock may collectively conceal the fasteners. Concealing a portion of the bicycle rack attachment can help to reduce the risk of someone being able to tamper with the bicycle rack attachment and thereby remove the smart lock from the bicycle rack. The bicycle rack attachments may comprise at least one fastener configured to attach the smart locks described herein to a bicycle rack, and preferably comprise at least two fasteners configured to attach the smart lock to the bicycle rack. Preferably, at least one fastener (and optionally two, three or more fasteners) is (or are) concealed by a body of the smart lock when the smart lock is attached to the bicycle rack. For example, at least one fastener (and optionally two or more such fasteners) may be within a body of the smart lock. For example, a head of the fastener may be located within the body of the smart lock and a portion of the fastener may protrude outside the body of the smart lock. This may help to reduce the risk of tampering.
It will be understood that many variations can be made to the smart locks of
In
The locking pin 131A is capable of being actuated so as to releasably secure a first portion of the securing element to the smart lock. The retaining pin 132A is not motorised, but acts to ensure that the chain 121A does not fall out of the LMS1130A when in an unlocked state (e.g. to prevent the chain falling out of the lock 110 under the influence of gravity). To achieve this, the retaining pin 132A engages a corresponding indentation on the chain 121A to loosely hold the end of the chain 121A in the LMS1130A. The sensor 133A is configured to detect if the chain 121A is inserted far enough into the LMS1130A for the locking pin 131A to be capable of securing the chain 121A therein. Once the sensor 133A detects that the chain is inserted far enough into the LMS1130A, then the locking pin 131A is deployed and the sensor 133A improves reliability of the locking action.
In generalised language, the smart locks described herein preferably comprise a securing element (e.g. a chain such as the chain having ends 121A and 121B, or alternatively shackles or cables) configured to releasably secure the bicycle to the smart lock. The smart locking mechanisms described herein may comprise a first smart locking element (e.g. LMS1) configured to releasably secure a first portion (e.g. one end, such as end 121A) of the securing element to the smart lock, and/or the smart locking mechanism may comprise a second smart locking element (e.g. LMS2) configured to releasably secure a second portion (e.g. a second end) of the securing element to the smart lock.
Continuing to use the generalised terms discussed above, the smart locking mechanisms described herein may comprise a first opening configured to receive a first portion (e.g. the first end 121A) of the securing element and/or a second opening configured to receive a second portion (e.g. the second end 121B) of the securing element. The bicycle rack attachment may comprise at least one fastener (e.g. bolts 123A and/or 123B, although screws, clips and various other fasteners can be used) configured to attach the smart lock to the bicycle rack, and at least one fastener is accessible via at least one of the first opening and/or the second opening. When at least one of the fasteners is accessible only by the second opening, only an operator can access that fastener and remove the smart lock from the bicycle rack.
The smart locks described herein may further comprise a moveable cover (such as cover 124), configured to conceal at least one fastener (e.g. bolt 123A) accessible via the first opening. There may be provided a control mechanism (e.g. an actuator that is controllable by a specific, bespoke tool, or a bolt or screw that is difficult to see and access). The bespoke tool may comprise a custom screw or bolt head. Alternatively, the security cover 124 may be held in place by a standard M3 or M4 bolt, which will need to be unscrewed before the cover can be moved, and moving the cover may be achieved using a magnet on the end of a long shaft in a way that would not be immediately apparent from visual inspection. In any case, there is a control mechanism configured to control a position of the moveable cover. The control mechanism may only be accessible via an opening other than the first opening. For example, the moveable cover may be inaccessible by the opening that a regular authorised user can access and only accessible via an opening (or openings) that a system operator can access. Thus, multiple fasteners can be concealed so that authorised users have no access to the fasteners.
In general terms, the first smart locking elements described herein may be configured to be locked and/or unlocked by: a cryptographic key associated with a smart lock operator; and a cryptographic key associated with the authorised user. The second smart locking element may be configured to be locked and/or unlocked by a cryptographic key associated with a smart lock operator, and configured to be inoperable by a cryptographic key associated with the authorised user. In this way, only certain users having certain keys can access internal components of the smart lock, while allowing regular authorised users to make use of the functionality of the smart locks described herein.
Turning next to
In
In
In
It will be understood that many variations can be made to the bicycle rack attachments of
In generalised language, each of sub-figures (i) and (ii) of
Preferably, at least one of the first mounting element and/or the second mounting element conforms to a shape of the bicycle rack. For instance, the mounting elements can have the same general shape as standard types of bicycle racks so that when they are drawn together, they form a tight, secure fit. Providing a secure fit to a bicycle rack ensures that levers (e.g. crow bars) cannot easily be placed between the smart lock and the bicycle rack, thereby reducing the risk of tampering.
In
In use, a user may tap the smart locking mechanism 510 at the given location with their phone (or other mobile device). This triggers a handshake and authentication process by the smart locking mechanism 510. Once the smart locking mechanism 510 has been successfully unlocked and re-locked, the application 595 will remember where the user's bicycle has been locked. At the end of day (or whenever the user is ready to unlock their bicycle), the user can navigate to the lock. The application 595 may provide navigation instructions at this stage to assist the user.
When locking and unlocking the lock 510, a similar procedure occurs. The user taps their phone against the smart locking mechanism 510, which initiates a near-field communication (NFC) handshake with the smart locking mechanism 510, and which causes the smart locking mechanism 510 to activate its Bluetooth. At this stage, the phone sends a secure code generated by a server and a unique user ID to the smart locking mechanism 510 over Bluetooth. In response, the lock smart locking mechanism logs the code and user ID for this particular session and the user can unlock the lock. In generalised language, the smart locking mechanism may be configured to (directly) communicate wirelessly (e.g. by Bluetooth Low Energy (BLE) and/or near-field communication (NFC)) to: receive (e.g. from a smartphone or custom card) one or more cryptographic keys for locking and/or unlocking the smart locking mechanism (e.g. to lock/unlock at least one of a first smart locking element and a second smart locking element); and/or transmit a data log to the mobile device of the authorised user (e.g. so that the mobile device can then transmit the data log to the servers for maintenance, billing and/or management of the smart lock).
Sensors in the smart locking mechanism 510 (e.g. sensor 133A) detect when the securing element (e.g. the chain, cable, and/or shackle) is removed from the smart locking mechanism 510 and automatically re-lock the smart locking mechanism 510 when the securing element is re-inserted. At this stage, the smart locking mechanism 510 is in a locked state and can only be opened by a phone with same user ID following a similar procedure. As noted previously, the smart locking mechanism 510 can use the user's phone to get data into and out of places with no reception, such as underground carparks, by providing its data logs to the authorised user's phone so that the phone can send those data logs to a server once connected to the internet.
Turning next to
Additionally, in
In
Turning next to
Turning next to
The securing element 930 may be retractable (e.g. through the use of springs or other resilient materials within the pole) so that it returns into the pole when not in use, although this is optional.
Advantages of the implementation of
Turning next to
The locking protrusion 1031A may be isolated from the motor 1035A and biased towards the recess of the securing element. This is achieved using a retaining spring 1034A (any resilient biaser can be used), which urges the locking protrusion 1031A towards the recess of the securing element (i.e. into a locked position, in which the end of securing element is held within the respective opening). This provides similar functionality to the retaining protrusion 132A of
It is preferable that the locking protrusion 1031A and the locking pin 1032A are physically separate for the system to work efficiently. By providing the locking protrusion 1031A and the locking pin 1032A as separate components, the motor 1035A does not need to act against the force of the retaining spring 1034A when pulling the locking pin 1032A back to allow free movement of the locking protrusion 1031A. This saves energy and avoids placing the motor under extra stress. Nevertheless, the locking pin 1032A and the locking protrusion 1031A could be integrally formed in some cases.
In the generalised terms used previously, the retaining protrusion may be a locking pin of the smart lock. The retaining protrusions described herein may be biased towards a locked state. For example, the retaining protrusions described herein may be biased such that the retaining protrusion holds the securing element in place even when the smart locking mechanism is unlocked, without the smart locking mechanism actually being locked. This may allow a user to remove the securing element from the smart locking mechanism while preventing the securing element from falling out of the locking mechanism too easily.
A further difference in this smart locking element 1030A is there are first and second sensors 1033A1 and 1033A2, rather than a single sensor 133A. The first sensor 1033A1 senses the position of the locking pin 1032A while the second sensor senses the position of the end of the chain. This provides additional reliability, by ensuring that the locking pin 1032A is in a locked position, and also that the chain is in the correct position to be locked. In general terms, there may be a plurality of sensors, configured to sense whether the smart locking mechanism is in a locked or unlocked position (e.g. by sensing the position of the locking pin 1032A). If one sensor detects that the securing element is not secured but the smart locking element is in a locked position, then an alert (e.g. an audible alert) may be generated to prevent a user failing to lock their bicycle securely. The sensors can be of any type (including preferably microswitches, although induction sensors can also be used in principle).
In some embodiments, the first 1033A1 and/or second sensor 1033A2 could comprise a ball bearing that gets pushed back to activate a microswitch when the chain plug is fully inserted into the chain socket. A similar microswitch may be positioned behind the locking pin 1032A and may be activated by the locking pin 1032A when a user pulls the securing element out of the smart locking mechanism. These 2 switches may work together to allow an on-board processor to know the current lock state of the smart lock.
In
The removable surface 1225B can be secured to the remainder of the body of the smart locking mechanism 1225A. The removable surface of the body of the smart locking mechanism may be secured by the smart locking element that is operable by an operator of the smart lock (but not a regular authorised user of the smart lock), such as the smart locking element 1230B, which operates in the same way as elements 130B, LMS2 or 1030B, LM2 described previously. Thus, the surface of the smart locking mechanism 1225B may be removable using the administrator key (but not the key of a regular authorised user). In
In
In
The attachment mechanism comprises three parts, 1341, 1342 and 1343, held together by, in this embodiment, three fasteners which comprise 2×M12 (or alternatively M10) grub screws 1323B and 1323C and an M12 bolt 1323A. The screws and bolt act as fasteners that secure the smart locking mechanism 1310 to the bicycle rack attachment and secure the bicycle rack attachment to a bicycle rack. The grub screws 1323B and 1323C are used to apply pressure directly to the bicycle rack. The central M12 bolt 1323A holds the smart lock to the attachment mechanism and sits at the bottom of the lock's opening for receiving a securing element.
The mount is made from 3 parts 1341, 1342 and 1343, and is held together by a plurality of (five) fasteners: 2× standard M6 bolts 1723D and 1723E, 2× standard M12 bolts 1723A and 1723B, and 1× countersunk M12 bolt 1723C. The 2× M6 bolts 1723D and 1723E are used to apply vertical pressure to the rack by tightening together the base (rightmost) 143 and middle 142 plates. The top “cover” (leftmost) plate 141 applies lateral pressure when tightened using the countersunk M12 bolt 1723C. The 2× standard M12 bolts 1723A and 1723B hold the lock to the attachment mechanism and sit at the bottom of the lock's securing element openings (i.e. the openings into which the chain may be inserted).
The uppermost two M12 bolts 1723A and 1723C work together to apply a lateral force to the rack by clamping the base plate 1743 to the middle 1742 and top 1741 plates. The lower M12 bolt 1723B is mainly to hold the lock 1710 in position on the mount, but also makes it harder for someone to use leverage to dislodge the mount. The M6 bolts 1723D and 1723E at the top pull on the middle plate 142 by threading into the base plate 1743.
Thus, while the attachment mechanisms of
It will be understood that many variations may be made to the above apparatus, systems and methods whilst retaining the advantages noted previously. For example, where specific components have been described, alternative components can be provided that provide the same or similar functionality.
The disclosure has been described by reference to a single smart lock. However, it will be appreciated that plural smart locks as described herein can be provided, to allow users to rent bicycle parking space at numerous locations without needing to carry a lock. Moreover, existing bicycle parking locations can be converted into smart bicycle parking using the retrofittable smart locks described herein.
Thus, for example, the disclosure provides a system for permitting an authorised user (or multiple such users) to use a smart lock (or multiple smart locks at disparate locations), the system comprising: a server configured to generate a cryptographic key associated with the authorised user (or users) and to provide the generated cryptographic key to a mobile device of the authorised user; and a smart lock as described herein, configured to be locked and/or unlocked by the generated cryptographic key. Thus, users can temporarily use the smart locks disclosed herein and the locks can be used by others. Such a system can be retrofitted to upgrade existing cycle parking infrastructure, avoiding waste (e.g. there is no need to remove/discard old infrastructure) and improving convenience.
The smart locks described herein may have various components mounted at either end of the chassis. For example, one end of the smart locks described herein may house LEDs and antennas, with a polycarbonate lens to diffuse the light for the LEDs. The other end may have a speaker grille. For example, the smart locks described herein may have an alarm speaker to allow sound out of the case. In all embodiments of the present disclosure, the locking mechanism's housing may comprise a processor that operates the lock, which may sit in a watertight enclosure.
As described previously, the smart locks described herein may be configured to transmit a data log to the mobile device of an authorised user in response to receiving a generated cryptographic key from the mobile device of the authorised user. In this way, data logs can be provided to users and the server may be configured to receive, from the mobile device of an authorised user, the data log. Also provided herein is an application for a mobile device of an authorised user, the application configured to receive the data log from the smart lock and to transmit the data log to the server. Data logs may comprise key validation information and measurements of usage and session duration (e.g. for billing purposes), and tampering of the lock (e.g. for maintenance purposes). The applications may be configured to store the data log temporarily and to delete at least a portion of the data log after the data log has been transmitted to the server. The applications may be configured to store the data log temporarily while an internet connection is unavailable and to transmit the data log to the server after an internet connection becomes available. Thus, the locks described herein can be installed in locations that do not have reliable internet access, by leveraging users' devices.
It will be appreciated that embodiments of the disclosure may be implemented using a variety of different information processing systems. In particular, although the figures and the discussion thereof provide exemplary computing systems and methods, these are presented merely to provide a useful reference in discussing various aspects of the disclosure. Embodiments may be carried out on any suitable data processing device, such as a personal computer, laptop, personal digital assistant, mobile telephone, set top box, television, server computer, etc. Of course, the description of the systems and methods has been simplified for purposes of discussion, and they are just one of many different types of systems and methods that may be used. It will be appreciated that the boundaries between logic blocks are merely illustrative and that alternative embodiments may merge logic blocks or elements, or may impose an alternate decomposition of functionality upon various logic blocks or elements.
It will be appreciated that the above-mentioned functionality may be implemented as one or more corresponding modules as hardware and/or software. For example, the above-mentioned functionality may be implemented as one or more software components for execution by a processor of the system. Alternatively, the above-mentioned functionality may be implemented as hardware, such as on one or more field-programmable-gate-arrays (FPGAs), and/or one or more application-specific-integrated-circuits (ASICs), and/or one or more digital-signal-processors (DSPs), and/or other hardware arrangements. Method steps implemented in flowcharts contained herein, or as described above, may each be implemented by corresponding respective modules. Moreover, multiple method steps implemented in flowcharts contained herein, or as described above, may be implemented together by a single module.
It will be appreciated that, insofar as embodiments of the disclosure are implemented by a computer program, then a storage medium and a transmission medium carrying the computer program form aspects of the disclosure. The computer program may have one or more program instructions, or program code, that, when executed by a computer, causes an embodiment of the disclosure to be carried out. The term “program” as used herein, may be a sequence of instructions designed for execution on a computer system, and may include a subroutine, a function, a procedure, a module, an object method, an object implementation, an executable application, an applet, a servlet, source code, object code, a shared library, a dynamic linked library, and/or other sequences of instructions designed for execution on a computer system. The storage medium may be a magnetic disc (such as a hard drive or a floppy disc), an optical disc (such as a CD-ROM, a DVD-ROM or a BluRay disc), or a memory (such as a ROM, a RAM, EEPROM, EPROM, Flash memory or a portable/removable memory device), etc. The transmission medium may be a communications signal, a data broadcast, a communications link between two or more computers, etc.
Each feature disclosed in this specification, unless stated otherwise, may be replaced by alternative features serving the same, equivalent or similar purpose. Thus, unless stated otherwise, each feature disclosed is one example only of a generic series of equivalent or similar features.
As used herein, including in the claims, unless the context indicates otherwise, singular forms of the terms herein are to be construed as including the plural form and, where the context allows, vice versa. For instance, unless the context indicates otherwise, a singular reference herein including in the claims, such as “a” or “an” (such as a smart locking element or a mounting element) means “one or more” (for instance, one or more smart locking elements, or one or more mounting elements). Throughout the description and claims of this disclosure, the words “comprise”, “including”, “having” and “contain” and variations of the words, for example “comprising” and “comprises” or similar, mean that the described feature includes the additional features that follow, and are not intended to (and do not) exclude the presence of other components.
The use of any and all examples, or exemplary language (“for instance”, “such as”, “for example” and like language) provided herein, is intended merely to better illustrate the disclosure and does not indicate a limitation on the scope of the disclosure unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the disclosure.
Any steps described in this specification may be performed in any order or simultaneously unless stated or the context requires otherwise. Moreover, where a step is described as being performed after a step, this does not preclude intervening steps being performed.
All of the aspects and/or features disclosed in this specification may be combined in any combination, except combinations where at least some of such features and/or steps are mutually exclusive. In particular, the preferred features of the disclosure are applicable to all aspects and embodiments of the disclosure and may be used in any combination. Likewise, features described in non-essential combinations may be used separately (not in combination).
A method of manufacturing and/or operating any of the disclosed herein is also provided. The method may comprise steps of providing each of the features disclosed and/or configuring or using the respective feature for its stated function.
Number | Date | Country | Kind |
---|---|---|---|
2110059.9 | Jul 2021 | GB | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/GB2022/051817 | 7/13/2022 | WO |