Existing security devices are designed to limit access to individuals based on some unique knowledge or physical attribute such as a code, fingerprint, key, etc. For example, existing child safety locks are designed to limit children's access to hazardous areas such as kitchen or medicine cabinets. Current child safety locks require the user to perform an action that cannot commonly be performed by a child. The additional step or use of special equipment required to operate a door, drawer, etc. adds inconvenience, additional time, frustration and, in some cases, confusion to the user. The added inconvenience, time, frustration and confusion can lead the user to disable or remove the child safety lock.
The present document concerns implementing systems and methods for operating a locking device. The methods comprise: performing operations by at least one sensor of the locking device to generate sensor data indicating at least one of a size of an animal and a shape of an animal; comparing, by a processing unit of the locking device, the size of the animal to at least one threshold value and/or the shape of the animal to a reference shape; classifying, by the processing unit, the animal as an authorized animal or an unauthorized animal based on the comparing; and granting or denying access to an internal area of a compartment based on the classifying. The granting comprises actuating a lock of the locking device such that the lock transitions from a locked position to an unlocked position.
The sensor(s) can include, but are not limited to, a touch sensor, a touchless sensor, and/or a capacitive touch sensor. The sensor data may specify a change in capacitance detected by the capacitive touch sensor, and/or a change in an electric field and/or a characteristic of a reflected signal received by the sensor(s). The characteristic of the reflected signal may comprise an intensity of a light and/or a strength of a reflected signal.
The sensor(s) may be at least partially integrated with a grip structure or an access panel of the compartment. The grip structure may be used as a sensor probe for the sensor(s) and to facilitate an opening and closing of the access panel. The grip structure may be interchangeable with other grip structures so that the sensor(s) of the locking device can be replaced with other sensor(s) of the same or different type. The access panel may be used as a sensor probe for the sensor(s) and to facilitate selective access to the internal area of the compartment.
The present document concerns a locking device. The locking device comprises: a lock; sensor(s) configured to generate sensor data indicating at least one of a size of an animal and a shape of an animal; and a processing unit. The processor is configured to compare the size of the animal to at least one threshold value and/or the shape of the animal to a reference shape, classify the animal as an authorized animal or an unauthorized animal based on the comparing, and grant or deny access to an internal area of a compartment based on a classification of the animal. The access to the internal area of the compartment may be granted by actuating the lock of the locking device such that the lock transitions from a locked position to an unlocked position. This actuation may be automatically, automatedly and/or autonomously performed by the locking device.
The present document also concerns a controllable output power circuit. The circuit comprises: a processor; and a non-transitory computer-readable storage medium comprising programming instructions that are configured to cause the processor to implement a method for operating a locking device. The programming instructions comprise instructions to: obtain sensor data indicating at least one of a size of an animal and a shape of an animal; compare the size of the animal to at least one threshold value and/or the shape of the animal to a reference shape; classify the animal as an authorized animal or an unauthorized animal based on the comparing; and grant or deny access to an internal area of a compartment based on the classifying. Access to the internal area may be granted by actuating a lock of the locking device such that the lock transitions from a locked position to an unlocked position.
The present solution will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures.
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present solution may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the present solution is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present solution should be or are in any single embodiment of the present solution. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present solution. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the present solution may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the present solution can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the present solution.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present solution. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
In this document, when terms such as “first” and “second” are used to modify a noun, such use is simply intended to distinguish one item from another, and is not intended to require a sequential order unless specifically stated.
The present solution generally concerns a locking device that discriminates users based on size and/or shape of a user. The locking device includes a lock, sensor(s), circuitry and logic elements. The sensor(s), circuitry and logic elements determine the size and/or shape of the user. The size and/or shape of the user is compared to a pre-determined criteria. If the pre-determined criteria is met (e.g., the user has a size and/or shape within size and/or shape limits), then the lock is actuated so that it transitions from a locked position to an unlocked position. At this time, the user is able to access items inside a storage compartment. The lock may then be actuated once again so that it returns to the locked position. Lock actuation may be automatically, automatedly and/or autonomously performed by the circuitry of the locking device.
The locking device may be used as a child safety lock. In this case, a door security device measures the size and/or shape of the user and only allows larger, adult users access to cabinet, drawers, etc. The user is not required to perform any additional steps or use specialized equipment to operate the door, drawer, etc. Rather the operation of the door, drawer, etc. remains unchanged to the adult/larger person users but denies access to younger/smaller users.
The locking device may additionally or alternatively be used to selectively allow access to the internal contents of a storage compartment to humans but not non-human animals (for example, dogs), to a first type of animal (for example, dogs or bird) but not to a second type of animal (for example, cats or squirrel). The locking device measures the size and/or shape of the user, allows the desired or authorized individual(s) to operate the locking device (door, drawer, food bin, etc.), and denies other undesired or unauthorized user(s) that ability to operate the locking device.
Referring now to
At least one locking device 104 is provided with the storage compartment 102. A grip structure 114 of the locking device 104 is coupled to an access panel 106 to facilitate a user's access to an internal cavity or space 150 inside the storage compartment 102. The grip structure 114 can include, but is not limited to, a knob or a handle. Sensor(s) 112 are coupled to and/or at least partially integrated with the grip structure 114 and/or access panel 106. In the latter case, the grip structure 114 acts as a sensor probe in addition to a gripping means for facilitating an opening/closing the access panel 106 and/or the access panel 106 acts as a sensor probe in addition to an access means for providing access to contents of the storage compartment 102. The sensor(s) 112 can include, but are not limited to, a proximity sensor, a touch sensor (for example, capacitive touch sensor), an imaging device, and/or a touchless sensor. The proximity sensor is an optional component and configured to detect when an individual 120 is proximate (for example, within 1-2 feet of) the storage compartment 102. When such a detection is made, the computing device 110 and/or other sensor(s) 112 may be enabled, turned on, or transitioned from a power save mode. In this regard, a power source 160 is provided with the locking device 104. The power source can include, but is not limited to, a battery and/or an energy harvesting circuit that harvests energy in an environment and stores the energy in an electronic device (for example, a capacitor or battery) in a manner known in the art.
The touch sensor 112 is configured to detect and record times when the individual 120 touches the grip structure 114 and/or access panel 106. The touch sensor can include, but is not limited to, a capacitive touch sensor. The capacitive touch sensor measures a change in capacitance due to the grip structure 114 and/or access panel 106 being in contact with the individual 120. The measured capacitance or change in capacitance is communicated from the touch sensor to the computing device 110.
At the computing device 110, the measured capacitance or change in capacitance is compared to threshold value(s) 130. The threshold value(s) 130 is(are) selected based on a minimum or maximum size (for example, height, length and/or width) of an animal that is authorized to access contents of the storage compartment 102. A graph is provided in
If the measured capacitance or change in capacitance does not fall within a range defined by the threshold value(s) or otherwise does not meet the size limit(s), then the computing device 110 concludes that the individual 120 is not an authorized individual. Responsive to this conclusion, the computing device 110 does not take any action for actuating the lock 108. The lock 108 can include, but is not limited to, an electromechanical lock and/or a digital lock. The computing device 110 may perform operations to: notify the individual 120 or other individual (for example, a parent or caretaker) that the individual 120 is considered by the locking device 104 to be an unauthorized individual and therefore will not be provided access to the contents of the storage compartment 102; and/or log timestamped data 128 recording the access denial event. The timestamped data 128 can be stored in a datastore of the computing device 110 and/or a remote datastore 126.
If the measured capacitance or change in capacitance falls within a range defined by the threshold value(s) or otherwise meets the size limit(s), then the computing device 110 concludes that the individual 120 is an authorized individual. Responsive to this conclusion, the computing device 110 performs operations to actuate the lock 108. This actuation causes the lock 108 to transition from a locked position to an unlocked position. The computing device 110 may perform operations to: log timestamped data recording the access event; and/or notify other individual(s) that access to the contents of the storage compartment 102 has been given to an individual. The timestamped data can be stored in a datastore of the computing device 110 and/or a remote datastore 126.
The imaging device 112 is configured to capture an image of the individual 120 in proximity to the storage compartment 102. The captured image can be analyzed by the imaging device or communicated to the computing device 110 for processing. The image processing is performed to detect the individual and obtain a classification for the individual. The classification can be a human, an adult human, a child human, a dog, a cat, a bird or other animal. The classification can be used in addition to or as an alternative to the capacitive thresholding for making a determination as whether the individual should be allowed access to the contents of the storage compartment 102. For example, the classification can be used to verify that the results of the capacitive thresholding are consistent with the classification of the object.
The touchless sensor 112 is configured to produce an electric field and measure a change in the electric field when the individual enters the electric field. The measured change in the electric field is communicated from the touchless sensor to the computing device 110. At the computing device 110, the measured change in the electric field is compared to threshold value(s). The threshold value(s) can be selected based on the size and/or shape of individuals. The threshold value(s) define the amount by which the electric field can change for allowing access to contents of the storage compartment.
The present solution is not limited to the particulars of locking device 104 shown in
The computing device 310 analyzes the sensor data to obtain size measurement(s) and/or a shape of the individual 320. The size measurement(s) can include a length, a width and/or a height. The size measurement(s) is(are) compared to threshold value(s) 330 defining size limits. The threshold value(s) can be selected based on a database of collected data specifying ranges of sizes for older animal of a given type (for example, human) and younger animals of the given type. The shape of the individual may additionally or alternatively be compared to a plurality of reference shapes 330 to classify the animal and then obtain pre-defined shape limits.
A graph is provided in
If the size limits and/or shape limits are not met, then the computing device 310 concludes that the individual 320 is not an authorized individual. Responsive to this conclusion, the computing device 310 does not take any action for actuating the lock 308. The lock 308 can include, but is not limited to, an electromechanical lock and/or a digital lock. The computing device 310 may perform operations to: notify the individual 320 or other individual (for example, a parent or caretaker) that the individual 320 is considered by the locking device 304 to be an unauthorized individual and therefore will not be provided access to the contents of the storage compartment 302; and/or log timestamped data 328 recording the access denial event. The timestamped data 328 can be stored in a datastore of the computing device 310 and/or a remote datastore 326.
If the size limits and/or shape limits are met, then the computing device 310 concludes that the individual 320 is an authorized individual. Responsive to this conclusion, the computing device 310 performs operations to actuate the lock 308. This actuation causes the lock 308 to transition from a locked position to an unlocked position. The computing device 310 may perform operations to: log timestamped data recording the access event; and/or notify other individual(s) that access to the contents of the storage compartment 102 has been given to an individual. The timestamped data can be stored in a datastore of the computing device 310 and/or a remote datastore 326.
Next in 514, the locking device optionally performs operations to detect an animal located in proximity to the locking device. The term “proximity” as used here means within a sensor's range of detection. The animal can include, but is not limited to, a human (for example, individual 120 of
In 516, sensor(s) of the locking device perform operations to generate sensor data indicating a size and/or shape of the animal. The sensor data can include, but is not limited to, a capacitance value, an amount of change in capacitance from a particular capacitance value, an amount of change of an electric field, a characteristic of a reflected signal, a point cloud, and/or a captured image. The sensed size of the animal may be compared with size threshold(s) as shown in 520. Additionally or alternatively, the sensed shape of the animal is compared with the reference shape in 520.
If the sensed size does not meet the size limit(s) and/or the sensed size does not match (by a certain amount such as ≥75%) the reference shape [522: NO], then method 500 continues with 524 where the locking device concludes that the animal is not an authorized animal and denies the animal access to the contents of the storage compartment. The locking device may additionally log data regarding the access denial event, issue a notification of the occurrence of the access denial event, and/or perform other operations (for example, return to 502).
If the sensed size does meet the size limit(s) and/or the sensed size does match (by a certain amount such as ≥75%) the reference shape [522: YES], then method 500 continues with 526 where the locking device concludes that the animal is an authorized animal and grants the animal access to the contents of the storage compartment. In this regard, the electronic circuit of the locking mechanism caused actuation of the lock such that the lock transitions from its locked position to its unlocked position. The locking device may additionally log data regarding the access grant event, issue a notification of the occurrence of the access grant event, and/or perform other operations (for example, return to 502).
In 528, the electronic circuit of the locking device may optionally be disabled. This could be done when, for example, the power source needs to be recharged, the lock is being replaced, the grip structure is being replaced with another grip structure, and/or the locking device is being removed from the storage compartment. Subsequently, 530 is performed where method 500 ends or other operations are performed (for example, return to 502).
In some scenarios, the present solution is used in a client-server architecture. Accordingly, the computing device architecture shown in
Computing device 600 may include more or less components than those shown in
Some or all components of the computing device 600 can be implemented as hardware, software and/or a combination of hardware and software. The hardware includes, but is not limited to, one or more electronic circuits. The electronic circuits can include, but are not limited to, passive components (for example, resistors and capacitors) and/or active components (for example, amplifiers and/or microprocessors). The passive and/or active components can be adapted to, arranged to and/or programmed to perform one or more of the methodologies, procedures, or functions described herein.
As shown in
At least some of the hardware entities 614 perform actions involving access to and use of memory 612, which can be a Radom Access Memory (RAM), a disk driver, a Compact Disc Read Only Memory (CD-ROM), other form of data storage, and/or remote “cloud” based processing. Hardware entities 614 can include a disk drive unit 616 comprising a computer-readable storage medium 618 on which is stored one or more sets of instructions 620 (for example, software code) configured to implement one or more of the methodologies, procedures, or functions described herein. The instructions 620 can also reside, completely or at least partially, within the memory 612 and/or within the CPU 606 during execution thereof by the computing device 600. The memory 612 and the CPU 606 also can constitute machine-readable media. The term “machine-readable media”, as used here, refers to a single medium or multiple media (for example, a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions 620. The term “machine-readable media”, as used here, also refers to any medium that is capable of storing, encoding or carrying a set of instructions 620 for execution by the computing device 600 and that cause the computing device 600 to perform any one or more of the methodologies of the present disclosure.
Although the present solution has been illustrated and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art upon the reading and understanding of this specification and the annexed drawings. In addition, while a particular feature of the present solution may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Thus, the breadth and scope of the present solution should not be limited by any of the above described embodiments. Rather, the scope of the present solution should be defined in accordance with the following claims and their equivalents.
Without excluding further possible embodiments, certain example embodiments are summarized in the following clauses:
The breadth and scope of this disclosure should not be limited by any of the above-described example embodiments, but should be defined only in accordance with the following claims and their equivalents.
The present application claims priority to and the benefit of U.S. Provisional Patent Application No. 63/500,070 which was filed on May 4, 2023. The content of this Provisional Patent Application is incorporated herein by reference in its entirety.
| Number | Date | Country | |
|---|---|---|---|
| 63500070 | May 2023 | US |