This invention relates to a novel device in the general field of portable locks, and more specifically to locks having locking mechanisms actuated by means of wireless signal(s). The signals may be sent from a portable device such as a smartphone or similar device. Some embodiments provide self-closing locks.
Portable locks are convenient in that they can be interchangeably used to secure a portable item to a stationary or immovable object to prevent its removal, or to secure lockers by means of a hasp or entryway doors or fences by employing a chain. Some of the earliest portable locks were padlocks designed with an inverted U-shaped shackle which opened at the turn of a physical key. Locks employing U-shaped shackles are often inconvenient to attach with one hand, and can sometimes appear to be locked even when the shackle is not fully engaged, rendering the lock useless in practice.
Most mechanical locks can be picked at the keyway, or their physical keys copied. It is often cheaper to buy a new padlock than to re-key one if old keys have not been returned. Neither of these circumstances ensures practical security. Other problems with mechanical keyed locks include keyways that expose the insides of the lock to tampering or damage, and keys can only be made in a very limited number of physical combinations compared to commonly available encryption options. The use of combination locks limit physical access to the lock interior, but are still deficient with their severely limited number of combinatorial options, which are susceptible to cracking with patient application. These deficiencies increase the likelihood that a generic portable lock will be compromised by physical or mathematical means.
A recently employed method of remotely opening portable locks is the use of radio transceivers which activate the lock mechanism directly or by means of a motor. Remote electronic communication employing transceivers inside locks enable the user to open a lock by infrared (U.S. Pat. No. 7,948,359), by use of dedicated key-fobs (U.S. Pat. No. 7,382,250), or by combining a physical key with an attached transceiver element (U.S. Pat. No. 7,334,443). These solutions still require the user to carry a secondary physical key or fob in order to open each lock.
Some electronic locks use an RF activated motor to physically open the shackle of the lock, but this method requires an inefficient amount of power for a device that needs to operate reliably (U.S. Pat. No. 8,225,629, U.S. Pat. No. 7,948,359).
There remains a need for locks that are convenient and trustworthy to use. The lock design should ideally prevent ready access to the lock interior; allow the user to operate the lock reliably with the minimum of power for securement, and secure or open the lock by an encrypted wireless signal that is generated by a common device that is already carried by most users, e.g., a wireless smart phone or similar device. The following disclosure will provide detailed explanations and drawings of the various yet related solutions to the above outlined deficiencies in the prior art.
The invention has a number of aspects. One aspect provides wirelessly-controlled locks. An example embodiment provides a wireless self-closing portable lock system which allows a user to conveniently and securely operate one or more locks by means of a smart phone or similar wireless device. Two example representative and compatible lock designs are disclosed, each employing a signal receiver such as a Bluetooth™ receiver, one actuated by a solenoid or a motor, the other by electrically energizing memory wire(s), both releasing the lock shackle or gate when the correct signal is sent from a wireless device.
Some of the advantages of the keyless portable lock system include but are not limited to: fewer insecure openings into the lock interior; easier to attach & secure with self-closing shackles or gate arms; the ability to unlatch one or more locks remotely by means of a common wireless device; much less likelihood of cracking a lock's combination due to the ability to use very long and complex pass-codes; the ability to instantly “re-key” the wireless pass-code if it is compromised; the convenience of using a smartphone to configure multiple methods of lock access such as biometric, audio, combination, or simply lock/unlock buttons once a phone has been unlocked to the user.
Further aspects and example embodiments are illustrated in the accompanying drawings and/or described in the following description.
The accompanying drawings illustrate non-limiting example embodiments of the invention.
Throughout the following description specific details are set forth in order to provide a more thorough understanding to persons skilled in the art. However, well known elements may not have been shown or described in detail to avoid unnecessarily obscuring the disclosure. The following description of examples of the technology is not intended to be exhaustive or to limit the system to the precise forms of any example embodiment. Accordingly, the description and drawings are to be regarded in an illustrative, rather than a restrictive, sense.
Because there are multiple ways to design self-closing lock housings, two compatible representative implementations are discussed in detail herein, namely an example pivot lock implementation and an example clip lock implementation. Elements that are similar, compatible, or logically equivalent to both implementations have been grouped into the following categories: namely Housing, Mechanism, Actuator and Electronics.
Pivot Lock (Solenoid Actuated) Elements
The housing 28 and its contiguous pivot drum 30 enclose all device elements except the shackle 60 and its shackle cap 32. Most elements of the pivot lock 26 are installed into, or are secured by the carrier 42 which inserts into the housing as shown in
The actuator 70 employs a solenoid 74 with a plunger 76 which can be retracted against the force of the plunger spring 78, by electrically energizing solenoid 74. A locking block 72, affixed by a fastener 73 to the end of the plunger 76, is extended towards the carrier 42 and is used to block downward movement of the striker plate 48, and its latch pin 50.
The (locking/latching) mechanism 46 includes a striker plate 48, pivot spring 82, and shackle 60 elements. The striker plate 48 includes a latch pin 50, spring 52, spring trap 54, and guide slots 58. Cylindrical travel guides 57 are secured by guide bolts 56 to the carrier 42 face, which also supports a striker spring cup 37. The pivot spring 82 is secured between a lock plate 80 and a shackle cap plate 90, whereby the spring's 82 hook 84 fits into the slot 89 of the lock plate 80, and its end 86 inserts into the hole 88 in the cap plate 90. This pivot spring assembly is secured by tang bolts 96 into threaded holes 68 in the tang 64 of the shackle 60 through corresponding holes in a delrin plate washer 92 and a washer well 94 in the shackle cap 32 as shown. When assembled, the latch pin 50 protrudes from the pin outlet 40 in the base of the shackle inlet 38 and into the pin divot 62 in the underside of the shackle 60. (see
Electronics 100, namely a main PCB 102 with PL receiver 104, and a drive PCB 106, are secured by a cover 34 into the bay 43 of a carrier 42. Batteries 108 are secured in their well 44 in the bottom of the carrier 42 by means of a cover 36.
Clip Lock Elements
The housing 112 of the clip lock 110 is the basic shell of the device, and includes the top part of the “clip”, namely the hook 114. Most elements of the clip lock 110 are installed into, or are secured by the carrier 120, and the device is enclosed by a front cover 116 and rear cover 118.
The mechanism 122 includes the gate 124, which is the other half of the “clip” part of the lock, and it also includes its contiguous gate wheel 126, which rotates around the wheel post 134 of the housing 112. When the gate 124 connects to the hook 114, they are secured together by means of a gate interlock 128 interleaving with a hook interlock 130. (see
The actuator 136 comprises the following elements: a pawl wire 138 & catch wire 139 made from electrically contracting memory wire; ends of each wire length are terminated with a ring terminal crimped fastener assembly 140 which includes a ring terminal crimped to the memory wire (with each energizing power wire), a Delrin™ washer, and a nylon fastener; memory wire is guided and controlled by means of pulleys, namely a top pawl pulley 142, a catch pulley 144, and a bottom pawl pulley 146; a sprung 152 pawl 148 pivots on its housing 112 post 150 and is retracted by means of an energized pawl wire 138; a catch 154 with a seated 158 spring 156 is retracted by means of an energized catch wire 139, and thereby controls the position of the pawl 148, which locks the gate wheel 126.
Finally, the clip lock electronics 160 comprise the following elements: a main printed circuit board (PCB) 162 which includes a wireless receiver 164; a battery 168 and its conductive securement clip 170; and installed behind the rear cover 118, a switch board 166 and one or more flat pack capacitors 172.
Pivot Lock (Motor Actuated) Elements
The Pivot Lock (Motor Actuated) 180 version of the previously disclosed Pivot Lock 26 includes the following three improvements, namely motor lock actuation, locking battery & carrier covers, and a novel means to externally power the pivot lock so it may be opened when internal batteries fail. The following additional figures and drawing elements pertain to this alternative embodiment.
A preferred example embodiment of the Wireless Self-Closing Portable Lock System 10 will now be described in detail. Note that a wide range of implementations of the preferred embodiment, namely the pivot lock 26, with its solenoid or motor actuation, and clip lock 110 versions, may employ substantially functionally equivalent mechanisms, actuators and electronics. Other embodiments are not ruled out or similar methods leading to the same result. The following implementations will be discussed in the following order, namely pivot lock (solenoid actuated), pivot lock (motor actuated) and clip lock.
Pivot Lock (Solenoid Actuated) Implementation
As outlined in
The housing 28 contains the electronics 100 and the striker plate 48, while its contiguous pivot drum 30 encloses the actuator 70 and the pivot spring 82 portion of the self-closing shackle 60. The shackle 60 pivots by means of the shackle cap 32 at the end of the pivot drum 30 against the torsional force of the pivot spring 82, and is secured by means of the latch pin 50 of the striker plate 48 protruding from the pin outlet 40 inside the shackle inlet 38 at the top of the housing 28, and into the pin divot 62 of the shackle 60.
As shown in
As shown in
The inside of the carrier (PL) 42 provides a channel in which the striker plate 48 can move, while the outside provides a bay 43 in which the electronics 100 elements of the pivot lock 26 are housed. Cylindrical travel guides 57 are secured by guide bolts 56 to the carrier 42 face, and delimit striker plate 48 travel as shown in
Pivot Lock (Motor Actuated) Implementation
The Pivot Lock (PLM) 180 is an alternative embodiment of the Pivot Lock (PL) 26 implementation of the Portable Lock System 10. Its primary variant is the use of a motor 226 instead of a solenoid 76 to actuate the locking mechanism. Secondary additional improvements include internally locking battery & carrier covers, and a novel means to externally power the pivot lock to allow the user to still open the lock when internal batteries fail. Each alternate and novel implementation will be discussed in more detail below.
Motor Actuation
Locking Covers
A wirelessly actuated lock may be less vulnerable to combinatorial methods of unlawful entry, but if one can gain access to the interior of the lock housing, the lock is just as vulnerable to defeat. For this reason, a lock may be constructed so that the two means of access to the interior, namely the battery and carrier covers are secured while the lock is in the locked state. As shown in
External Jumpstart
Another issue that can affect the utility of wirelessly operable locks is an authorized user's need to be able to open the lock if the internal batteries die. For example, if Pivot Lock (PLM) 180 has a dead battery, the user is prevented from accessing the lock housing 28 in order to change batteries by the locking battery cover 194. A unique solution has been devised whereby an external battery 108 may be inserted into a receiver 254 bay on the outside of the locking battery cover 194 (see
Clip Lock Implementation
As outlined in
The housing 112 of clip lock 110 is a shell that uses both sides to support device elements, is enclosed by front 116 and rear 118 cover plates, and supports a contiguous stationary hook 114 which mates with a gate 124 arm which rotates around a contiguous gate wheel 126 and creates the lock. Interlocks increase the security of the clip lock 110 by preventing the hook 114 from being forced or bent away from the gate 124. A carrier (CL) 120 frame supports internal actuator 136 and mechanism 122 elements and is inserted into the front of the housing 112. (see
As shown in
As shown in
The rear of housing 112 contains some of the electronics 160, namely the capacitor(s) 172 and related switch board 166, while the main PCB 162 with its receiver 164 and the battery 168 overlay actuator and mechanism elements in front of the housing 112. (see
Some preferred materials for constructing said novel device will now be described. Other materials may be used also or in the alternative. The housings and covers are made of cast, forged, stamped or machined steel and critical structures such as the shackle, hook, and gate/gate wheel, pawl, catch and striker plate may be hardened or made from hardened steel or critical surfaces reinforced appropriately. The carriers are made from Delrin™ or acetal or other non-conductive rigid material, which insulates electrical elements from each other, especially memory wire, power sources, and PCBs. Note that kapton tape or similar methods may be used to insulate between components and to prevent unwanted conduction paths as needed. Especially note that the ring terminal crimp fastener assembly is made from mostly non-conductive materials such as acetal washers, nylon fasteners, etc., in order to electrically isolate terminations of memory wire from other components, and each other. Pulleys, plates & washers can be made from acetal, Delrin™, ceramic or nylon as necessary to provide adequate electrical isolation.
Other embodiments of the novel device will now be discussed. Further embodiments are not ruled out or similar methods leading to the same result. The Portable Lock System 10 can have the means to provide visual or auditory indication of its locking status or change of status. By this means, an LED and/or audible signal from the lock (26 or 110) will follow receipt of a wireless signal 16 from a wireless device 12 that changes the lock's status. (see PLM elements 190, 250, 252)
The Pivot Lock (PLM) 180 may also include a portable key fob that fits into the external battery receiver 254, and which may hold a spare battery which can supply external power through said receiver 254 bay. The portable fob may also house the means to open the pivot lock 180 such as a readable memory chip or a wireless module that can be interrogated by the lock or transmit a passcode to the lock or even a wired path between the fob and the Bluetooth™ of the lock. The object of the fob is use as a convenient portable backup means to open a specific or multiple locks, but it also may be delimited in that it could only be used once, and could employ a rolling passcode that needed to be reset by the parent device (i.e. original smartphone) in order to prevent repeated unauthorized access. Digitally protected lock access offers many more options for both convenient access as well as enhanced security options as shown herein.
Other advantages of using the Wireless Self-Closing Portable Lock System over other methods or devices will now be described if not already mentioned elsewhere.
An advantage to using an L-shaped shackle bar vs. the common U-shaped shackle: most loops or door hasps through which padlock shackles are inserted are vertical, requiring a user to rotate the lock to install; the L-bar inserts directly and snaps shut automatically and reliably. Note that the L-shaped shackle bar doesn't have to be shaped like an L, as long as it can latch into the housing. Other shapes can be employed for unique applications such as special reinforced conduits covering the shackle, as may be employed on shipping containers or security doors or portable equipment containers.
Advantages of a self-closing clip/pivot lock design: One handed operation to close lock vs. two handed operation with traditional padlocks.
No need for carrying or locating correct keys or having to orient lock and fit key into keyway. A keyless portable lock can be made resistant to water and other contaminants. Users with hand/finger disabilities or similar impairments will find that a lock system which can be remotely unlocked without the need for keyed operation, and which requires less strenuous pivoting or levering will be much easier to open than conventional padlocks.
In addition, the disclosed shackle/gate snaps shut with a spring, and relies on the user to open it manually, using power more efficiently than locks which use motors to open/close. The use of a solenoid or memory wire to lock is a low energy solution that provides extended and reliable operation over previous designs. Clip locks are generally thinner than pivot locks because they can use smaller actuators. This advantage provides smaller pocket size locks which enable many more versatile applications than larger, bulkier locks.
Advantages of wireless lock actuation: faster lock securement & removal of one or many locks simultaneously. Devices can be conveniently opened as a user approaches, by the user, anyone sent the passcode, or even by a facility security administrator from a distance. The ability to electronically transfer a passcode to an authorized user's wireless device 12 as they stand in front of a wireless lock barring their way is an advantage that mechanical locks and physical keys lack. An additional level of security can be created by using rolling pass-codes, and limiting the number of unsuccessful unlocking attempts, neither of which could be possible with generic mechanical locks.
In addition, a wirelessly accessible portable lock system allows one to electronically re-key a lock or locks remotely and/or designate access limits by time and/or number of uses. For example, a signal receiver or other electronic system within the lock may include a counter that counts a number of times a particular passcode or other electronic key has been used to open the lock. The lock may also comprise a data store or fixed record containing a maximum number of times that the particular electronic key may be used to open the lock. The lock may include logic circuits configured to compare the value stored by the counter to the maximum number of times that the particular electronic key may be used to open the lock and to inhibit operation of the lock by the particular electronic key if doing so would cause the value of the counter to exceed the maximum number.
By combining the power of uniquely designed physical locks with wireless access by encrypted passcodes and secure software applications, the user can remotely control the digital keys and locking systems of one or many locks, with a versatility and functionality that strictly physically-keyed locks are unable to match.
Advantages of the motor actuated pivot lock: lower power consumption and thereby a longer battery lifetime. When the batteries do expire, this pivot lock version permits the user to open their lock by shunting in power from an external battery while providing the appropriate authorization signal. (wired or wireless as explained above) Locked battery and carrier covers prevent unwanted access to the vulnerable internal components which may be used to manually release the lock.
The foregoing description of the preferred apparatus and method of fabrication and operation should be considered as illustrative only, and not limiting. Other forming techniques and other materials may be employed towards similar ends. Various changes and modifications will occur to those skilled in the art, without departing from the true scope of the invention as defined in the above disclosure, and the following illustrations.
Interpretation Of Terms
Unless the context clearly requires otherwise, throughout the description and the claims:
Words that indicate directions such as “vertical”, “transverse”, “horizontal”, “upward”, “downward”, “forward”, “backward”, “inward”, “outward”, “vertical”, “transverse”, “left”, “right”, “front”, “back”, “top”, “bottom”, “below”, “above”, “under”, and the like, used in this description and any accompanying claims (where present), depend on the specific orientation of the apparatus described and illustrated. The subject matter described herein may assume various alternative orientations. Accordingly, these directional terms are not strictly defined and should not be interpreted narrowly.
Embodiments of the invention may be implemented using specifically designed hardware, configurable hardware, programmable data processors configured by the provision of software (which may optionally comprise “firmware”) capable of executing on the data processors, special purpose computers or data processors that are specifically programmed, configured, or constructed to perform one or more steps in a method as explained in detail herein and/or combinations of two or more of these. Examples of specifically designed hardware are: logic circuits, application-specific integrated circuits (“ASICs”), large scale integrated circuits (“LSIs”), very large scale integrated circuits (“VLSIs”), and the like. Examples of configurable hardware are: one or more programmable logic devices such as programmable array logic (“PALs”), programmable logic arrays (“PLAs”), and field programmable gate arrays (“FPGAs”)). Examples of programmable data processors are: microprocessors, digital signal processors (“DSPs”), embedded processors, graphics processors, math co-processors, general purpose computers, server computers, cloud computers, mainframe computers, computer workstations, and the like. For example, one or more data processors in a control circuit for a device may implement methods as described herein by executing software instructions in a program memory accessible to the processor(s).
Processing may be centralized or distributed. Where processing is distributed, information including software and/or data may be kept centrally or distributed. Such information may be exchanged between different functional units by way of a communications network, such as a Local Area Network (LAN), Wide Area Network (WAN), or the Internet, wired or wireless data links, electromagnetic signals, or other data communication channel.
Software and other modules may reside on servers, workstations, personal computers, tablet computers, smart phones, PDAs, and other devices suitable for the purposes described herein. Those skilled in the relevant art will appreciate that aspects of the system can be practiced with other communications, data processing, or computer system configurations, including: Internet appliances, hand-held devices (including personal digital assistants (PDAs)), wearable computers, all manner of cellular or mobile phones, multi-processor systems, microprocessor-based or programmable consumer electronics and the like.
The invention may also be provided in the form of a program product. The program product may comprise any non-transitory medium which carries a set of computer-readable instructions which, when executed by a data processor, cause the data processor to execute a method of the invention (e.g. a method for unlocking a lock or a method for locking a lock). Program products according to the invention may be in any of a wide variety of forms. The program product may comprise, for example, non-transitory media such as magnetic data storage media including floppy diskettes, hard disk drives, optical data storage media including CD ROMs, DVDs, electronic data storage media including ROMs, flash RAM, EPROMs, hardwired or preprogrammed chips (e.g., EEPROM semiconductor chips), nanotechnology memory, or the like. The computer-readable signals on the program product may optionally be compressed or encrypted.
In some embodiments, the invention may be implemented in software. For greater clarity, “software” includes any instructions executed on a processor, and may include (but is not limited to) firmware, resident software, microcode, and the like. Both processing hardware and software may be centralized or distributed (or a combination thereof), in whole or in part, as known to those skilled in the art. For example, software and other modules may be accessible via local memory, via a network, via a browser or other application in a distributed computing context, or via other means suitable for the purposes described above.
Where a component (e.g. an arm, member, mechanism, assembly, device, circuit, etc.) is referred to above, unless otherwise indicated, reference to that component (including a reference to a “means”) should be interpreted as including as equivalents of that component any component which performs the function of the described component (i.e., that is functionally equivalent), including components which are not structurally equivalent to the disclosed structure which performs the function in the illustrated exemplary embodiments of the invention.
Specific examples of systems, methods and apparatus have been described herein for purposes of illustration. These are only examples. The technology provided herein can be applied to systems other than the example systems described above. Many alterations, modifications, additions, omissions, and permutations are possible within the practice of this invention. This invention includes variations on described embodiments that would be apparent to the skilled addressee, including variations obtained by: replacing features, elements and/or acts with equivalent features, elements and/or acts; mixing and matching of features, elements and/or acts from different embodiments; combining features, elements and/or acts from embodiments as described herein with features, elements and/or acts of other technology; and/or omitting combining features, elements and/or acts from described embodiments.
It is therefore intended that the following appended claims and claims hereafter introduced are interpreted to include all such modifications, permutations, additions, omissions, and sub-combinations as may reasonably be inferred. The scope of the claims should not be limited by the preferred embodiments set forth in the examples, but should be given the broadest interpretation consistent with the description as a whole.
This application claims the benefit under 35 U.S.C. §119 of U.S. Application No. 61/863,292 filed 7 Aug. 2013 and U.S. Application No. 61/732,499 filed 3 Dec. 2012, both entitled WIRELESS SELF-CLOSING PORTABLE LOCK SYSTEM and which are both hereby incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
1193679 | Fox | Aug 1916 | A |
3543547 | Sugiyama | Dec 1970 | A |
3901057 | Coley, Sr. | Aug 1975 | A |
4747280 | Shaw | May 1988 | A |
4949559 | Glines | Aug 1990 | A |
4972784 | Ing-Hsiang | Nov 1990 | A |
5197309 | Del Rosario | Mar 1993 | A |
6300873 | Kucharczyk | Oct 2001 | B1 |
6574798 | Bradley | Jun 2003 | B1 |
6761051 | Tsai | Jul 2004 | B1 |
6989732 | Fisher | Jan 2006 | B2 |
7021092 | Loughlin et al. | Apr 2006 | B2 |
7047771 | Tanos | May 2006 | B2 |
7334443 | Meekma et al. | Feb 2008 | B2 |
7382250 | Marcelle et al. | Jun 2008 | B2 |
7423515 | Fiske | Sep 2008 | B1 |
7948359 | Marcelle et al. | May 2011 | B2 |
8225629 | Zuraski et al. | Jul 2012 | B2 |
8274365 | Piccirillo et al. | Sep 2012 | B2 |
8453481 | Meekma | Jun 2013 | B2 |
8585345 | Sikorski et al. | Nov 2013 | B2 |
8991224 | Zalavari | Mar 2015 | B2 |
9151082 | Zalavari | Oct 2015 | B2 |
20050039499 | Didomenico | Feb 2005 | A1 |
20050099262 | Childress et al. | May 2005 | A1 |
20060164208 | Schaffzin et al. | Jul 2006 | A1 |
20060179903 | Goldman | Aug 2006 | A1 |
20070289342 | Brooks | Dec 2007 | A1 |
20070290789 | Segev et al. | Dec 2007 | A1 |
20080290990 | Schaffzin et al. | Nov 2008 | A1 |
20090256676 | Piccirillo et al. | Oct 2009 | A1 |
20090282876 | Zuraski | Nov 2009 | A1 |
20090320537 | Alexander | Dec 2009 | A1 |
20100089108 | Dutt et al. | Apr 2010 | A1 |
20100206017 | Garibaldi | Aug 2010 | A1 |
20110050419 | Ng et al. | Mar 2011 | A1 |
20120011902 | Meekma | Jan 2012 | A1 |
20120154115 | Herrala | Jun 2012 | A1 |
20130036781 | Hartmann et al. | Feb 2013 | A1 |
20130255335 | Jonely | Oct 2013 | A1 |
20140077929 | Dumas | Mar 2014 | A1 |
Number | Date | Country |
---|---|---|
10056119 | Jun 2002 | DE |
2607582 | Jun 2013 | EP |
2491340 | May 2012 | GB |
2006-104696 | Apr 2006 | JP |
2013-534580 | Sep 2013 | JP |
0061897 | Oct 2000 | WO |
2006026758 | Mar 2006 | WO |
2011112139 | Sep 2011 | WO |
2012042515 | Apr 2012 | WO |
2012047850 | Apr 2012 | WO |
2013078561 | Jun 2013 | WO |
2013148274 | Oct 2013 | WO |
Entry |
---|
www.brit.co/bitlock/, Oct. 28, 2013. |
Number | Date | Country | |
---|---|---|---|
20140150502 A1 | Jun 2014 | US |
Number | Date | Country | |
---|---|---|---|
61863292 | Aug 2013 | US | |
61732499 | Dec 2012 | US |