NONE.
The present disclosure relates to a door block, which can be used to securely restrict access via a doorway. More specifically, the present disclosure relates to a wirelessly activated door block, and more specifically still, a door block that can be activated via input of a proper, individually assigned code on a smart phone or other wireless device.
Restricting access to doorways is generally accomplished through the use of a lock. However, the installation of a lock on a door is an intrusive procedure that, in many instances, is inconvenient to perform and requires professional assistance. For example, when a house is put up for sale and listed with a listing service (such as the MLS), various realtors must be given access to the house. The typical way this is accomplished is with a “lockbox,” which is placed on the exterior of the premises and contains the keys to the house. Typically, a realtor is assigned a code that is input to the lock box, which then releases the keys. The code assigned to the realtor is logged.
Similar “lockbox arrangements” are used in other circumstances, such as to give contractors access to a property. One problem with the use of a lockbox is that once the lockbox is opened, the key can be lost, stolen, copied, or used to unlock the property and leave it locked. Accordingly, while access to the lockbox is logged, access to the property is not.
Another issue with the use of a lockbox is that the code can be used to access the lockbox at any time. For example, in certain circumstances, a homeowner may desire to limit access to a home during certain hours. However, many Iockboxes do not allow any restrictions to be set; once a person has the key, s/he is free to do anything with it.
Another issue with the use of a lockbox is that access to the lockbox is controlled by the Realtor without administrative control or access control to permit family members or other desired individuals on demand access being provided to the homeowner. Similarly, removal of a lockbox from a property can only be accomplished by the Realtor or listing service.
When attempting to force entry through a door with a lock, typically the weakest part of the door is where the door and the door frame have had significant holes drilled into them to install lock hardware, thus weakening their integrity.
Another issue with the use of the lockbox is that the lockbox is located outside the door and may be exposed to the elements and physical tampering.
Accordingly, it is an object of this disclosure to provide a door block.
Another object of this disclosure is to provide a secure door block.
Another object of this disclosure is to provide a secure door block that can be wirelessly controlled.
Another object of this disclosure is to provide a secure door block that can be mounted to a door frame by an L-bracket.
Another object of this disclosure is to provide a secure door block that can be installed without professional assistance.
Another object of this disclosure is to provide a secure door block that is physically located within the property and not exposed to the elements or physical tampering.
Another object of this disclosure is to provide a secure door block that can be controlled via a smartphone.
Another object of this disclosure is to provide a system by which access via a secure door block is tightly monitored.
Another object of this disclosure is to provide a system by which access via a secure door block is only allowed to certain individuals.
Another object of this disclosure is to provide a system by which access via a secure door block is only allowed during certain times.
Another object of this disclosure is to provide a system by which administrative privileges to provide access via a secure door block can be controlled by both a real estate agent and a homeowner.
Other advantages of this disclosure will be clear to a person of ordinary skill in the art. It should be understood, however, that a system, an apparatus or a method could practice the disclosure while not achieving all of the enumerated advantages, and that the protected disclosure is defined by the claims.
Generally speaking, pursuant to the various embodiments, the present disclosure provides a door stop. In particular, the door stop includes a body portion as well as a microprocessor disposed within the body portion. In addition, the door stop includes a rotatable stop that is adapted to rotate from within the body portion to a deployed position. When in the deployed position the door stop can operate to block the opening of a doorway.
The door stop can also include an L-bracket having a first face and a second face. The first face includes a plurality of mounting holes, allowing for mounting the door stop to a door frame. The second face can include a pair of screw holes as well, allowing the body portion of the door stop to be screwed to the L-bracket.
The door stop can also include a wireless transceiver coupled to the microprocessor as well as a memory for storing at least one access code. The wireless transceiver can couple with a wireless device, such as a smart phone, and receive an input code. The microprocessor then compares the input code to the access code, and if a match is found, operates the door stop, either granting or restricting access to the doorway.
Although the characteristic features of this disclosure will be particularly pointed out in the claims, the invention itself, and the manner in which it may be made and used, may be better understood by referring to the following description taken in connection with the accompanying drawings forming a part hereof, wherein like reference numerals refer to like parts throughout the several views and in which:
A person of ordinary skills in the art will appreciate that elements of the figures above are illustrated for simplicity and clarity, and are not necessarily drawn to scale. The dimensions of some elements in the figures may have been exaggerated relative to other elements to help understanding of the present teachings. Furthermore, a particular order in which certain elements, parts, components, modules, steps, actions, events and/or processes are described or illustrated may not be actually required. A person of ordinary skills in the art will appreciate that, for the purpose of simplicity and clarity of illustration, some commonly known and well-understood elements that are useful and/or necessary in a commercially feasible embodiment may not be depicted in order to provide a clear view of various embodiments in accordance with the present teachings.
Turning to the Figures, and to
Turning to
Typically, the door stop 20 will be installed to a door frame via the L-bracket 30. In particular, the door stop 20 is mounted to the door frame so that the door stop 20 is disposed on the inside, with the door being allowed to open internally freely when the door stop 20 is not activated; i.e., when the rotatable stop 24 is in its stowed position. When the door stop 20 is activated, the rotatable stop rotates into a deployed position (as seen if
Turning to
The short-range transceiver 60 and the Internet transceiver 58 can be a single transceiver in certain embodiments; for example, all control can be provided via the Internet using the system disclosed below. The actuator 54 can be, for example, a stepper motor, which will require appropriate circuitry. In addition, the rotatable stop 24 can include mechanical cutoffs placed appropriately to prevent its rotation beyond appropriate limits. The memory 62 can be, for example, FLASH memory or electrical erasable memory, or any other type of memory that can hold information persistently. The power circuit 56 can be, for example a battery along with an appropriate charging circuit.
Turning to
In standard operation, the memory 62 will have a number of access codes and access rules. A person seeking access, such as a real estate agent, will connect a wireless device, such as a smart phone, to the door stop 20 using the short-range wireless transceiver 60. The smart phone (not shown) can use, for example, a custom application to interface with the door stop 20. Once the wireless device is connected to the door stop 20, the user can input a code, which the microprocessor 52 will then check against the codes stored in the memory 62. Alternatively, other means of authentication, such as a biometric scanner, could be employed to authenticate users. If the code matches a stored code, the door stop 20 will grant access. At the same time the door stop 20 will transmit the access to the cloud access system 104, where the access will be logged in the database 106.
Once the user no longer requires access, the user can use a wireless device to reset the door stop 20 in its locked state. In certain embodiments, the door stop can automatically reset after a certain time period, or generate an alarm to the cloud access system 104, which can dispatch a person to ensure that the premises is secured.
In at least one embodiment, the access codes and access rules can be stored in the database 106 rather than in a local memory 62. In such an embodiment, an access code along with an identifier for the particular door stop 20 would be transmitted to the cloud access system 104, which would then check the code against those stored in the database 106, along with any applicable access rules before sending a message back to the door stop either granting or denying access.
While the first disclosed embodiment involved a rotating semi-circular or oval stop, other embodiments are also possible within the disclosed operative principles. For example, turning to
Obviously, many additional modifications and variations of the present disclosure are possible in light of the above teachings. Thus, it is to be understood that, within the scope of the appended claims, the disclosure may be practiced otherwise than is specifically described above
The foregoing description of the disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or to limit the disclosure to the precise form disclosed. The description was selected to best explain the principles of the present teachings and practical application of these principles to enable others skilled in the art to best utilize the disclosure in various embodiments and various modifications as are suited to the particular use contemplated. It should be recognized that the words “a” or “an” are intended to include both the singular and the plural. Conversely, any reference to plural elements shall, where appropriate, include the singular.
It is intended that the scope of the disclosure not be limited by the specification, but be defined by the claims set forth below. In addition, although narrow claims may be presented below, it should be recognized that the scope of this invention is much broader than presented by the claim(s). It is intended that broader claims will be submitted in one or more applications that claim the benefit of priority from this application. Insofar as the description above and the accompanying drawings disclose additional subject matter that is not within the scope of the claim or claims below, the additional inventions are not dedicated to the public and the right to file one or more applications to claim such additional inventions is reserved.