E05B2047/0096

Bicycle security system
10472010 · 2019-11-12 ·

A security system for use with bicycles. The security system includes a tube having two tube halves attached to the down tube of a bicycle and includes two movable arms adapted to releasably hold onto an existing structure. An electromagnet is also attached to the tube for releasably attaching to metallic structures. The two arms and electromagnet can be controlled using a remote control fob or cell phone. A surface detection sensor attached to the handlebars of the bicycle is also employed to locate the bicycle in the event of theft.

SEAMLESS HANDS-FREE READER ROUTE TO A DESTINATION

A method of providing a seamless hands-free reader route to a destination includes receiving, at a mobile device, a route from a starting point to the destination, the route including an ordered list of access control devices. An event that triggers a start of the route is detected at the mobile device. The method also includes performing, at the mobile device, for each of the access control devices in an order of the access control devices in the ordered list: scanning for a signal from the access control device; and based on receiving the signal from the access control device, transmitting a message to the access control device, the message including a request to unlock the access control device and a credential that is authorized to unlock the access control device, the credential assigned to a user of the mobile device.

Storage System with Location Controlled Access and Associated Methods
20190323798 · 2019-10-24 ·

A storage case includes an electronic lock that is configurable into a locked state. A processor of the storage device configures the lock into the locked state when location information, captured by a location device in the storage case, indicates that the storage case is within a predetermined area surrounding an entity. The storage case may be opened by an authorized user, even if within the predetermined area, via interaction of the storage case with an override device.

Intelligent key system
10453291 · 2019-10-22 · ·

Techniques for using wireless electronic keys with devices are disclosed. For example, a computer system can program an access code into a programmable wireless electronic key. An action or function of the device can then be made contingent on there being a match between the access code from the key and an access code known by the device. Further still, other operational control parameters (such as time limits) can be programmed into the key to restrict the ability of the key to control an action or function of the device. Also, audit data such as device access history can be wirelessly transferred from a device to an electronic key, whereupon the key can later transfer this audit data to a computer for analysis.

Transportable device for preventing a loss of a movable object
10450775 · 2019-10-22 ·

The invention relates to a transportable device for preventing a loss of a movable object, comprising a protective housing (2) for protecting the device (1), an electronic alarm device (35), which is arranged in the protective housing (2) and has an anti-theft alarm function, and fastening means (11) for detachably fastening the device (1) to the movable object, wherein the fastening means (11) comprise at least one wrap-around element (12; 46; 52; 59; 68) for wrapping around at least one part of the movable object and wherein the wrap-around elements (12; 46; 52; 59; 68) can be fixed by means of locking elements (19, 20, 21; 49, 50, 51; 55, 57, 58; 61, 63, 64, 65; 71, 72, 73), which are arranged in the protective housing (2), wherein the locking elements (19, 20, 21; 49, 50, 51; 55, 57, 58; 61, 63, 64, 65; 71, 72, 73) can be selectively opened and closed by means of a lock device (13) rigidly connected to the protective housing (2), and wherein additionally the protective housing (2) can be selectively opened and rigidly connected to the protective housing (2), and wherein additionally the protective housing (2) can be selectively opened and closed by means of said lock device (13) and access to at least one chamber (18, 33) in the protective housing (2) is thereby enabled.

Intelligent Key System
20190251775 · 2019-08-15 ·

Techniques for using wireless electronic keys with devices are disclosed. For example, a computer system can program an access code into a programmable wireless electronic key. An action or function of the device can then be made contingent on there being a match between the access code from the key and an access code known by the device. Further still, other operational control parameters (such as time limits) can be programmed into the key to restrict the ability of the key to control an action or function of the device. Also, audit data such as device access history can be wirelessly transferred from a device to an electronic key, whereupon the key can later transfer this audit data to a computer for analysis.

Horseshoe-shaped lock

An anti-theft lock is provided, comprising: a lock pin provided with a retaining groove and configured to realize unlocking or locking through movement of the lock pin; a tongue configured to be able to enter the retaining groove to stop the movement of the lock pin or move out of the retaining groove to release the lock pin to allow the lock pin to move; and a tongue driving member connected to an output shaft of a motor and configured to convert a rotational driving force of the motor into a driving force allowing the tongue to move out of the retaining groove.

Intelligent key system
10269202 · 2019-04-23 · ·

Techniques for using wireless electronic keys with electronic locks are disclosed. For example, a computer system can program an access code into a programmable wireless electronic key, and the programmable electronic key can then teach this access code to a programmable electronic lock via wireless communication to thereby program the programmable electronic lock. Unlocking action by the programmed lock can then be made contingent on there being a match between the access code from the key and the access code from the programmed lock. Further still, other operational control parameters (such as time limits) can be programmed into the key to restrict the ability of the key to unlock a lock. Also, audit data such as lock access history can be wirelessly transferred from an electronic lock to an electronic key, whereupon the key can later transfer this audit data to a computer for analysis.

Lamp safe system
10222017 · 2019-03-05 ·

An embodiment can include a lamp safe system that includes an inner casing member and an outer casing member, a base member, a lampshade, a lamp body, and a base member. A inner casing member can move in and out of an outer casing member, and a lamp body member can be placed over and removably attached to an outer casing member. An inner casing member can include two or more walls, and a top surface and a bottom surface. An inner casing member can have attachment points for a lead, screw, a lead screw nut, and guide rails. An inner casing member can have a locking mechanism that can keep the inner casing member inside an outer casing member and lamp body. An outer casing can substantially surround an inner casing. An outer casing can have attachment points for an inner casing member to move in and out of through guide rail supports An inner casing member can move in and out of an outer casing member through a motor rotating a lead screw. An electronic controlling member can have a microcontroller that can be connected to a smart phone and can allow a user to send and receive information from a lamp safe system.

Intelligent Key System
20190051082 · 2019-02-14 ·

Techniques for using wireless electronic keys with electronic locks are disclosed. For example, a computer system can program an access code into a programmable wireless electronic key, and the programmable electronic key can then teach this access code to a programmable electronic lock via wireless communication to thereby program the programmable electronic lock. Unlocking action by the programmed lock can then be made contingent on there being a match between the access code from the key and the access code from the programmed lock. Further still, other operational control parameters (such as time limits) can be programmed into the key to restrict the ability of the key to unlock a lock. Also, audit data such as lock access history can be wirelessly transferred from an electronic lock to an electronic key, whereupon the key can later transfer this audit data to a computer for analysis.