E05B35/086

MECHANICAL OBJECT TRACKING SYSTEM
20220333415 · 2022-10-20 · ·

Apparatus and associated methods relate to an access control system having a planar interlocking mechanism including two reflectively symmetric rotating moon gears mechanically coupled by a linear slide configured to respond to rotation of the moon gears. In an illustrative example, the moon gears are mechanically coupled by the linear slide via respective actuating cams. The moon gears may be provided, for example, with locking cams configured to releasably secure the linear slide via a corresponding follower on the linear slide. Rotation of one moon gear into a first mode may, for example, place the other moon gear in a second mode, and vice versa. Each moon gear may be configured, for example, to be operated by a removable peg. Various embodiments may advantageously be configured such that release of a removable peg from one moon gear captures a peg in a corresponding moon gear.

SHIELDED ELECTRONIC LOCK BOX
20170241165 · 2017-08-24 · ·

Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of “smart keys.”

Mechanical object tracking system
11719027 · 2023-08-08 · ·

Apparatus and associated methods relate to an access control system having a planar interlocking mechanism including two reflectively symmetric rotating moon gears mechanically coupled by a linear slide configured to respond to rotation of the moon gears. In an illustrative example, the moon gears are mechanically coupled by the linear slide via respective actuating cams. The moon gears may be provided, for example, with locking cams configured to releasably secure the linear slide via a corresponding follower on the linear slide. Rotation of one moon gear into a first mode may, for example, place the other moon gear in a second mode, and vice versa. Each moon gear may be configured, for example, to be operated by a removable peg. Various embodiments may advantageously be configured such that release of a removable peg from one moon gear captures a peg in a corresponding moon gear.

KEY CAPTURE LOCK
20200325709 · 2020-10-15 ·

A lock assembly includes a bolt movable between a first position and a second position, a rotating body rotatable between a first position and a second position, and a pawl member rotatable between a first position and a second position. Rotation of the rotating body from the first position to the second position is configured to cause the bolt to move from the first position to the second position. The pawl member is configured to prevent rotation of the rotating body from the first position to the second position when the pawl member is in the first position and the rotating body is in the first position.

Shielded electronic lock box
10030418 · 2018-07-24 · ·

Systems and methods are disclosed for maintaining security and data gathering for a number of vehicles. The systems include a vehicle activity module for each of the vehicles. The vehicle activity module has a wireless transmitter, a storage device, at least one sensor for receiving event information from identification devices, such as RFID cards, keypads, magnetic ID cards, and the like, a releasable key container, and a processor for accessing and analyzing information. The VAMs are wirelessly connected to a computer system. The VAMs control access to the keys, monitor information relating to access, and store and transmit information relating to sales events, non-sales events, and intrusion events. The VAMs are capable of autonomous operation, without the need to access the computer system to verify event information. The VAMs further include signal attenuating mechanisms to facilitate use of smart keys.

Token Key Locker
20170022734 · 2017-01-26 ·

Currently, people at a public or private location wishing to store their valuables have limited options. They may use a token locker where a coin-shaped token is inserted into and retained by the locking device, allowing the release of a locking key. They may use a similar electronic version of the token locker. In some cases, they may have to bring their own lock or even a separate private locker to store their valuables. The standard token requires a new token to be inserted each time the door is opened and leaves the location unable to track the duration of use. Electronic devices can be expensive and require a source of electricity. Bringing a lock or entire lock box is cumbersome.

The solution is a process whereby a universal key is used in place of a token. This universal key, as a token would do, releases a unique locking key from the locker. The universal key, labeled for tracking, is borrowed for use at the location. It is used in place of a token any number of times and then is returned after usage is completed. This process relies on a unique mechanism within each locker that handles the key that is used in place of a token and the key that secures the locker. The invention also allows an inexpensive method for a location to keep track of who has rented which locker and allows tracking of how long it is used. Furthermore, the user has the advantage of being able to reuse the universal key in different lockers prior to returning it. This advancement on the ordinary token locker creates clear advantages over current methods and can create employment opportunity that adds a human touch in the handling of the delivery and return of the universal key being used in place of a token.

Key capture lock

A lock assembly includes a bolt movable between a first position and a second position, a rotating body rotatable between a first position and a second position, and a pawl member rotatable between a first position and a second position. Rotation of the rotating body from the first position to the second position is configured to cause the bolt to move from the first position to the second position. The pawl member is configured to prevent rotation of the rotating body from the first position to the second position when the pawl member is in the first position and the rotating body is in the first position.

KEY CAPTURE LOCK
20250341114 · 2025-11-06 ·

A lock assembly includes a bolt movable between a first position and a second position, a rotating body rotatable between a first position and a second position, and a pawl member rotatable between a first position and a second position. Rotation of the rotating body from the first position to the second position is configured to cause the bolt to move from the first position to the second position. The pawl member is configured to prevent rotation of the rotating body from the first position to the second position when the pawl member is in the first position and the rotating body is in the first position.