LOCKING MUG
20210394981 · 2021-12-23
Inventors
- Madison Warner (Warrensville, NC, US)
- Jason McGrath (Broomfield, CO, US)
- Nicholas Anderson (Boulder, CO, US)
- Samuel House (Boulder, CO, US)
Cpc classification
G07C9/37
PHYSICS
B65D55/14
PERFORMING OPERATIONS; TRANSPORTING
B65D51/24
PERFORMING OPERATIONS; TRANSPORTING
International classification
B65D55/14
PERFORMING OPERATIONS; TRANSPORTING
A47G19/22
HUMAN NECESSITIES
B65D51/24
PERFORMING OPERATIONS; TRANSPORTING
G07C9/37
PHYSICS
Abstract
A locking mug is implemented which is configured with a locking mechanism by which the lid is locked to a cup until an authorized user unlocks the locking mug using their fingerprint. The locking mug may come equipped with the necessary hardware and software to store a fingerprint profile associated with a unique user and then use that fingerprint profile to verify that an authorized user is accessing the locking mug's contents. The locking mug includes a fingerprint scanner that scans the user's fingerprint each time the user wishes to unlock the locking mug and drink its contents. The security measures provided by the locking mug prevents unsuspecting users from being harmed by external predators. The configuration and design of the lid's locking features and security software for verifying a unique user's fingerprint profile facilitates user safety when using the portable locking mug.
Claims
1. A locking mug that maintains a locking state until receiving user authentication credentials, comprising: a cup having a locking mechanism; and a lid that detachably engages with the cup, wherein the lid includes: one or more processors; a fingerprint sensor; and a hardware based memory device having executable instructions which, when executed by the one or more processors, cause the locking mug to: set a fingerprint profile associated with a unique user, wherein the fingerprint profile is utilized for comparison to a received fingerprint from a scan; scan a fingerprint from a user's finger responsive to the user's finger being placed over the fingerprint sensor; compare the scanned fingerprint with the fingerprint profile; and either unlock the lid responsive to the scanned fingerprint satisfying a threshold similarity level to the fingerprint profile, or maintain the lock on the lid responsive to the scanned fingerprint failing to satisfy a threshold similarity level to the fingerprint profile.
2. The locking mug of claim 1, wherein a bottom of the lid includes an input mechanism which enables the user to configure the locking mug to set the fingerprint profile.
3. The locking mug of claim 2, wherein the input mechanism on the bottom of the lid includes membrane switches which are water resistant.
5. The locking mug of claim 3, in which the executed instructions further cause the locking mug to: receive an input code at the input mechanism; verify that the input code matches a pre-set code unique to the locking mug; and enable the user to scan their finger for the fingerprint profile responsive to the input code being verified.
6. The locking mug of claim 1, further comprising an indicator light positioned on a top of the lid, wherein the indicator light indicates whether the lid is in a locked or unlocked state.
7. The locking mug of claim 1, further comprising a charging port on the lid.
8. The locking mug of claim 7, wherein the charging port includes a liftable cover to protect the charging port when not in use.
9. The locking mug of claim 1, further comprising: a receptacle on the cup; and a connector on the lid, in which the connector engages with the receptacle when the locking mug is locked and disconnects from the receptacle when the locking mug is unlocked.
10. The locking mug of claim 9, further comprising an actuator which causes the connector to extend when the locking mug is in the locked state, and compress when the locking mug is in the unlocked state.
11. The locking mug of claim 1, in which the executed instructions further cause the locking mug to: assess a position or orientation of the user's finger when placed on the fingerprint sensor; and based on the assessed position or orientation of the user's finger on the fingerprint sensor, determine whether to unlock a barrier on the lid to expose an opening on the lid or to unlock the lid from the cup.
12. The locking mug of claim 11, wherein positions and orientations which affect which feature on the lid to unlock include a directional orientation of the user's finger or a positioning of the user's finger on the fingerprint sensor.
Description
DESCRIPTION OF THE DRAWINGS
[0005]
[0006]
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
DETAILED DESCRIPTION
[0014]
[0015]
[0016] In typical implementations, the one or more processors 225 may be a central processing unit (CPU) or a microcontroller configured to perform discrete operations. The memory 230 may include data and instructions which are executable by the one or more processors. The locking mechanism 235 may interoperate with and be controlled by the actuator 245 for locking and unlocking the locking mug 105. For example, a solenoid can move a rod linearly, typically in two positions. Servos can move either radially or linearly and are characterized by having a feedback mechanism for determining its position. The solenoid can be used to move a bolt or other connector to prevent rotation of the lid 110. Thus, the bolt can prevent the lid from rotating when extended and can release the lid for rotation about the cup when compressed. With respect to the barrier 140 on the lid, an actuator, solenoid, and servos may likewise control and move the barrier from an extended or retracted state, in which the extended state blocks the lid's opening and the retracted state unblocks the opening to enable release of the fluid from the cup.
[0017] The fingerprint scanner 130 may be comprised of a sensor to scan a user's fingerprint and store a fingerprint profile for a unique user and use that profile to provide the user with access to the mug upon receiving and authenticating fingerprints from subsequent scans. The fingerprint scanner may be an optical scanner which takes an image of the fingerprint or a capacitive sensor which uses electricity (similar to a touchscreen) to determine fingerprint patterns. The capacitive scanner may, for example, measure a charge of the user's finger as ridges exhibit a change in capacitance and valleys produce little to no change. An ultrasonic sensor can also be utilized which measures sound waves by sending out ultrasonic pulses and measuring the bounce back to assess ridges and valleys in a fingerprint to identify a fingerprint profile. The fingerprint scanner may, responsive to receiving an authorized fingerprint scan, cause the processor to trigger the actuator 245 to unlock the locking mechanism and thereby provide the authorized user with access to the locking mug's contents.
[0018] Although not shown in
[0019] The OS 215 supports, among other operations, managing the operating system 255 and operating applications 250, as illustratively shown by the arrow. The OS layer may interoperate with the application and hardware layers to facilitate execution of programs and perform various functions and features.
[0020] The application layer 210 can support various applications 260, including a fingerprint application 265. Any number of applications can be utilized by the locking mug 105, whether proprietary or third-party applications. In typical implementations, the applications may be implemented using locally executing code stored in memory 230.
[0021] The fingerprint application 265 may be configured to store fingerprint profiles for one or more unique users of the locking mug 105. These fingerprint profiles may be used as a frame of reference to compare subsequent scans of users' fingerprints to authorize or deny access to the locking mug's contents by, for example, opening the barrier 140 or enabling the lid to enter an unlocked state and disengage from the cup.
[0022] The fingerprint application 265 may receive a user's fingerprint scan taken from the fingerprint scanner 130 and compare the scanned fingerprint to any of the one or more fingerprint profiles stored in memory 230. If the scanned fingerprint corresponds in similarity beyond a pre-set threshold similarity level, then the fingerprint application may grant the user access by changing the indicator light 120 (
[0023] While using a user's fingerprint is discussed herein, other authentication credentials in addition to or separate from a fingerprint are also possible for controlling user access, such as a pin code, pattern code, facial recognition, etc. For example, another input mechanism, such as a touchscreen display, may be positioned somewhere on the outside of the locking mug 105, such as on the lid 110 or cup 115. This touchscreen display may enable the user to enter a certain code to unlock the lid from the cup. Additionally or alternatively, a camera may be the input mechanism on the outside which compares the user's face to a facial profile previously stored in memory.
[0024]
[0025] Responsive to the locking mug 105 entering an unlocked state, the lid can unlock and lift from the cup, as representatively shown by numeral 315.
[0026]
[0027]
[0028] Responsive to the user entering a correct code on the input interface for device configuration, the user can place his or her finger, such as a thumb, on the fingerprint scanner 130, as representatively illustrated by numeral 510. The fingerprint scanner may pass the fingerprint to the processor 225 which will then store that fingerprint profile in memory 230. This fingerprint profile will be used for future reference to verify that an authorized user is opening the locking mug 105.
[0029]
[0030] Exemplary fingerprint positions on the fingerprint scanner 130 that may affect whether the locking mug unlocks the barrier or the lid from the cup entirely includes whether the user's finger is placed on a top or bottom portion of the scanner, whether the user's finger is vertical, horizontal, or diagonal (or other directional orientation), among other positions. For example, the locking mug may associate a vertical finger position with unlocking the barrier, and the locking mug may associate a horizontal finger position with unlocking the lid from the cup.
[0031] Thus, upon authenticating the fingerprint, the locking mug may unlock the barrier or lid 620 and thereby provide the user access to the cup's contents. For example, the barrier 140 may automatically move or unlock to enable the user to move the barrier herself, thereby providing access to the opening 630. The opening may lead to a flow path which extends to the bottom side of the lid 110 and into the cup 115. If the two fingerprints fail to match or correspond beyond the pre-set threshold, then the locking mug may maintain its locked stated and deny user access 625 to the cup's contents. The indicator light 120 may turn a particular color, like red, when access is denied.
[0032]
[0033] The barrier 140 may operate similarly to the lid and cup mechanism shown in
[0034]
[0035]
[0036] By way of example, and not limitation, computer-readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. For example, computer-readable media includes, but is not limited to, RAM, ROM, EPROM (erasable programmable read only memory), EEPROM (electrically erasable programmable read only memory), Flash memory or other solid state memory technology, CD-ROM, DVDs, HD-DVD (High Definition DVD), Blu-ray, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the architecture 900.
[0037] According to various embodiments, the architecture 900 may operate in a networked environment using logical connections to remote computers through a network. The architecture 900 may connect to the network through a network interface unit 916 connected to the bus 910. It may be appreciated that the network interface unit 916 also may be utilized to connect to other types of networks and remote computer systems. The architecture 900 also may include an input/output controller 918 for receiving and processing input from a number of other devices, including a keyboard, mouse, touchpad, touchscreen, control devices such as buttons and switches or electronic stylus (not shown in
[0038] It may be appreciated that any software components described herein may, when loaded into the processor 902 and executed, transform the processor 902 and the overall architecture 900 from a general-purpose computing system into a special-purpose computing system customized to facilitate the functionality presented herein. The processor 902 may be constructed from any number of transistors or other discrete circuit elements, which may individually or collectively assume any number of states. More specifically, the processor 902 may operate as a finite-state machine, in response to executable instructions contained within the software modules disclosed herein. These computer-executable instructions may transform the processor 902 by specifying how the processor 902 transitions between states, thereby transforming the transistors or other discrete hardware elements constituting the processor 902.
[0039] Encoding the software modules presented herein also may transform the physical structure of the computer-readable storage media presented herein. The specific transformation of physical structure may depend on various factors in different implementations of this description. Examples of such factors may include, but are not limited to, the technology used to implement the computer-readable storage media, whether the computer-readable storage media is characterized as primary or secondary storage, and the like. For example, if the computer-readable storage media is implemented as semiconductor-based memory, the software disclosed herein may be encoded on the computer-readable storage media by transforming the physical state of the semiconductor memory. For example, the software may transform the state of transistors, capacitors, or other discrete circuit elements constituting the semiconductor memory. The software also may transform the physical state of such components in order to store data thereupon.
[0040] As another example, the computer-readable storage media disclosed herein may be implemented using magnetic or optical technology. In such implementations, the software presented herein may transform the physical state of magnetic or optical media, when the software is encoded therein. These transformations may include altering the magnetic characteristics of particular locations within given magnetic media. These transformations also may include altering the physical features or characteristics of particular locations within given optical media to change the optical characteristics of those locations. Other transformations of physical media are possible without departing from the scope and spirit of the present description, with the foregoing examples provided only to facilitate this discussion.
[0041] In light of the above, it may be appreciated that many types of physical transformations take place in the architecture 900 in order to store and execute the software components presented herein. It also may be appreciated that the architecture 900 may include other types of computing devices, including wearable devices, handheld computers, embedded computer systems, smartphones, PDAs, and other types of computing devices known to those skilled in the art. It is also contemplated that the architecture 900 may not include all of the components shown in
[0042] Various exemplary embodiments are disclosed herein. One embodiment includes a locking mug that maintains a locking state until receiving user authentication credentials, comprising: a cup having a locking mechanism; and a lid that detachably engages with the cup, wherein the lid includes: one or more processors; a fingerprint sensor; and a hardware based memory device having executable instructions which, when executed by the one or more processors, cause the locking mug to: set a fingerprint profile associated with a unique user, wherein the fingerprint profile is utilized for comparison to a received fingerprint from a scan; scan a fingerprint from a user's finger responsive to the user's finger being placed over the fingerprint sensor; compare the scanned fingerprint with the fingerprint profile; and either unlock the lid responsive to the scanned fingerprint satisfying a threshold similarity level to the fingerprint profile, or maintain the lock on the lid responsive to the scanned fingerprint failing to satisfy a threshold similarity level to the fingerprint profile.
[0043] In another example, a bottom of the lid includes an input mechanism which enables the user to configure the locking mug to set the fingerprint profile. In that example, the input mechanism on the bottom of the lid includes membrane switches which are water resistant. In another example, the executed instructions further cause the locking mug to: receive an input code at the input mechanism; verify that the input code matches a pre-set code unique to the locking mug; and enable the user to scan their finger for the fingerprint profile responsive to the input code being verified. As another example, the locking mug further comprises an indicator light positioned on a top of the lid, wherein the indicator light indicates whether the lid is in a locked or unlocked state. Another example further comprises a charging port on the lid. In that example, the charging port includes a liftable cover to protect the charging port when not in use. As another example, the locking mug further comprises: a receptacle on the cup; and a connector on the lid, in which the connector engages with the receptacle when the locking mug is locked and disconnects from the receptacle when the locking mug is unlocked. That example further comprises an actuator which causes the connector to extend when the locking mug is in the locked state and compress when the locking mug is in the unlocked state. As a further example, the executed instructions further cause the locking mug to: assess a position or orientation of the user's finger when placed on the fingerprint sensor; and based on the assessed position or orientation of the user's finger on the fingerprint sensor, determine whether to unlock a barrier on the lid to expose an opening on the lid or to unlock the lid from the cup. In that example, positions and orientations which affect which feature on the lid to unlock include a directional orientation of the user's finger or a positioning of the user's finger on the fingerprint sensor.