SECURITY SYSTEM AND METHOD OF USING SAME
20230407698 ยท 2023-12-21
Inventors
Cpc classification
G07C9/00174
PHYSICS
E05G1/005
FIXED CONSTRUCTIONS
International classification
Abstract
A security system for storing a number of valuables. The system includes a body for holding the number of valuables, a lid coupled to the body and being movable between a closed position corresponding to the number of valuables being stored, and an open position corresponding to the number of valuables being exposed. The system includes a locking mechanism having an unlocked state corresponding to the lid being movable between closed and open positions, and a locked state corresponding to the lid being maintained in the closed position, and an interface apparatus coupled to at least one of the body and the lid. Responsive to a wireless signal from a user input device, the interface apparatus causes the locking mechanism to be moved from the locked state to the unlocked state, allowing the lid to be moved to the open position and the number of valuables to be accessed.
Claims
1. A security system for storing a number of valuables, the system comprising: a body for holding the number of valuables; a lid coupled to the body and being movable between a closed position corresponding to the number of valuables being stored, and an open position corresponding to the number of valuables being exposed; a locking mechanism having an unlocked state corresponding to the lid being movable between closed and open positions, and a locked state corresponding to the lid being maintained in the closed position; and an interface apparatus coupled to at least one of the body and the lid, wherein, responsive to a wireless signal from a user input device, the interface apparatus causes the locking mechanism to be moved from the locked state to the unlocked state, thereby allowing the lid to be moved to the open position and the number of valuables to be accessed.
2. The system according to claim 1, wherein the interface apparatus comprises a controller electrically connected to the locking mechanism.
3. The system according to claim 2, wherein the interface apparatus further comprises a transceiver for receiving the wireless signal from the user input device, the transceiver being electrically connected to the controller.
4. The system according to claim 3, wherein the interface apparatus further comprises a battery power source electrically connected to the controller, the power source being configured to power the controller.
5. The system according to claim 3, wherein the interface apparatus further comprises a memory electrically connected to the controller, the memory configured with machine executable code.
6. The system according to claim 3, wherein the interface apparatus further comprises a location identifier electrically connected to the controller, the location identifier being configured to relay a location of the security system to the user input device.
7. The system according to claim 3, wherein the interface apparatus further comprises a speaker electrically connected to the controller, the speaker being configured to emanate an audible sound when that the security system and the user input device are separated by greater than a predetermined distance apart.
8. The system according to claim 1, wherein the locking mechanism comprises at least one solenoid electrically connected to the interface apparatus, the solenoid controllable to establish the lid into the locked and unlocked states.
9. The system according to claim 8, wherein the lid further comprises a latching member, and wherein the at least one solenoid has a locking member configured to interface with the latching member in order to allow the lid to move between the locked and unlocked states.
10. The system according to claim 1, further comprising a scanner configured as part of the system to scan cards which are stored in the system.
11. A security system for storing a number of valuables, the system comprising: a body for holding the number of valuables; a lid coupled to the body and being movable between a closed position corresponding to the number of valuables being stored, and an open position corresponding to the number of valuables being exposed; a locking mechanism having an unlocked state corresponding to the lid being movable between closed and open positions, and a locked state corresponding to the lid being maintained in the closed position, wherein the locking mechanism is movable between the locked state and the unlocked state without a mechanical mechanism.
12. The system according to claim 11, wherein the body has a containing space for holding the number of valuables, wherein the lid is connected to the body at a hinge, wherein the locking mechanism is disposed on a first side of the containing space, and wherein the hinge is disposed on a second, opposite side of the containing space.
13. A method of using a security system, comprising the steps of: executing a software application on a computing device; pairing a locking container to the software application to enable communication between the locking container and the software application and to allow the software application to control the locking container placing playing cards into the locking container; locking the locking container; monitoring the location of the locking container in relation to the computing device and responsive to a distance between the locking container and the computing device exceeding a predetermined value, providing an alert on the computer device; prior to playing a game with the playing cards, controlling the application software to send an unlock signal from the computing device to the locking container to unlock the locking container; responsive to the locking container receiving the unlock signal, unlocking the locking container to allow access to the playing cards.
14. The method according to claim 13, further comprising scanning one or more of the cards using the software application executing on the computing device to register the one or more cards with the application software.
15. The method according to claim 14, wherein the scanner is a camera of the computing device and the computing device is a smartphone.
16. The method according to claim 13, further comprising using the application software to locate the locking container and display the location of the locking container on a map displayed on a screen of the computing device.
17. The method according to claim 13, further comprising generating an alarm sound with the locking container in response to the distance between the locking container and the computing device exceeding a predetermined value.
18. The method according to claim 13, further comprising pairing a second locking container with the software application using the computing device.
19. The method according to claim 13, wherein pairing comprises scanning or entering a code associated with the computing device to pair the locking container with the software application, and in response, sending a signal from the locking container to the computing device to provide the code to the application software.
20. The method according to claim 13, wherein the application software executing on the computing device communicates wirelessly with the locking container.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
DETAILED DESCRIPTION
[0016]
[0017] Security system 2 also includes a locking mechanism 10 having an unlocked state corresponding to lid 6 being movable between closed and open positions, and a locked state corresponding to lid 6 being maintained in the closed position. In one example embodiment, lid 6 has a latching member 7, and locking mechanism 10 includes at least one solenoid 11 configured to engage latching member 7 in order to maintain lid 6 in a closed position, with respect to body 4. That is, the interface between latching member 7 and solenoid 11 determines whether lid 6 is maintained in the closed position, or is otherwise movable to the open position.
[0018] Additionally, as shown in
[0019] Referring to
[0020] Referring to
[0021] For example, each of the playing cards 100,101,102,103,104,105 can be scanned by phone 200 in order to register the cards 100,101,102,103,104,105 with phone 200, and a list of all the playing cards 100,101,102,103,104,105 (e.g., or other valuables) can be generated, as indicated in steps 560,562. See also, for example,
[0022] Generating this list is advantageous because before certain card games are played, such as Yu-Gi-Oh!, players must submit lists of all of their cards that they will use. In any given game, the number of cards being played can be rather extensive. As such, having a relatively simple and straightforward mechanism, provided by phone 200 and security system 2, of generating such a list is particularly advantageous. This method also provides an efficient and accurate way for players to monitor and track cards, including which box includes which cards. It is contemplated that more than one deck of cards may be created and stored in one or more different security boxes.
[0023] Another advantage of using phone 200 and security system 2 can be appreciated with reference to step 570, wherein after the pairing step 510, a button in the application software executing on the phone 200 (or tablet or other computing device) can be pressed in order to produce a location of the security system 2 containing the cards. The location may be displayed on a map, or by distance and direction. When the button in the software is pressed, a wireless signal is sent to security system 2 and is received at the transceiver 28, which is electrically connected to location identifier 30. In turn, through the transceiver 28, the location identifier 30 relays the GPS location of the security system 2 to the phone 200. As a result of this capability, users can monitor the location of the security system 2, and can guard against theft. For example, if a user realizes he or she has misplaced the security system 2, or believes it has been stolen, he or she can press a button shown in the screen by the application software executing on the phone 200 and know exactly where it is in the manner just described. In the event that the user believes it is stolen, this information can significantly improve the likelihood that police officers or other authorities will be able to retrieve it.
[0024] The application software may also be configured to provide an alert or alarm to the user (and optionally at the security system box itself) when the security system box is outside of a set proximity to the user. The alert or alarm may be issued by the user's computing device, such as a smartwatch, smartphone, tablet, or a dedicated fob associated with the security system. The proximity may be set by the user, such as 10 feet, 20 feet, or any other distance. This alerts the user if a third party were to walk away with security system with the user's knowledge.
[0025] Continuing to refer to
[0026] As an additional layer of security, a step 590 in
[0027] Finally, in accordance with the disclosed concept, the method further includes a step 600 of sending a wireless signal (or any other type connection or signal) from the phone 200 to the security system 2 in order to the move or transition the locking mechanism 10 between locked and unlocked states. More specifically, the wireless signal from the phone 200 may be received at the transceiver 28 and be processed at the controller 22, which is electrically connected to the locking mechanism 10. In one example embodiment, an electrical signal is sent from the controller 22 to a solenoid 11 after receipt at the transceiver 28. The solenoid 11 has a plunger, rod, pin, or any other structure, which in turn is moved between positions in order to allow the latching member 7 of the lid 6 to be disengaged, thereby allowing the lid to open and the playing cards 100 to be accessed. In one embodiment, all the locking components are contained or housed within the locking mechanism. Thus, it will be appreciated that the security system 2 can move between positions without a traditional key or other mechanical mechanism, but instead via a user input device such as using the phone 200. A traditional key or code via touch pad may be provided on the box as well to allow access in the event or a dead battery or software glitch.
[0028] Also part of the method of
[0029] In addition, the housing of the security system may be configured with a code, such as a QR code, bar code, numeric number code, or any other type code, on the outside of the housing that allows a person to scan with a computing device (phone or tablet) or enter the code at a web site if the security system (housing) is found. Thus, if the housing is lost, and then found, the code can be scanned and the code will lead the person filing the housing to the owner, such as providing a phone number or other contact information for the rightful owner.
[0030] As discussed above,
[0031]
[0032] While various embodiments of the invention have been described, it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of this invention. In addition, the various features, elements, and embodiments described herein may be claimed or combined in any combination or arrangement.