High security lock with multiple operational modes
10337207 ยท 2019-07-02
Inventors
Cpc classification
E05B2047/0094
FIXED CONSTRUCTIONS
E05C1/00
FIXED CONSTRUCTIONS
E05B47/0001
FIXED CONSTRUCTIONS
International classification
E05C1/00
FIXED CONSTRUCTIONS
E05B27/00
FIXED CONSTRUCTIONS
Abstract
A lock system may comprise a lock assembly including a locking element movable between locking and unlocking positions, and a first lock actuating assembly configured to be mechanically operated to actuate the locking element to move between the locking and unlocking positions, with mechanical operation of the first lock actuation assembly occurring through a physical object. The system may also comprise a second lock actuating assembly configured to be electrically operated to actuate the locking element to move between the retracted and extended positions, with electrical operation of the second lock actuating assembly occurring through reception of a wireless signal by the second lock actuating assembly. The lock and lock actuating assemblies may have at least one mode of operation characterized by the lock assembly being actuated only by substantially simultaneous operation of the first lock actuating assembly and operation of the second lock actuating assembly.
Claims
1. A lock system comprising a lock assembly including a locking element movable between a locking position and an unlocking position; a first lock actuating assembly configured to be mechanically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions; a second lock actuating assembly configured to be electrically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions; wherein the lock assembly and the first and second lock actuating assemblies have a plurality of user-selectable operating modes, the plurality of modes comprising: a first mode of operation in which, when selected by the user, only the first lock actuating assembly is capable of actuating the lock assembly; a second mode of operation in which, when selected by the user, only the second lock actuating assembly is capable of actuating the locking element of the lock assembly; and a third mode of operation in which, when selected by the user, the lock assembly is actuated only by operation of the first lock actuating assembly in combination and substantially simultaneously with operation of the second lock actuating assembly.
2. The system of claim 1 wherein the first mode of operation is further characterized by the second lock actuating assembly being incapable of actuating the lock assembly.
3. The system of claim 2 wherein the second mode of operation is further characterized by the first lock actuating assembly being incapable of actuating the lock assembly.
4. The system of claim 1 wherein the first lock actuating assembly is configured to actuate the lock assembly independently of the second lock actuating assembly in at least one mode of operation and the second lock actuating assembly is configured to actuate the lock assembly independently of the first lock actuating assembly in at least one mode of operation.
5. The system of claim 1 wherein mechanical operation of the first lock actuation assembly occurs through a physical object.
6. The system of claim 5 wherein the physical object comprises a key.
7. The system of claim 1 wherein the first lock actuating assembly includes a plug with a key slot configured to receive a key such that a key is capable of rotating the plug and a tailpiece extending from the plug to actuate the lock assembly.
8. The system of claim 1 wherein electrical operation of the second lock actuating assembly occurs through reception of a wireless signal by the second lock actuating assembly.
9. The system of claim 1 wherein the locking element comprises a bolt movable between a retracted position corresponding to the unlocking position and an extended position corresponding to the locking position.
10. The system of claim 9 wherein the bolt of the locking element is configured to extend from a door in the locking position and retract into a door in the unlocking position.
11. A lock system comprising a lock assembly including a locking element movable between a locking position and an unlocking position; a first lock actuating assembly configured to be mechanically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, mechanical operation of the first lock actuation assembly occurring through a physical object; a second lock actuating assembly configured to be electrically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, electrical operation of the second lock actuating assembly occurring through reception of a wireless signal by the second lock actuating assembly; wherein the lock assembly and the first and second lock actuating assemblies have a plurality of user-selectable operating modes, the plurality of modes comprising: a first mode of operation in which, when selected by the user, only the first lock actuating assembly is capable of actuating the lock assembly and the second lock actuating assembly being incapable of actuating the lock assembly; a second mode of operation in which, when selected by the user, only the second lock actuating assembly is capable of actuating the locking element of the lock assembly and the first lock actuating assembly being incapable of actuating the lock assembly; and a third mode of operation being in which, when selected by the user, the lock assembly is actuated only by operation of the first lock actuating assembly in combination and substantially simultaneously with operation of the second lock actuating assembly.
12. The system of claim 11 wherein the first lock actuating assembly is configured to actuate the lock assembly independently of the second lock actuating assembly in at least one mode of operation and the second lock actuating assembly is configured to actuate the lock assembly independently of the first lock actuating assembly in at least one mode of operation.
13. The system of claim 11 wherein the physical object comprises a key.
14. The system of claim 11 wherein the first lock actuating assembly includes a plug with a key slot configured to receive a key such that a key is capable of rotating the plug and a tailpiece extending from the plug to actuate the lock assembly.
15. The system of claim 11 wherein the locking element comprises a bolt movable between a retracted position corresponding to the unlocking position and an extended position corresponding to the locking position.
16. A lock system comprising a lock assembly including a locking element movable between a locking position and an unlocking position; a first lock actuating assembly configured to be mechanically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, mechanical operation of the first lock actuation assembly occurring through a physical object; a second lock actuating assembly configured to be electrically operated to actuate the locking element of the lock assembly to move between the locking and unlocking positions, electrical operation of the second lock actuating assembly occurring through reception of a wireless signal by the second lock actuating assembly; wherein the lock assembly and the first and second lock actuating assemblies have at least one user-selectable mode of operation characterized by the lock assembly being actuated only by operation of the first lock actuating assembly in combination and substantially simultaneously with operation of the second lock actuating assembly.
17. The system of claim 1 wherein a said mode of operation is set through wireless communication with the system.
18. The system of claim 1 wherein in the first mode of operation, the second lock actuating assembly is prevented from actuating the locking element of the lock assembly.
19. The system of claim 18 wherein in the second mode of operation, the first lock actuating assembly is prevented from actuating the locking element of the lock assembly.
20. The system of claim 19 wherein in the third mode of operation, actuation of the lock assembly by the first lock actuating assembly alone is prevented and actuation of the lock assembly by the second lock actuating assembly alone is prevented.
21. The system of claim 1 wherein in the first mode of operation, the second lock actuating assembly is disengaged from actuating the locking element of the lock assembly.
22. The system of claim 21 wherein in the second mode of operation, the first lock actuating assembly is disengaged from actuating the locking element of the lock assembly.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The disclosure will be better understood and when consideration is given to the drawings and the detailed description which follows. Such description makes reference to the annexed drawings wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
DETAILED DESCRIPTION
(25) With reference now to the drawings, and in particular to
(26) The applicants have recognized the need for a lock that is physically secure against both forced and covert attacks and incorporates two separate yet integrated security layers: mechanical and electronic. Applicants have recognized that both mechanically- and electronically-triggered or operated lock systems have at least some degree of vulnerability to covert attacks. Mechanically-operated locks can be compromised in a number of ways, several of which are mentioned in this disclosure. Electronically-operated locks may be triggered by wireless transmissions or retransmissions or field generations that may or may not originate from authorized devices or objects, such as key cards, security fobs, etc. While there may seem to be some similarity to current electro-mechanical cylinder designs, there is a critical distinction, as the disclosed lock system provides security against brute force physical attacks, manipulation attacks, and the protection of key control, and can be added to virtually any mechanical-based cylinder. In order to be secure, a lock must contain a locking mechanism based upon mechanical components that has been proven to be secure against picking, impressioning, decoding, key copying and key simulation, a physically-secure plug and shell to meet UL and BHMA standards, and must also contain advanced electronic credentials to allow different options that are required to protect against present security threats. The modes of locking and the ability to alter the use of mechanical and electronic elements provide a secure locking system as described herein. Significantly, while known lock systems provide only a single mode of operation (e.g., only a mechanical mode of operation, or only an electronic mode of operation, or only a combination mechanical and electronic mode of operation), the disclosed lock system provides the user with the option to use any one of multiple modes on the same lock, including, for example, mechanical operation, electronic operation, or a combination of mechanical and electronic operation. As an added level of security, some embodiments may also provide the option to disengage the deactivated portion of the device (e.g., mechanical or electrical) from influencing the operation of the latch or bolt. As another added security measure, the operational mode of the lock system may not be made apparent from viewing the installed system so that attempts to compromise the lock must deal with the need to determine the current operational mode of the lock system.
(27) The disclosure describes an electronic and mechanical cylinder and configuration of components, either internal to any deadbolt cylinder configuration, or as an external add-on module to a deadbolt device, that may incorporate the attributes of the highest security mechanical cylinders, together with the enhanced electronic credentials that are found in the highest security electronic cylinders. The locking system of the disclosure may operate with conventional as well as high security cylinders and will provide a high level of security against simple and sophisticated methods of attack and will allow the user three distinct levels of security for a locking system which can be locally or remotely programmed, depending on hardware configuration and required levels of security of the user or facility. The unique combination of mechanical and electronic credentials and how they are implemented distinguishes this invention from current technology and state of the art.
(28) When set to the highest security level, the combination of the lock system may be virtually impervious to attacks by covert and forced entry, and may also be totally resistant to the compromise of key control that can normally be accomplished through the use of traditional known methods of copying, duplicating, simulating and replicating the warding and bitting portion of mechanical keys. The lock system may also make the use of advanced techniques like 3D printer technology essentially meaningless because even if the correct key is produced for this lock, it will not open it without the correct electronic credentials to be operated in parallel. In other words, in one operating mode, the rotation (or blocking of rotation) of the plug, even with the correctly bitted key, will not result in the lock being able to be opened. The lock system 100 may be distinguished from current electro-mechanical designs, or purely mechanical designs, in this ability to, in one mode, block the plug from turning through the use of the correct key.
(29) The lock system 100 allows for embodiments with several variations and designs to accomplish the same result of securing a mechanical cylinder against different attacks. In some embodiments, the lock system may be an add-on separate component that will operate with a single-sided deadbolt, which is a common device used in many applications throughout the world. Most single-sided deadbolts rely upon a thumb-turn positioned on the inside of the door, which provides the ability to retract and extend the bolt by the user turning the thumb-turn. The add-on embodiment of the lock system 100 differs from those currently in use.
(30) The lock system 100 also differs from known electronic add-on devices presently on the market in a number of critical respects. The typical mode of operation for known electronic control of deadbolt locks require some form of wireless credentials, usually low energy Bluetooth, NFC, or RFID, as well as WiFi, to communicate to the lock through the use of a key fob or smartphone application. When the correct credential is presented, such as in the form or a receipt of a wireless signal recognized to be authorized or authentic, the lock can be opened or locked. In some cases, the face of the cylinder is touched, which senses the presence of the user. When the electronic credentials are detected, the lock can be opened or locked.
(31) When electronic add-on products are added to deadbolt cylinders, the mechanical cylinder and key only provide a backup in case of failure of the electronics, and thus provide the ability to circumvent the electronic credentials. The problem with this arrangement is thus the same as conventional mechanical locksthe locks can still be compromised in a variety of means, depending upon their security rating and design. The locks are subject to forced and covert attacks, and do not provide any meaningful key control, so these electronic add-on systems are in essence convenience locks that can be opened electronically, obviating the need for mechanical keys.
(32) One significant distinction between the lock system of the disclosure and other known locks is that the electronic control mechanism of the system allows the system to operate in one of three states, depending upon security requirements. Thus, the distinctive and unique feature of this invention is the control and mechanical module that determines how the lock functions and to effectively block access to the plug and internal components that would allow manipulation. The present disclosure provides a lock system with three modes of locking and access. Depending upon the setting selected by the user, the lock can be set to a (first) mode of mechanical actuation only, a (second) mode of electronic credentials actuation only, or a (third) mode of electro-mechanical actuation that requires the use of the mechanical actuation and electronic credentials, usually presented in a simultaneous or substantially simultaneous manner. For the purposes of this disclosure, substantially simultaneous actuation of the first and second lock actuating assemblies may include actuations of the first and second lock actuating assemblies that occur within a predetermined time period. For example, the predetermined time period in which actuation of both of the first and second lock actuating assemblies must occur to be considered substantially simultaneous actuations may range up to one minute between the time of actuation of one lock actuating assembly and the time of actuating the other lock actuating assembly, and may include possibly more time between actuations. In some of the more preferred implementations, the time between the actuations of the first and second locking actuating assemblies may be less than approximately 20 seconds, and in some of the most preferred implementations may be less than approximately 10 seconds or even approximately 5 seconds. In the third mode, if actuations of both of the first and second lock actuating assemblies are not detected within the predetermined period representing a substantially simultaneous actuation, then the lock assembly will not be actuated and actuation of the first and second lock actuations assemblies must be repeated if the lock assembly is to be successfully actuated.
(33) The first mode, or mechanical-only mode, may be considered the relatively lowest security operating mode of the lock system and permits the mechanical lock cylinder to operate substantially as normal. For example, the user inserts the properly-bitted key, turns the key, and the lock either locks or unlocks. In this mode, there may be essentially no change to the lock's normal operation.
(34) In the second mode, or electronic credentials-only mode, only the electronic credentials are required and utilized to control the actuation mechanism that allows the bolt to be extended or retracted. The operation of the key and its link to the bolt is removed and thus rendered inoperable. Significantly, in the second mode, even a properly-bitted key would have no effect upon the control of the bolt in contrast to normal operation of a conventional mechanical lock. In this mode, the operation of the mechanical lock may not operate the bolt, latch, or other fixing mechanism that is normally utilized to move the bolt to secure or unsecure a door. The second mode may be considered to provide a relatively higher level of security as compared to the first mode.
(35) The third mode may provide the relatively highest degree of security among the modes as it requires two different types of authentication (e.g., mechanical key AND electronic credentials) to be used to actuate the lock into an unlocked condition, while the first and second modes only require one type of authentication (e.g., mechanical key OR electronic credentials) to unlock the system.
(36) Depending upon the interface configuration, the lock system may either block any rotation of the plug in the second mode and as a result block the ability to manipulate internal lock components by picking and other covert entry attacks, or the plug will rotate free of the actuation mechanism even if a key with the proper bitting is inserted into the plug or the proper bitting is simulated (e.g., through picking), but such rotation will not result in any movement of the bolt or latch. Whether 1) the plug is blocked from rotation or 2) allowed to spin freely may be determined by the character of the interface between the plug tailpiece and the actuation mechanism, and in some embodiments may be set or determined by the user through the various setting provided to the user.
(37) If the interface of the plug tailpiece and actuation mechanism is configured so that the two elements are disconnected or de-linked from each other, then the different modes of attacking or subverting the lock as described herein will not result in the bolt being actuated. While these manners of attacking the lock may result in the plug being turned, as well as the tailpiece, such attacks will have no effect because the plug will spin free of the actuation mechanism. In the second mode, unless the correct electronic credentials are presented, the actuation mechanism and thus the bolt cannot be moved or extended.
(38) If the interface of the plug tailpiece and actuation mechanism is configured so that rotation of the plug, even with insertion of a correctly-bitted key, is physically blocked and cannot occur, then any attempt at subverting the lock by picking, impressioning, decoding, bumping, or even the use of the correct key will not result in the lock being opened, or its security being compromised.
(39) By blocking rotation of the lock plug, which may extend to blocking as little as one degree of rotation, the recognized methods of covert bypass may be frustrated. Picking and impressioning cannot occur without a very slight movement of the plug when tension is applied. Similarly, master key extrapolation and bumping is rendered virtually impossible because rotational movement of the plug is required for feedback as to the success or failure of the process.
(40) In implementations of the third mode, until the proper electronic credentials are presented to the lock simultaneously or substantially simultaneously with the correctly bitted key, the interface of the plug tailpiece and the actuation mechanism may completely block rotation of the plug through the use of a number of different mechanisms, including a motor drive, worm gear, solenoid, or magnetic coupling. In the third mode, key control is enhanced because even having the correctly bitted key will not permit the lock to be opened without the correct credentials.
(41) These three modes of operation allow the user to determine, on a dynamic real-time basis, the desired security level provided by the lock system. Generally, only one mode of operation may be activated at a time. The mode of the lock system may be set in any suitable manner, such as by physical or mechanical controls on the lock system, or even both operated simultaneously, but in many implementations it may be desirable to provide control of the modes electronically and in particular wirelessly. In addition to changing modes, it may be desirable to add, delete, or change the device or devices having the appropriate credentials to operate the lock system, and this may also be performed electronically and/or wirelessly. Switching between the modes may thus be effected using a portable device or computer, or even through a wireless network of the structure on which the lock system is installed. The modes may be toggled or changed manually, or may be changed automatically based upon factors such as, for example, time of day, day of week, etc. In some instances it may be desirable to allow the use of a mechanical key (only) to operate the lock system, such as based upon time of day, but at other times to require a higher level of security. In some locations, it may be desirable or necessary to allow access through the use of electronic credentials only during certain times, particularly since the electronic credentials may be transmitted to an authorized recipient electronically. In other circumstances where the highest degree of security is required, the combination of mechanical and electronic credentials may be required, an option that may also provide additional options for audit of access and control
(42) Significantly, a person seeking to subvert the lock system would not know the mode of the system that is active and in effect, and thus could spend a great deal of time attempting to mechanically open the lock using covert means, only to find that being able to turn the lock plug does not result in retraction of the bolt. In any of the modes in which the lock is configured to prevent the plug from turning, no mechanical feedback can be obtained during the picking or impressioning attempts.
(43) In greater detail, the lock system 100 may utilize various elements of conventional locks. As illustratively shown in
(44) As illustratively shown in
(45) A plug-blocking mechanism may be provided to block rotation of the plug 2 with respect to the shell 1 by acting on the tailpiece 3 of the plug (see
(46) As further illustratively shown in
(47) As illustratively shown in
(48) As is illustratively shown in
(49) As illustratively shown in
(50) As illustratively illustrated in
(51) As also shown in
(52) Looking to
(53) The characteristic sound signatures may be stored in the lock system, such as on a sound processor 59 which also has the ability to compare the signatures of sounds detected by the sound detector 56 and transmitted to the processor 59 (e.g., through connectors 57, 58, cable 60 and connectors 60, 61). In operation, a sound detected by the sound detector 56 may be compared to the stored sounds by the sound processor 59 to determine the possibility that the detected sound corresponds to one of the stored compromise signatures and that an attempt is being made to compromise the lock using one of the known (or even unknown) techniques. Such comparison may also include distinguishing the detected sound from the sound signature of a legitimate locking opening activity.
(54) When a sound signature is detected that corresponds to, or is determined likely to correspond to, an action to compromise the lock, the lock system may be programed or otherwise configured to prevent operation of the lock and may be further configured to block the operation of lock elements that are necessary to open the lock (e.g., retract the bolt). Any suitable technique for disabling the lock elements, or blocking of operative movement of the lock elements, may be employed, and may include the various techniques disclosed in this disclosure. For example, the blocking element 15 may be moved to the blocking position to prevent lock actuation and bolt movement. Blocking the plug from turning (e.g., without relying upon the positions of the pin tumblers to block plug rotation) effectively blocks those methods of compromise that rely upon pin tumblers manipulation, such as bumping, picking, or using other tools used to manipulate the pins. This condition in which the lock cannot be operated using the physical key may be cancelled in various suitable manners, including the presentation of an authorized electronic credential to the lock system, which upon recognition removes the inoperable status of the lock.
(55) It should be appreciated that in the foregoing description and appended claims, that the terms substantially and approximately, when used to modify another term, mean for the most part or being largely but not wholly or completely that which is specified by the modified term.
(56) It should also be appreciated from the foregoing description that, except when mutually exclusive, the features of the various embodiments described herein may be combined with features of other embodiments as desired while remaining within the intended scope of the disclosure.
(57) With respect to the above description then, it is to be realized that the optimum dimensional relationships for the parts of the disclosed embodiments and implementations, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art in light of the foregoing disclosure, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present disclosure.
(58) Therefore, the foregoing is considered as illustrative only of the principles of the disclosure. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the disclosed subject matter to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to that fall within the scope of the claims.