AU2012258380A1 - Locking apparatus - Google Patents

Locking apparatus Download PDF

Info

Publication number
AU2012258380A1
AU2012258380A1 AU2012258380A AU2012258380A AU2012258380A1 AU 2012258380 A1 AU2012258380 A1 AU 2012258380A1 AU 2012258380 A AU2012258380 A AU 2012258380A AU 2012258380 A AU2012258380 A AU 2012258380A AU 2012258380 A1 AU2012258380 A1 AU 2012258380A1
Authority
AU
Australia
Prior art keywords
key
alarm
locking device
locking
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2012258380A
Inventor
Rick Manson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2011904987A external-priority patent/AU2011904987A0/en
Application filed by Individual filed Critical Individual
Priority to AU2012258380A priority Critical patent/AU2012258380A1/en
Publication of AU2012258380A1 publication Critical patent/AU2012258380A1/en
Abandoned legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

C 'RPorbl\DCCOSEHM769932_I.DOCX-30111/2011 - 15 A locking apparatus including, a locking device, a key for locking the locking device, a sensor that determines a physical separation between the locking device and the key and an alarm that generates an alert if the locking device is physically separated from the key by more than a determined distance. Fig. IE

Description

AUSTRALIA PATENTS ACT 1990 COMPLETE SPECIFICATION FOR A STANDARD PATENT (ORIGINAL) Name of Applicant: Rick Manson Actual Inventor: Rick Manson Address for Service: DAVIES COLLISON CAVE, Patent & Trade Mark Attorneys, Level 10, 301 Coronation Drive, Milton 4064, Queensland, Australia Invention Title: "Locking apparatus" Details of Associated Provisional Application No: Australian Provisional Patent Application No. 2011904987, filed 30 November 2011 The following statement is a full description of this invention, including the best method of performing it known to us: C\NRPortb1\DCC\SEH\4770046_l.DOC - 26/11/12 C \NRPortbi\DCCSEH\4769932_I.DOCX-30/I1 /I0 LOCKING APPARATUS Background of the Invention [00011 The present invention relates to a locking apparatus, and in particular to an isolation lock for securing equipment and/or an area. Description of the Prior Art [00021 The reference in this specification to any prior publication (or information derived from it), or to any matter which is known, is not, and should not be taken as an acknowledgment or admission or any form of suggestion that the prior publication (or information derived from it) or known matter forms part of the common general knowledge in the field of endeavour to which this specification relates. 100031 In industrial environments, such as mine sites, individuals may be required to carry an "isolation lock", which is used to identify that they are working in a particular area, or on a particular piece of equipment. The locks are designed to be operated by a user, and can be used to physically prevent an action occurring, such as prevent other individuals entering an area or using a piece of equipment. This is typically performed to allow the user to work in an area or on a piece of equipment without risking inadvertent injury caused by the actions of another individual. 100041 For example, when a user is working on a piece of heavy equipment, it is important that another individual does not actuate the equipment, which could cause injury to the user. Accordingly, in this instance, the user uses their isolation lock to isolate the equipment and prevent it being used by other individuals. In this instance, when the user has finished work, they remove their isolation lock allowing the equipment to be used in an intended manner. By providing each individual with their own isolation lock, this allows users to confidently work on equipment, or in a given area, without running the risk of injury. [00051 It will be appreciated from the above that isolation locks can be of any suitable form. Typically however the locks are in the form of a padlock, or other similar locking device, which may optionally include visual indicators, such as a label, including any relevant information, such as a warning not to open the lock, and optionally an indication of the user.
C \NURPortb\DCOSE\4769932 I.DOCX-30/2011 -2 [00061 To ensure that isolation locks operate correctly, it is important that the locks cannot be opened by individuals other than the user, which is typically achieved by ensuing the user is the only individual having a key for the lock. 100071 However, a drawback with this arrangement is that users may leave the area or equipment and forget to remove the isolation lock. In this instance, the user has to be identified and subsequently contacted, allowing the key to be obtained and the lock removed. This is particularly problematic if the isolation lock is being used in a fly in fly out (FIFO) operation, with it being possible that the user is already on a flight away from the site by the time the problem is identified. In such cases, it can take many hours for the key to be returned, which in turn can lead to a significant loss of productivity and hence money. This is particularly problematic on sites with hundreds or thousands of workers which can lead to this problem happening on a daily or weekly basis. Summary of the Present Invention [0008] In a first broad form the present invention seeks to provide a locking apparatus including: a) a locking device; b) a key for locking the locking device; c) a sensor that determines a physical separation between the locking device and the key; and, d) an alarm that generates an alert if the locking device is physically separated from the key by more than a determined distance. [00091 Typically the sensor includes a wireless communications system that transfers signals between the locking device and the key using a wireless connection, wherein the physical separation is determined at least in part using the signals. [00101 Typically the sensor determines the physical separation using at least one of: a) a signal strength; and, b) a signal time of flight. [0011] Typically the wireless communications system includes: C :WRPrtbDCC\SE\4769932_ DOCX-301 1201 1 -3 a) a first transceiver associated with the locking device; and, b) a second transceiver associated with the key. [00121 Typically the apparatus includes at least one electronic processing device coupled to the wireless communications system, and wherein the at least one electronic processing device: a) determines the physical separation in accordance with the signals; b) compares the physical separation to a defined physical separation; and, c) selectively causes an alert to be generated in accordance with the results of the comparison. [00131 Typically the alarm is an audible alarm. [0014] Typically the alarm is at least one of part of and attached to the key. [0015] Typically: a) the locking device includes: i) a power source; ii) a first transceiver; and, iii) a first electronic processing device; and, b) the key includes: i) a power source; ii) a second transceiver; iii) a second electronic processing device; and, iv) the alarm. 100161 Typically the apparatus includes at least one base unit and wherein, in use: a) the sensor that determines a physical separation between the at least one base unit and the key; and, b) the alarm generates an alert if the key is physically separated from the base unit by at least one of: i) more than a determined distance; and, ii) less than a minimum separation.
C:\NRPob\C SEH47692_ I DOCX-30/ 1/2011 -4 10017] Typically the at least one base unit determines a physical separation between the at least one base unit and multiple keys. 100181 Typically the at least one base unit determines whether a key is being removed from a location and wherein the base unit is provided at an entrance/exit to the location. Brief Description of the Drawings [00191 An example of the present invention will now be described with reference to the accompanying drawings, in which: [0020] Figure 1 A is a schematic front view of an example of a locking apparatus in a closed position; [00211 Figure l B is a schematic front view of the locking apparatus of Figure IA in an open position; [00221 Figure 1 C is a schematic underside view of the locking apparatus of Figure 1 A; [0023] Figure 1 D is a schematic diagram of an example of a key for use with the locking apparatus of Figure IA; [0024] Figure 1 E is a schematic diagram of electronic components of the locking apparatus of Figure IA and the key of Figure ID; [00251 Figures 2A and 2B are a flow chart of an example of the operation of the locking apparatus; and, 100261 Figure 3 is a schematic diagram of electronic components of a locking apparatus, key and base unit of a further example locking apparatus. Detailed Description of the Preferred Embodiments 100271 An example of a locking apparatus will now be described with reference to Figures IA to lE. 10028] In this example, the locking apparatus includes a locking device 100 and a key 140 for locking the locking device 100. The locking device 100 can be of any suitable form but typically includes a body 110, a shackle 120 and a keyway 130, for receiving the key 140. The keyway aligns the key 140 with tumblers (not shown) contained in the body 110, such that rotation of the key 140 within the keyway 130 releases the shackle 120, allowing the C:\NPotb\CC EH 769932_ I .DOCX-3/ 11/2011 -5 shackle 120 to be moved into an open position shown in Figure lB. This allows the shackle to be connected to equipment and then returned to the closed position, as shown in Figure 1A. [0029] It will therefore be appreciated that in one example, the locking apparatus is generally similar in form to that of a standard padlock. However, this is not essential and any locking device 100 that can be selectively coupled to equipment and/or used to secure an area, could be used. [00301 In addition, the locking apparatus includes a sensor that determines a physical separation between the locking device 100 and the key 140. The sensor is coupled to an alarm that generates an alert if the locking device is physically separated from the key by more than a pre-set distance. Thus, the sensor acts to determine if the key is within a notional perimeter defined by the pre-set distance, allowing the alarm to be activated if the key is taken outside the perimeter. [00311 The nature of the sensor and alarm will vary depending on the preferred implementation, and a specific example will be described in more detail below. Typically however the sensor is in the form of a communications system that transfers signals between the locking device 100 and the key 140, for example using a wireless connection. For example, this can be achieved using a first transceiver associated with the locking device 100 and a second transceiver associated with the key 140. In this instance, the physical separation of the key 140 and locking device 100 can be determined at least in part using signals transferred between the transceivers. [0032] The alarm may be in the form of an audible alarm, although alternatively visual alarms or physical alerts, such as vibrations, may be provided. Typically the alarm is provided with or as part of the key. For example, this could be physically incorporated into the key or provided on a fob coupled to the key. As the key remains with the user at all times, providing the alarm together with key ensures that the alarm will be activated in the vicinity of the user, meaning the user will be alerted to the fact that they have left the lock. [00331 However, additionally and/or alternatively, the alarm may be provided with the lock and/or at a remote location, such as a mine monitoring control centre. In this latter example, C:NRPonb1\DCC\SEH\4769932_1 DOCX-30/11/2011 -6 the key 140 and/or locking device 100 can be arranged to communicate with a computer system in the control centre, for example via a suitable wireless connection, such as mobile phone network or the like. The control centre can then contact the user alerting them to the fact that the lock has been left. [00341 In any event, in use, a user can use the locking apparatus to isolate equipment and/or an area. The user then retains the key, so that if the user walks or drives more than a certain distance, such as 300m from the locking device 100, an alert is generated. Accordingly, in the case of a miner driving off to go home and leaving their lock on the equipment, an alert would be generated reminding the miner they have forgotten to remove the lock, allowing them to return and remove the lock as required. 100351 An example of the sensor and alarm will now be described in more detail with reference to Figure IE. 100361 In this example, the locking device 110 includes a power source 111, a first transceiver 112 and a first electronic processing device 113, whilst the key 140 includes a power source 141, a second transceiver 142, a second electronic processing device 143 and an alarm 144. An optional input 145 may also be provided for controlling the alarm 145, for example to deactivate the alarm 145 once activated. [0037] In use, the electronic processing devices 113, 143 are capable of operating the first and second transceivers 112, 142, allowing signals to be transferred between the key 140 and locking device 100. In use at least one of the electronic processing devices determine a physical separation in accordance with the signals, compare the physical separation to a defined physical separation, such as a set distance threshold, and selectively causes an alert to be generated in accordance with the results of the comparison. 100381 In particular, the second electronic processing device 143 periodically uses signals transferred between the first and second transceivers to establish an approximate distance between the locking device 100 and key 140. The second electronic processing device 143 can then compare the distance against a pre-configured threshold, stored for example in a memory (not shown) or configured as part of implementing instructions, or the like. If the C \NRPortbl\DCC\SEH\4769932 L.DOCX-30/ t/201 i -7 measured distance is greater than the threshold then the second electronic processing device 143 would activate the alarm 144. Otherwise the process can continue as required. [0039] If the alarm is activated, the input 145 can be used to suppress the alarm for a set time, allowing the user to return to the locking device 100 without the alarm sounding continuously. [0040] Accordingly, the processing devices 113, 143 can be any form of electronic processing device such as a microprocessor, microchip processor, logic gate configuration, firmware optionally associated with implementing logic such as an FPGA (Field Programmable Gate Array), or any other electronic device, system or arrangement. Similarly, the first and second transceivers can be any form of transceiver that is capable of transmitting and receiving signals. [0041] It will be appreciated that the sensor, and in particular the transceivers, could be implemented in any one of the number of forms. Examples include ultrasonic, GPS, light/laser, etc. However, as the locking apparatus needs to be used in wide variety of environments, for example where line-of-sight is unavailable, or where there are other forms of physical interference, such as dust and the like, this means technologies of this form are generally unsuitable. Accordingly, the transceivers are typically radio frequency (RF) transceivers. 10042] Traditionally when performing ranging using RF communication, this is based on RSSI (Received Signal Strength Indication). Thus, the separation distance is calculated based on the RF signal strength between the transceivers. A problem with this approach however is that RSSI is impacted by many more factors than just distance. For example, this can depend on antenna orientation, reflections, intervening objects and the like. This if the apparatus is configured to activate the alarm at an RSSI level that represented 200m in line of sight conditions, this same (low) RSSI level may be reproduced at a distance of 5m if there is a barrier between the two devices (such as a metal cab, or a wall). Consequently, if RSSI is used, a false trigger may arise when a driver is sitting in the metal cab of a truck, even if the locking device 100 is only a short distance from the key 140.
C \NPortnblDCCSEH4769932_LDOCX-30/11/2011 -8 [0043] Despite this, RSSI can still be used as long as a sufficiently long range is used, such as 1 km. As a result, the likelihood of false triggers at short distance is reduced, whilst the alarm will still be activated before the user has had chance to depart too far from the lock. It will also be appreciated that this can be accounted for by having a number of different pre-set trigger distances that could be selected from based on the environment in which the system is to be used. In this instance, the user could use the input 145 allowing the pre-set distance to be adjusted as required. [00441 However, alternatively, the separation of the locking device 100 and key 140 can be based on signal ToF (Time of Flight). In this example, a data packet is typically transferred between the locking device 100 and key 140 and then back again, with the time taken for the data packet to be transferred being used to calculate a separation. [00451 As RF signals in free space travel at the speed of light, it is difficult to calculate the separation at close range. However, recent advances have led to ToF being practical for close range low power applications and would be suitable for this system. [0046] It will also be appreciated that a combination of RSSI and ToF could be used. In this instance, a distance could be determined using each of RSSI and ToF and the results compared. This can be used to discount measurements that appear spurious, further reducing the chance of false positives. [0047] Irrespective of whether RSSI or ToF is used, a lost signal (as opposed to a separation distance greater than threshold) can also be used to activate the alarm. This will prevent the alarm failing to activate in the event that a signal is lost, or for example in the event that the power source in the locking device 100 drains. [0048] A further technique that can be used to prevent false activation of the alarm is to average distance measurements over time. In this regard, there is no need for the alarm to be activated immediately upon the separation distance increasing above the pre-set distance threshold. Accordingly, the electronic processing devices 113, 143 may be required to average the distance over a time period of 30 seconds, with the alarm only being activated if the average over the time period is above the threshold distance. This helps protect against C WRPonb\DCC\SEH\4769932_ I DOCX-3011 ino i -9 glitches in the distance calculation or short term signal loss, thereby further helping to reduce false alarm activation. [00491 It will also be appreciated that the locking device 100 and key 140 are associated in some manner, to prevent an alarm being activated due to signals being received from a different lock. To achieve this, the locking device 100 and key 140 typically include unique identifiers that are exchanged to ensure that the correct locking device 100 and key 140 are communicating. It will be appreciated that such identifiers or an association between a particular locking device 100 and key 140 could be programmed, for example using an external computer system or the like, or alternatively could hard coded during manufacture. 10050] Accordingly, it will be appreciated that the above features can help allow the device to be capable of activating the alarm in a wide variety of environments, and in particular, can avoid false activation, or failing to activate (as either it will be a nuisance, or fail to work, or both). 100511 To ensure the arrangement is physically small enough to carry and has sufficient battery life, it is useful if power consumption can be minimised. To achieve this, the key 140 and locking device 100 can be adapted to wake from an ultra-low power state, calculate the distance between devices, compare to threshold and activate the alarm if required, before returning to a quiescent state. 100521 For example, the devices could sleep for 15 seconds, wake for a window of perhaps I Oms, then sleep again, so that for the majority of time, the devices are in an ultra-low power mode. To further enhance battery life, power scavenging (such as solar, kinetic, and the like) thereby allowing batteries to be partially recharged from energy in the ambient environment. [00531 It will also be appreciated that the arrangement will typically include a mechanism for deactivating the alarm system when the locking device is not being used, thereby further reducing power consumption. Additionally, and/or alternatively, the locking device 100 can include a sensor for detecting whether the locking device 100 is in locked or unlocked state. In this example, if the lock is in an unlocked state, the first and second electronic processing devices 113, 143 can cooperate to prevent the alarm being activated on the basis that the lock can be removed from any equipment or area to which it is attached, thereby obviating the C:NRPorb\DCCSEH4769932_ I. DOCX-3011/201 I - 10 need for an alarm. However this is not essential, and alternatively the alarm can be activated regardless. [0054] An example of the interaction of the locking device 100 and key 140 will now be described in further detail with reference to Figures 2A and 2B. 100551 In this example, at step 200 the first and second electronic processing devices 113, 143 wake from a low power state based on signals from respective timers. At step 210, the second electronic processing device generates a data packet, which is transmitted to the first processing device 113 at step 220, using the transceivers 112, 142. [0056] At step 230 the first electronic processing device 113 confirms the data packet is from the associated key 140 by checking the identifier of the key 140, which is typically encoded within the data packet. Alternatively the key 140 and locking device 100 may exchange identifiers before transfer of the data packet, as will be appreciated by persons skilled in the art. [0057] Assuming the association is correct, the first electronic processing device 113 returns the data packet to the key 140 at step 250, allowing the second electronic processing device 143 to determine the time of flight of the data packet, and hence the physical separation of the locking device 100 and the key 140 at step 260. At step 270 the second electronic processing device 143 determines an average separation over a predetermined time period or number of previous readings. The second electronic processing device 143 compares the average separation to a stored threshold at step 280. [00581 If it is determined that the threshold is exceeded at step 290, the second electronic processing device 143 activates the alarm 144 at step 300, alerting the user that the key and lock are separated. The alarm remains active unless the deactivated at step 310, for example by pressing the input button 145. [0059] Once the alarm is deactivated, or if the threshold is not exceeded, then at step 320, the timers of the key 140 and locking device 100 are synchronised, with the devices returning to a low power state, allowing the process to return to step 200.
C 10NRPonb\CC\SEH4769932_I.DOCX-3011/ 201 - 11 100601 In a further example, additional techniques can be provided for activating an alarm, depending on criteria other than the distance between the lock and key. For example, a site could include sensors that determine when keys are being removed from a given location, and cause an alarm to be sounded, irrespective of whether the keys are separated from the lock by more than the determined distance. This can be useful for example in preventing an individual inadvertently removing both the lock and key from a site. 100611 This could be achieved in any one of a number of ways depending on the preferred implementation. In one example, a site could be configured with a base unit that operates in a similar manner to the locks, but communicates with a plurality of keys, whilst each key 120 communicates with a respective locking device 100 and the base unit. An example of this will now be described with reference to Figure 3A. [00621 In this example, the base unit 310 includes a power source 311, a base unit transceiver 312 and a base unit electronic processing device 313. In use, the electronic processing devices 313, 143 are capable of operating the base unit and second transceivers 312, 142, allowing signals to be transferred between the key 140 and base unit 310. In use at least one of the electronic processing devices determine a physical separation in accordance with the signals, compare the physical separation to a defined physical separation, such as a set distance threshold, and selectively causes an alert to be generated in accordance with the results of the comparison. Thus, it will be appreciated that the base unit 310 functions in a manner similar to the locking devices 100, but is adapted to allow the separation of the base unit and a number of different keys 140 to be established, thereby preventing inadvertent removal of the keys from a site. [0063] As an alternatively, a perimeter can be established around a location by providing base units at entrances/exits to the location and then having an alarm activated should an attempt be made to remove the key via the entrance/exit. These could function in a similar manner, for example by proximity detection. In this instance, if the separation between the base unit and the key falls below a predetermined threshold, indicating that the key is passing through an exit/entrance again an alarm could be activated. Again, the alarm could be provided on the key only, however, in an alternative example the alarm may additionally or alternatively be provided in the base unit, so that an alarm sounds as the key is removed from C:4RPortb\DCC\SEHW769932_ IDOCX-30W[ /I2t -12 the site. It will also be appreciated that this could be achieved in a manner similar to the use of security tags and associated sensors in a department store. 100641 Persons skilled in the art will appreciate that numerous variations and modifications will become apparent. All such variations and modifications which become apparent to persons skilled in the art, should be considered to fall within the spirit and scope that the invention broadly appearing before described.
AU2012258380A 2011-11-30 2012-11-26 Locking apparatus Abandoned AU2012258380A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2012258380A AU2012258380A1 (en) 2011-11-30 2012-11-26 Locking apparatus

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AU2011904987 2011-11-30
AU2011904987A AU2011904987A0 (en) 2011-11-30 Locking apparatus
AU2012258380A AU2012258380A1 (en) 2011-11-30 2012-11-26 Locking apparatus

Publications (1)

Publication Number Publication Date
AU2012258380A1 true AU2012258380A1 (en) 2013-06-13

Family

ID=48606946

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2012258380A Abandoned AU2012258380A1 (en) 2011-11-30 2012-11-26 Locking apparatus

Country Status (1)

Country Link
AU (1) AU2012258380A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015153398A1 (en) * 2014-04-02 2015-10-08 Ridge Tool Company Electronic tool lock
US11022955B2 (en) 2014-04-02 2021-06-01 Ridge Tool Company Smart tool systems

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015153398A1 (en) * 2014-04-02 2015-10-08 Ridge Tool Company Electronic tool lock
CN106132639A (en) * 2014-04-02 2016-11-16 里奇工具公司 Electronic tool is locked
CN106132639B (en) * 2014-04-02 2019-09-06 里奇工具公司 Electronic tool lock
US10437228B2 (en) 2014-04-02 2019-10-08 Ridge Tool Company Electronic tool unlocking system
US11022955B2 (en) 2014-04-02 2021-06-01 Ridge Tool Company Smart tool systems
US11592801B2 (en) 2014-04-02 2023-02-28 Ridge Tool Company Systems for monitoring aspects of tool use

Similar Documents

Publication Publication Date Title
US10896595B2 (en) Temporary security bypass method and apparatus
US10163319B2 (en) Security system tracking of remote items using reduced power
US9311586B2 (en) Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology
US9536416B2 (en) Reminder apparatus and method for items left in a vehicle
US7046147B2 (en) Integrated security system and method
US20150379795A1 (en) Active Detection Type Radio Frequency Identification Smart Door Lock Controller
JP7211634B2 (en) Systems and methods for supervising people
CN103886698B (en) Portable anti-theft device and related anti-theft system and anti-theft method
CN101673425B (en) State real-time monitoring system aiming at carrier device
CN202143208U (en) Device for monitoring and local positioning
US20090096606A1 (en) Remote obstruction sensing device
CN210617842U (en) Vehicle oil tank anti-theft device
CA2729689C (en) Security system and method for using an lf activated rfid tag
CN203924992U (en) A kind of have a unblank electronic lock of checkout gear of violence
AU2012258380A1 (en) Locking apparatus
US7825800B2 (en) Security system
WO2012078076A2 (en) Alarm signaling method based on monitoring the proximity of transmitting and receiving radio devices
RU2297670C1 (en) Portable guarding system based on wireless radio communication and functioning method of said system
EP3227868B1 (en) Surveillance method and system.
CN101673427B (en) Hand-held acquisition control system for carrier device
CN201616124U (en) Real-time status monitoring device for carrier device
CN201754295U (en) Handheld acquisition controller aiming at carrier device
GB2585666A (en) A secure storage unit and a secure storage arrangement
JP2006316470A (en) Key taking-out prevention system and its method
GB2447049A (en) Signal strength proximity alarm for movable objects with multiple monitored areas

Legal Events

Date Code Title Description
MK4 Application lapsed section 142(2)(d) - no continuation fee paid for the application