GB2358428A - Destructible key for home delivery container - Google Patents

Destructible key for home delivery container Download PDF

Info

Publication number
GB2358428A
GB2358428A GB0001391A GB0001391A GB2358428A GB 2358428 A GB2358428 A GB 2358428A GB 0001391 A GB0001391 A GB 0001391A GB 0001391 A GB0001391 A GB 0001391A GB 2358428 A GB2358428 A GB 2358428A
Authority
GB
United Kingdom
Prior art keywords
key
lock
key system
security lock
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0001391A
Other versions
GB0001391D0 (en
GB2358428B (en
Inventor
William Alexander Courtney
Richard Leon Klee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0001391A priority Critical patent/GB2358428B/en
Publication of GB0001391D0 publication Critical patent/GB0001391D0/en
Publication of GB2358428A publication Critical patent/GB2358428A/en
Application granted granted Critical
Publication of GB2358428B publication Critical patent/GB2358428B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • A47G2029/144Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle being transportable and attachable to a building
    • AHUMAN NECESSITIES
    • A47FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
    • A47GHOUSEHOLD OR TABLE EQUIPMENT
    • A47G29/00Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00 
    • A47G29/14Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
    • A47G29/141Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
    • A47G2029/147Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle comprising heating or cooling means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Food Science & Technology (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A key 1 for opening a secure container adapted to receive home deliveries comprises a flat piece of cardboard or plastic carrying a code, in the form of punched holes 2-7, to open the container lock and information on the deliverer. Insertion of the key 1 into the lock releases the lock and also detaches and retains part of the key 1 to provide a record of receipt of the goods and also to prevent the key 1 from being reused. Insertion of the key 1 can also trigger the sending of a message to the owner of the container to indicate that goods have been deposited. The key 1 can also activate a refrigeration unit within the container. A communication link to the container allows the opening codes for the container to be changed remotely and also allows reminder messages to be sent to deliverers if goods have not be delivered by a certain deadline. Secondary security means, such as finger print, retina blood vessel, voice pattern recognition system can also be provided in addition to inserting a valid key 1.

Description

2358428 Security Lock And Key
Technical Field
This invention relates to improvements in devices used as security locks, for controlling access to secure volumes of space. by means of secure doors, lids, security barriers or other physical means of blocking entry to unauthorised personnel.
According to the present invention, there is provided a security lock and key system, characterised by the action of releasing the locking mechanism also damaging the key which is currently inserted into the lock, so that the key cannot be used to release the lock a second time.
Brief description of the drawings
Figure 1 shows a representation of a key, according to the invention. Figure 2 shows a representation of a key, according to the invention, which has been cut into two parts, 1 and 2.
Background to the invention
An expansion in goods delivery services to homes and small business premises, allied to an increase in electronic commerce., is occurring as a result of widespread, low cost, public access to the intemet and television shopping channels. This new type of trading is creating a cost competitive and highly convenient, alternative to conventional retail trading. However, according to the existing state of home and small premises cklivery technology, a problem occurs in matching a goods delivery time which suits the customer with a delivery time which can be achieved by the delivery service provider (DSP) at a reasonable price. A solution to this problem could be achieved, by homes and other premises having secure delivery areas where goods could be left safely, while the homelpremises occupier was absent. This solution would necessitate the DSP having a privileged status, fo r example by being allowed to own or use a mechanical or electronic key, to gain access to the secure area. Such methods of attempting to overcome the delivery in absentia problem have been the subject of some public discussion, but using current technology, the privileged access proposal is unsatisfactory for several reasons.
1. The DSP would need access to a unique key, to fit each of its customers locks. The problem is further exacerbated by, the wide range of types of locks currently on the market. requiring the DSP to hold copies of a range of different types of keys.
2. The multiple t) ype of key problem could be simplified, if one lock manufacturer had a monopoly in the market or all lock manufacturers agreed to use a standard design of lock. These scenarios are not commercially acceptable because they would keep the price of security locks high and reduce the customers choice of lock design.
3. Many occupiers would be reluctant to provide DSPs with keys, which allowed unhindered access to part of their property.
4. DSPs are commonly reluctant to make home deliveries, unless they, can obtain a signature or some ottl,[r of evidence, that they have made a home delivery.
The present invention proposes to minimise the problems caused by the current state of the home delivery, ir allowing DSPs to use a standardised type of low cost lock key which has the following properties:
1 1 The template key, which must be modified by adding a code to operate in conjunction with a given lock, S very simple but versatile design, allowing it to be used with a wide range of mechanical, optiegl od recognition and electronic lock designs.
2. The dimensions of that part of the coded template keys which are inserted into corresponding locks, c standard shape and size, agreed by lock manufactures and relevant members of the goods distribution clia L1 3. The template keys are converted into keys specific to the customers' lock, using information released h the customer.
4. According to the invention, the key can only be used once, because the physical action required to s if and release the locking bolt, after inserting the key, simultaneously destroys the key.
5. The stub of the disabled key, which can be removed from the lock after use, is franked, punctured or etrb 1 with a number or symbols, particular to the lock, providing evidence that the key has been inserted i it)I the customers lock, and that the lock has been released.
Disclosure of the invention
Figure 1 shows a representation of a key, according to the invention. The key, 1 takes the form of a laminilt j di from cardboard, plastic or other suitable material. The construction material is sufficiently workable that it Q b cut by hand, using a simple guillotine, blade or saw and can be punctured using a hand operated holep cb However, the lamina is also sufficiently robust and stiff that it can be used to interact with the movement a.' nil mechanical tumblers inside the lock, to allow the lock to be released. The dimensions of that part of the key v cl is inserted into the key hole will be of a standard size and shape, agreed between lock makers, but the dim n on!,0 of the part of the key external to the key hole are not critical. The agreed dimensions are preferably, 1 no essentially, such that details of the delivery address, bar codes for product tracking and other information of E u the customer, DSP or others in the distribution chain can be added.
By way of an example, which should not in any way be seen as limiting the scope of the invention, the lo: A M( key system could be used as follows: A customer wishing to order goods from a retailer selling goods vi a ai Internet web site provides the retailer with details of the goods which they wish to purchase, gives a d -,1 iei address etc., as for a normal electronic retail transaction, but in addition, provides the retailer with a lock e (as( code number, which allows a key template to be coded, by the retailer or the DPS, to operate in conjunctio: n witl the customers lockIn the example depicted in Figure 1, the customer's lock release code number is given s [ IY and the coding of the template required to release the lock, takes the form of four circular holes punched i th( template. These are labelled items 2, 3, 4, and 5 in Figure 1. It can be seen from Figure 1, that the holes. V( positions on the card which correspond to digits 1126 in the columns headed "Customer delivery code". 11 i no essential for the holes to be circular. but their shape, size tolerance and position on the template key must 1 e ii, 1 a 1 1 accordance with a universal standard, which it is anticipated will be agreed by lock makers and also by manufacturers of equipment for punching the code holes into template keys.
At the customers premises, the customer will have added a security lock to their secure delivery area. The delivery person gains privileged access to the secure area by inserting the coded key into the lock. The lock is designed in such a manner, that it can only be released while the key is stationary within the body of the lock. The operation of the bolt release lever or handle, which allows the door to be opened. also operates a guillotine or other cutting device, which cuts off the coded end of the key, and retains it inside the body of the lock. Furthermore, the movement of the release lever or handle also marks or punctures the removable stub of the key. The pattern of puncture marks is a characteristic of the customers lock, and is used as a replacement for the customers signature, which is normally cited as evidence of delivery.
Figure 2 shows a key which has been cut into two parts, 1 and 2, after being inserted into a matching lock. Part 1 is the coded part of the key, which is retained inside the lock. Part 2 is the stub which is retained by the delivery person, as evidence of delivery. In this example, the lock signature code for the delivery is 2457. The signature code in this example takes the form of a number of punctured holes which are placed and have a position, shape and size tolerance according to the agreed universal standard. The pattern of the punched holes which represent the lock signature are for evidence only, and do not need to be mathematically related in any way with the customer delivery code. The DSP has the choice of a number of methods of retaining evidence of delivery. They may for example, choose to retain the key stub., use an optical scanning system to record the signature code or make a written note of the signature code.
The core invention consists of template keys which are easily coded to fit specific locks and corresponding locks which also destroy the keys, by severing or otherwise damaging them, during the act of releasing the lock. An improvement on the core invention, is the addition of lock signature codes to the external stubs of the disabled keys. It is the intention of the inventors, that the lock and key system described herein should form the basis of an open access technology, which different lock manufacturers, with the agreement of the inventors, can incorporate into a wide range of different designs of security systems, to meet diflerent customer demands. A valid key, according to the invention, could be considered as one which holds the essential information to release a lock in the form of a two dimensional matrix of binary digits- Each of the columns numbered 0 to 9 under the heading "Customer delivery code",. as depicted in Figure 1, can be considered as a column of binary digits, with, for example, an unbroken row within the column being recognised as a zero and a punctured hole within a row being recognised as a one. (Or vice versa.) The binary code can be read by any system which is capable of detecting the difference between an unbroken area and a hole. For example, the reading system could take the form of (a) mechanical pin tumblers, similar to those in known cylinder locks, (b) a battery of corresponding photo diodes and photo cells, linked to an appropriate signal analysis circuit. (c) a battm of electrical continuity test circuits. Those skilled in the arts of lock design will be capable of making a wide range of different types of locks which combine the current invention with different types of binary signal reading systems.
It is to be understood that the use of holes punched in template keys are only one example of hew c(xled information may be added to keys according to the invention. The methods of coding are extended t) wdrig systems in general, including the use of any modification to the geometrical shape of the key, bar codes, I e. m les invisible to the unaided eve, micro dots, codes stored as chemical or biological information includiii DWA information, handwriting/signature recognition systems, finger print or other individual human distingi ishing pattern systems, magnetised strips, embedded microchips and holograms.
The nature of the secure area is not limited by the invention. For example, this could be a porch or ii -hoase attached to a main building, a large. strong, weatherproof box with a locked access door or a portable):)x on wheels, which is anchored to a substantial object. to prevent its removable by unauthorised personnel.
The following improvements are claimed as optional modifications to the core invention, to satisA, d freri m customer requirements i) Locks according to the core invention. which also include an additional bolt release mechanisi ill Ii ch over-rides the key destroying mechanism. allowing some privileged key holders, for exam] he householder. to gain access to the secure area, without their key being disabled- ii) Locks according to the core invention, which also include a small secure storage volume, inside h. m dn body of the lock. which allow the retained parts of disabled keys to be stacked in insertion)i Jer, to indicate the order in which keys were inserted.
iii) Locks which are released by keys according to the core invention, with the keys storing the loc c i -A se code in a single, one dimensional row of digits.
iv) Locks and corresponding keys, according to the core invention., which allow a key to be progran lied to trigger secondary actions, for example switching on a refrigeration unit inside the secure storag:,i( Aune or to temporarily disable the bolt release mechanism, so that the insertion of valid keys thereafto am tot release the bolt, until the lock has been reset by the householder. For example, the items labelle anj 7 in Figu re 1 are holes punched i n the coded part of the key, which programme the key to instli a lo, pc controlled systems, which carry out both of these operations.
v) Mechanical cylinder locks according to the core invention, which include two sets of tumblers, it e f rst of which disengage the cylinder in response to zeros and the second of which, disengage the e-y i r in response to ones, with reference to the binary logic described above. 1 vi) Locks according to the core invention, which can be reprogrammed by the end user. to alter the a] d 1(ck release code number.
vii) Locks according to the core invention, which can be reprogrammed by the end user, to alter the a L Wk signature code.
viii) Locks according to the core invention, which can be programmed by the end user, so that th(3 o lly unlock once and thereafter. have to be re-set before responding to the insertion of a valid key.
- sI-- ix) Locks according to the core invention, which can be released by a plurality of different lock release code numbers, but with each code being valid for a single use only, until the lock has been reset by an authorised person.
X) Locks according to the core invention., which include solenoids with moveable cores. relays or other forms of electromagnetically operated bolts.
xi) Locks according to the core invention, which are remotely linked to computers or other information processing systems by information carrying cables, electromagnetic wave or acoustic wave based information carriers.
xii) Locks according to the c2re invention, which are remotely linked to computers or other information processing systems by IrDA 0 infra red communication systems.
xiii) Locks according to the core invention, which are remotely linked to computers or other information ( ttn-.%) processing systems by Bluetooth 0 radio wave communication systems.
xiv) Locks according to the core invention, which are remotely linked to computers or other information processing systems, which randonily or sequentially assign new lock release code numbers and/or lock signature code numbers to successive commercial transactions, which involve the delivery of goods to the locked security area.
xv) Locks according to the core invention, which are remotely linked to computers or other information processing systems which allow the premises occupier or other privileged persons to remotely gain information via telephone communication systems, relating to the deliveries that have been made during their absence.
xvi) Locks according to the core invention, which are remotely linked to computers or other information processing systems which can be programmed to transmit electronic mail "delivery reminder" messages to the delivery service provider, or other parties involved in the delivery chain, if a coded key, related to an agreed delivery, has not been inserted into the lock, by an agreed delivery deadline.
xvii) Locks according to the core invention. which are remotely linked to audio and/or visual systems which can be programmed to transmit an audio and/or visual message announcing a delivery which has recently been made. For example. a television set may used as part of a home delivery system, to deliver a sub title message such as, "Your pizza has just arrived. " xviii) Locks according to the core invention, which are remotely linked to security information recording and storage systems such as video cameras, finger print, retinal blood vessel, body heat pattern, voice pattern or walking gait recognition systems etc.. which only release the lock after the necessary personal information has been provided by- the delivery person. in addition to inserting a valid key. Using such sophisticated security systems as secondary systems. to back up the present invention, rather than as a replacement has at least two advantages: The secondary systems provide evidence of who has visited a premises and are used to discourage thieves from breaking into a secure area, rather than to limit access to known persons. This means that the lock release system is not limited in any way, to a pool of known home delivery personnel, It also allows the option of the secondary system being over-ridden, in case of secondary system failure. Privileged persons. for example the premises occupier, could of course, be allowed access. using the secondary systems alone. without recourse to the use of a physical key.

Claims (20)

-6 Security Lock And Key Claims
1. A security lock and key system, characterised by the action of releasing the locking mechanism al& 1 m, iging the key which is currently inserted into the lock, so that the key cannot be used to release the lo(k s(cond timd.
2. A security lock and key system. according to the first clain with the disabling damage to the ke in g the separation of the whole or part of that portion of the key which is inserted into the key hole, from h 1 pul Of the key which remains external to the key hole.
3_ A security lock and key system, according to the first or second claim. . which also includes a sin 1 s Wure storage volume, inside the main body of the lock, which allows the retained parts of disabled keys [c t st cked in insertion order, to indicate the order in which keys were inserted.
4. A security lock and key system, according to any of the above claims which also includes an additi na. bolt release mechanism, which overrides the key destroying mechanism, allowing privileged key holders re lease the lock without their key being disabled.
5. A security lock and key system. according to any of the above claims, with the keys storing the 1 re lease code in a single, one dimensional row of digits.
6. A security lock and key system, according to any of the above claims, which allow a key to be prolr A to trigger secondary actions, for example switching on a refrigeration unit inside the secure storage Yph e or to temporarily disable the bolt release mechanism. so that the insertion of valid keys thereafter, cannot ra c the bolt, until the lock has been reset by the householder.
7. A security lock and key system. according to anY of the above claims, with the lock being of a mechla cal type and including two sets of tumblers.
8. A security lock and key system, according to any of the above claims., which can be reprogrammed b th( end user, to alter the valid lock release code number.
9, A security lock and key systein, according to any of the above claims, which can be reprogrammed b., th end user. to alter the valid lock release code number.
10. A secunt lock and key system. according to any of the abo,,c claims, which can be programmed b th( end user, so that insertion of keys only allows the lock to be released once, and thereafter. has to be 1 t b -. fore responding to the insertion of a valid key.
---7 -
11. A security lock and key system, according to any of the above claims, which can be released by a plurality of different lock release code nwnbers. but with each code being valid for a single use only, until the lock has been reset by an authorised person.
12. A security lock and key system, according to any of the above claims, which includes solenoids with moveable cores. relays or other forms of electromagnetically operated bolts.
13. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, by information carrying cables, electromagnetic wave or acoustic wave based information carriers.
14. A security lock and key system, according to any of the above claims, which is remotely linked to computers or tfkrm, other information processing systems, by IrDAO infra red communication systems.
15. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, by Bluetooth radio wave communication systems.
16. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, which randomly or sequentially assign new lock release code numbers and/or lock signature code numbers to successive commercial transactions. which involve the delivery of goods to the locked security area.
17. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, which allow the premises occupier or other privileged persons to remotely gain information, via telephone communication systems, relating to the deliveries that have been made during their absence.
18. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems. which can be programmed to transmit electronic mail "delivery reminder" messages to the delivery service provider. or other parties involved in the delivery chain, if a coded key, related to an agreed delivery. has not been inserted into the lock, by an agreed delivery deadline.
19. A security lock and key system. according to an of the above claims, which is remotely linked to audio and/or visual systems which can be programmed to transmit an audio and/or visual message, announcing a delivery which has recentiv been made
20. A security lock and key system. according to an of the aboNc claims, which is remotely linked to security information recording and storage systems. such as N ideo ameras. finger print. retinal blood vessel, body heat pattern, voice pattern or walking gait recognition s) stems etc. "hich only release the lock after the necessary personal information has been provided by the deliven person. in adkhtjon to inserting a valid key.
GB0001391A 2000-01-22 2000-01-22 Security lock and key Expired - Fee Related GB2358428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0001391A GB2358428B (en) 2000-01-22 2000-01-22 Security lock and key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0001391A GB2358428B (en) 2000-01-22 2000-01-22 Security lock and key

Publications (3)

Publication Number Publication Date
GB0001391D0 GB0001391D0 (en) 2000-03-08
GB2358428A true GB2358428A (en) 2001-07-25
GB2358428B GB2358428B (en) 2003-05-07

Family

ID=9884092

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0001391A Expired - Fee Related GB2358428B (en) 2000-01-22 2000-01-22 Security lock and key

Country Status (1)

Country Link
GB (1) GB2358428B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2394509A (en) * 2002-10-25 2004-04-28 James Welland Secure delivery box
WO2007089749A2 (en) * 2006-01-27 2007-08-09 Ferrellgas, L.P. Consumer product dispensing system
US8358199B2 (en) 2006-11-16 2013-01-22 Andrew Edward Nesling Delivery container

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021103A (en) * 2019-04-09 2019-07-16 上海上实龙创智慧能源科技股份有限公司 A kind of visitor guiding system and method based on recognition of face detection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1090362A (en) * 1964-10-26 1967-11-08 Security Systems Inc Improvements in or relating to security systems
US3927543A (en) * 1974-01-28 1975-12-23 Gl Directzia Kbumkp Pri Sgns Desintegrating key
DE2506673A1 (en) * 1975-02-17 1976-08-26 Kerapid Elektronik Ticket operated automatic turnstile - Decodes, cuts and stores entry tickets and has checking and counting facilities
GB1474667A (en) * 1974-05-09 1977-05-25 Information Identification Co Access control assembly
DE29807184U1 (en) * 1998-04-21 1998-08-13 Müller, Wolfgang T., 78315 Radolfzell Electronic service box

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1090362A (en) * 1964-10-26 1967-11-08 Security Systems Inc Improvements in or relating to security systems
US3927543A (en) * 1974-01-28 1975-12-23 Gl Directzia Kbumkp Pri Sgns Desintegrating key
GB1474667A (en) * 1974-05-09 1977-05-25 Information Identification Co Access control assembly
DE2506673A1 (en) * 1975-02-17 1976-08-26 Kerapid Elektronik Ticket operated automatic turnstile - Decodes, cuts and stores entry tickets and has checking and counting facilities
DE29807184U1 (en) * 1998-04-21 1998-08-13 Müller, Wolfgang T., 78315 Radolfzell Electronic service box

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2394509A (en) * 2002-10-25 2004-04-28 James Welland Secure delivery box
WO2007089749A2 (en) * 2006-01-27 2007-08-09 Ferrellgas, L.P. Consumer product dispensing system
WO2007089749A3 (en) * 2006-01-27 2007-12-21 Ferrellgas L P Consumer product dispensing system
US8358199B2 (en) 2006-11-16 2013-01-22 Andrew Edward Nesling Delivery container

Also Published As

Publication number Publication date
GB0001391D0 (en) 2000-03-08
GB2358428B (en) 2003-05-07

Similar Documents

Publication Publication Date Title
US20070296545A1 (en) System for management of ubiquitously deployed intelligent locks
US8511118B2 (en) High security, dual-mode padlock construction
US7249705B2 (en) Theft preventative mailbox having remote unlocking activation mechanism
US8261583B2 (en) High security, dual-mode padlock construction
US7562545B2 (en) Padlock with fully integrated dual locking systems
US7236085B1 (en) Lock with remotely activated lockout feature
CA2811317C (en) Systems and methods for accessing or managing secured storage space
US5164718A (en) Separate lock and unlock codes for a security box
GB2371833A (en) An electromechanical valve assembly for an i.c. engine
WO2001052199A3 (en) Method for depositing goods in at least one locker
PT1237445E (en) Secure delivery or collection system
CA2337906A1 (en) Secure home delivery method
EP1211971B1 (en) Secure article delivery apparatus and method
US4644104A (en) Security system including a plurality of centrally programmable locking assemblies
US20170053144A1 (en) Device and method for checking the integrity of physical objects
GB2358428A (en) Destructible key for home delivery container
EP1138232A2 (en) Remote access device and system
EP0104072B1 (en) Key security store
US20170284126A1 (en) Enhanced double cylinder lock and with actuation detection
CN201163485Y (en) Apparatus for recognizing opening state of container
EP1152376A2 (en) A device for permitting secure delivery and/or collection of goods using one-time access codes
GB2362188A (en) Security system for lockable enclosures
JPH0432463Y2 (en)
CN213838104U (en) Door lock with sound control function
CN107411519A (en) A kind of embedded alienable express delivery containing box and its application method

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20080122