GB2531274A - A co-operative lock system designed to create a greater deterrent than stand-alone locking devices - Google Patents

A co-operative lock system designed to create a greater deterrent than stand-alone locking devices Download PDF

Info

Publication number
GB2531274A
GB2531274A GB1418139.0A GB201418139A GB2531274A GB 2531274 A GB2531274 A GB 2531274A GB 201418139 A GB201418139 A GB 201418139A GB 2531274 A GB2531274 A GB 2531274A
Authority
GB
United Kingdom
Prior art keywords
lock
alarm
locks
signal
tone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1418139.0A
Other versions
GB201418139D0 (en
GB2531274B (en
Inventor
James Mcquillan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1418139.0A priority Critical patent/GB2531274B/en
Publication of GB201418139D0 publication Critical patent/GB201418139D0/en
Priority to EP15794605.4A priority patent/EP3207536B1/en
Priority to PCT/GB2015/000281 priority patent/WO2016059359A1/en
Publication of GB2531274A publication Critical patent/GB2531274A/en
Application granted granted Critical
Publication of GB2531274B publication Critical patent/GB2531274B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B17/00Fire alarms; Alarms responsive to explosion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/12Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/06Mechanical actuation by tampering with fastening

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Health & Medical Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A lock with sensors that detect when an attempt is made to force the lock and trigger an alarm having a transmitter and receiver system within the lock which transmits the signal to equivalent nearby locks. When this signal is received by the adjacent lock, the alarm on that lock is triggered and transmits a signal to other nearby locks and so on. If the alarm is an audible alarm then the tone of the alarm may increase as the alarm signal is relayed outwards thus allowing people to follow the noise to the original alarm. The alarm signal may also be sent to a mobile phone or tablet or sent to a central security base. A global navigation satellite system (GNSS) or global positioning system (GPS) may be used to record the position of the lock. The lock may have a sensor for detecting other emergency situations e.g. a gas leak. This is then also relayed to adjacent locks. Preferably this cluster lock system is used on yachts on moorings or in a marina.

Description

Cluster Locks and their application to stand-alone, remote or integrated security systems This invention relates to a lock fitted with single or multiple sensors, transmitters and receivers that is able to raise an alarm which is then repeated and sounded by adjacent locks of the same type and located in the same or adjacent groups. The system provides a deterrent by employing locks of the same type to extend an alarm as a deterrent over a wider area without requiring additional supporting infrastructure.
When criminals attack a lock it is usually smashed off and discarded. If it contains an alarm capability the alarm can sound. However, in most circumstances this provides little deterrent -e.g. on a yacht it may be thrown over the side, silencing the location immediately; in any other environment it may be dropped in a bucket of water or smashed completely to silence the alarm.
The cluster lock is an intelligent lock system employing multiple alarmed locks to communicate such an attack event to each other and to provide a wider deterrent than a single physical lock or a simple alarmed lock can offer.
An individual lock is fitted with a sensor to detect an attack and transmits this attack information. Other adjacent locks of the same type fitted with the same devices are able to receive this transmission. When an alarm is transmitted it is detected by adjacent locks of the same type which then transmit their own alarm information as well as sounding an alarm. The alarm sound or tone in the next lock may be varied according to the proximity of the lock to the originating alarm. The communications techniques may be wireless (shock, vibration, acoustic, radio waves or optical) or wired (using electric or optical conductors), according to the application.
The system may also employ additional systems to gather suitable data and a) to retain that data in a secure repository and I or b) to relay suitable information to a third party for possible action using standard communications, web-based systems or modern Android, Apple or other applications ("Apps"). In the case of a system that employs an electronic listening solution at the boundary, the locks in the cluster may be set not to transmit an audible alarm, but to relay the attack data to raise the alarm remotely. This allows responders more time to locate the attacker or threat as well as making the attack more visible, thereby increasing the possibility of an attacker being detected.
The device may be any type of lock used to secure one of a group ol assets. It contains a sensor to detect an attack, either physical or otherwise, and a transmitter and receiver. When it recognises an attack the lock transmits a signal that other locks can detect. When the lock has completed its transmission to other locks it may or may not then transmit a loud acoustic signal that is intended to act as a deterrent to the attacker. The next layer of locks in thc community that arc within range and can detect the transmission now transmit their own information that may he received by other locks further out in thc community. Thcse may or may not then also sound an alarm. In this way the alarm works its way out from the core event to provide a wide area alert of the original attack. lithe locks in the cluster are set for deterrent' and sound the alarm then the resulting noise provides a greater deterrent than a single lock. If they are set to catch' then they offer a wider area over which a potential attacker may he detected and apprehended.
The invention further relates to the detection of this inlormation by another receiver that is able to process the data and to relay this to another system for onwards communication to a nearby office, security station or other facility to support the provision of a response to the event.
This invention further relates to the onward transmission of data using other communications techniques to enable an alarm to be raised remotely from the site of the community.
This may he delivered directly to a phone Une or through a web server, or through an AndroidTM or App1eTMstyle smart-phone application.
Figure 1: Lock Architecture The lock architecture is shown in Figure 1. The lock sensor and sensing circuit are permanently listening for abnormally high levels of activity on the mechanism. The sensing circuit is disarmed when the key is uscd. The key may contain an RFID tag, bar-code or other identifier that can be read by the lock when in close proximity to the key. The sensing circuit may be intelligent, and can be programmed in complex variants to detect attack type for onward transmission. In the simple lock it will merely detect higher amplitude attacks where the key is not used. When an attack is detected this information is passed to the transmitter which uses the techniques for onward transmission built into this particular device. The receiver detects this transmission and, when it is completed, it sounds an alarm or not according to the system settings selected.
Where an attack on this lock is not detected, die receiver may receive notification from an adjacent lock that it has been attacked. hi this case the receiver determines whether the attack was on the immediately adjacent lock, or if this is number two or three or more in the chain from the attacked lock. This deteimines the transmission type and, if selected, the audio tonc is souuded by this alarm using its built-in speaker.
Users may select the pattern and frequency of the alarm audible output to allow them to work together over wider areas to create groups or clusiers of alarms. In this way the users can ensure that there is no confusion over which alarm is the initiating alarm and which are the supporting alarms.
The lock can include a Global Navigation Satellite System (GNSS) receiver to enable the transmitter to report its position. The GNSS receiver may be embedded in one or all of the locks, or the lock system may employ another available location source to feed into the lock system (e.g. the National Marine Electronics Association (NMEA) standard output on a yacht Global Positioning System (GPS) or other GNSS solution-based chart plotter).
An outline of how the cluster system works is shown in Figure 2. A lock is attacked (the initiating alarm) and emits Tone I, as set by the user group. This is detected by the next layer within range, the receiver determines that this is Tone 1 and selects the next tone in the range, Tone 2. This continues out to the limit of tone options in the product pack chosen by the users. In this way. even if the first lock that is attacked is thrown into deep water, the other locks will have detected it and begin sounding their own alarms. Therefore it becomes increasingly difficult to silence or to ignore the alarm set as a waterfall alarm effect is triggered.
Figure 2: Cluster Lock System The use of Tones offers a method of determi fling where the alarm originates. For example, if the tones chosen are ascending through the Tone options (e.g. Tone 1 may be SOOHi. Tone 2 maybe 1kHz and so on) then moving to the lowest audible tone will guide security staff to the source of the alarm.
Where an a'arm has joined the alarming session triggered by the initiating alarm, and then is itself attacked, it will revert to sounding Tone 1. Adjacent alarms that are higher in the order than Tone 2 will carry on transmitting their tone, but those nearest to the new Tone 1 will begin sounding Tone 2 and so on, until the alarm set levels across the two clusters now alarming. This will be the same for any number of clusters within the overall community.
In more sophisticated systems (he alarm maybe propagated by wireless, optical or other means in addition to or instead of the acoustic option in the standard community.
The next claim connects the community to the remote user via a local or wide area network (Figure 3). A monitor listens for alarm activity and, when this is detected, packages that information and relays it to the user group, either over a dedicated local network or across the public wide area network. This includes the use of web servers and modern communications devices such as tablets' aiid smart-phones' to deliver applications to the User. Examples include AndroidTM and AppleTM formats and applications.
Figure 3: Off-Site Alarms A Lock Identity feature may provided in some locks to facilitate identification of the initiating lock. If the initiating identification feature is used in each alarm this allows specific users to be targeted with personal messages to inform them that their lock is under attack.
In order to achieve this functionality the lock may contain sonic or all of the following functions although other functions may he added for more complex systems: 1. Lock mechanism 2. Lock Housing 3. Lock Sensor set 4. Sensing Circuit 5. Transmitter 6. Receiver 7. Processing Block 8. Power 9. Identity Block 10. Acoustic sounder The lock is intended to be deployed singly, as part of a community or as a networked locking system. This community might be, for example, on a single yacht or across a row of yachts on moorings.
Finally. the community concept may he applied to other requirements. For example. personal attack alarms, vehicle alarms, building intruder alarms and so on may be connected in the same way. In this case the system may be joined to the end user or lock owner in a number of ways. This includes the network interface to port data into the network for a sing'e or multiple locks and alarms. It also includes the application that is required at the user or lock owner site to receive and display relevant information and this will be in the form of an application (on a smart-phone or tablet) or a web service or a bespoke display.
Claims 1. A lock having sensors that detect when an attempt is made to force the lock, said sensors triggering a first alarm, a transmitter for transmitting a signal to nearby locks such that their alarms are triggered, and a a receiver for receiving a signal 1mm nearby equivalent locks.
2. A lock according to claim 1 in which the alarm is triggered in adjacent locks which in turn (rigger alarms in adjacent equivalent locks that are further away than the original.
3. A lock according to any preceding claim that provides 205 an output signal to relay the alarm status across a network to the lock owner and/or security or other staff.
4. A lock system comprising a lock as defined in claim 3 and a tablet or smart phone apphcation to notify 210 specific thck owners and/or security or other stafi 5. A lock system according to preceding claims that form a cluster of thcks according to claims I and 2 within the larger community of equivalent locks such that when one lock in the cluster is triggered then only 215 locks in that cluster are triggered.
GB1418139.0A 2014-10-14 2014-10-14 An alarmed cluster lock Expired - Fee Related GB2531274B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB1418139.0A GB2531274B (en) 2014-10-14 2014-10-14 An alarmed cluster lock
EP15794605.4A EP3207536B1 (en) 2014-10-14 2015-10-05 Co-operative lock system
PCT/GB2015/000281 WO2016059359A1 (en) 2014-10-14 2015-10-05 Co-operative lock system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1418139.0A GB2531274B (en) 2014-10-14 2014-10-14 An alarmed cluster lock

Publications (3)

Publication Number Publication Date
GB201418139D0 GB201418139D0 (en) 2014-11-26
GB2531274A true GB2531274A (en) 2016-04-20
GB2531274B GB2531274B (en) 2016-10-26

Family

ID=52001369

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1418139.0A Expired - Fee Related GB2531274B (en) 2014-10-14 2014-10-14 An alarmed cluster lock

Country Status (3)

Country Link
EP (1) EP3207536B1 (en)
GB (1) GB2531274B (en)
WO (1) WO2016059359A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11021893B2 (en) 2019-09-24 2021-06-01 Barricaid Technology Group Security system for a building

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19815767A1 (en) * 1998-04-08 1999-10-14 Richard Ross Electromechanical window or door lock with remote signaling
US20060132301A1 (en) * 2003-02-03 2006-06-22 Stilp Louis A Fixed part-portable part communications network for a security network
US20110193678A1 (en) * 2010-02-09 2011-08-11 Brooks Utility Products Group, Inc. Utility meter tamper monitoring system and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014004930A1 (en) * 2012-06-27 2014-01-03 Treefrog Developments, Inc. Tracking and control of personal effects
US9260885B2 (en) * 2012-10-19 2016-02-16 Brian Asquith Theft deterrent lock

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19815767A1 (en) * 1998-04-08 1999-10-14 Richard Ross Electromechanical window or door lock with remote signaling
US20060132301A1 (en) * 2003-02-03 2006-06-22 Stilp Louis A Fixed part-portable part communications network for a security network
US20110193678A1 (en) * 2010-02-09 2011-08-11 Brooks Utility Products Group, Inc. Utility meter tamper monitoring system and method

Also Published As

Publication number Publication date
GB201418139D0 (en) 2014-11-26
WO2016059359A1 (en) 2016-04-21
EP3207536B1 (en) 2018-11-07
EP3207536A1 (en) 2017-08-23
GB2531274B (en) 2016-10-26

Similar Documents

Publication Publication Date Title
AU2018262364A1 (en) Sticker location device and associated methods
US8638253B1 (en) Vibrating radar sensor
US20150195693A1 (en) Earthquake early warning system utilizing a multitude of smart phones
WO2008146206A3 (en) Wireless ultrasound probe asset tracking
KR100783712B1 (en) Detecting the theft system using zigbee
US9449479B2 (en) Security system
EP3065115B1 (en) Digital security system, method and program
JP2010152677A (en) Security system, information processing apparatus and security method
EP3207536B1 (en) Co-operative lock system
US20170053520A1 (en) Alarm unit
JP2007122123A (en) Stray being notification device and program
EP3621045B1 (en) Alarm system and method of operation
KR20120030674A (en) Mobile terminal, server, system, method, and recording medium for crime prevention
JP2007200173A (en) Alarm system and mobile terminal
JPH0698045A (en) Alarm detector
US8717161B1 (en) Lockout for hydrogen sulfide monitoring system
JP2007134881A (en) Portable telephone detection system, device, program and method
JP2011197973A (en) Bluetooth (r) type alarm report device
JP2001307238A (en) System for preventing crime and method for detecting cutting sound
JP5474325B2 (en) Surveillance dummy camera system
CN106204986B (en) A kind of improved intelligence vibrations detecting alarm
JP3104799U (en) Alarm device
JP2011186864A (en) Bluetooth (r) fall detection report apparatus having voice notification function
KR100972105B1 (en) Wireless trigger type wide area warning system
EP3035304A1 (en) A security system for indicating when an article has been compromised

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20231014