GB2358428A - Destructible key for home delivery container - Google Patents
Destructible key for home delivery container Download PDFInfo
- Publication number
- GB2358428A GB2358428A GB0001391A GB0001391A GB2358428A GB 2358428 A GB2358428 A GB 2358428A GB 0001391 A GB0001391 A GB 0001391A GB 0001391 A GB0001391 A GB 0001391A GB 2358428 A GB2358428 A GB 2358428A
- Authority
- GB
- United Kingdom
- Prior art keywords
- key
- lock
- key system
- security lock
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/141—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/141—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
- A47G2029/144—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle being transportable and attachable to a building
-
- A—HUMAN NECESSITIES
- A47—FURNITURE; DOMESTIC ARTICLES OR APPLIANCES; COFFEE MILLS; SPICE MILLS; SUCTION CLEANERS IN GENERAL
- A47G—HOUSEHOLD OR TABLE EQUIPMENT
- A47G29/00—Supports, holders, or containers for household use, not provided for in groups A47G1/00-A47G27/00 or A47G33/00
- A47G29/14—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels
- A47G29/141—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means
- A47G2029/147—Deposit receptacles for food, e.g. breakfast, milk, or large parcels; Similar receptacles for food or large parcels with appliances for preventing unauthorised removal of the deposited articles, i.e. food or large parcels comprising electronically controlled locking means the receptacle comprising heating or cooling means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00841—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Food Science & Technology (AREA)
- Lock And Its Accessories (AREA)
Abstract
A key 1 for opening a secure container adapted to receive home deliveries comprises a flat piece of cardboard or plastic carrying a code, in the form of punched holes 2-7, to open the container lock and information on the deliverer. Insertion of the key 1 into the lock releases the lock and also detaches and retains part of the key 1 to provide a record of receipt of the goods and also to prevent the key 1 from being reused. Insertion of the key 1 can also trigger the sending of a message to the owner of the container to indicate that goods have been deposited. The key 1 can also activate a refrigeration unit within the container. A communication link to the container allows the opening codes for the container to be changed remotely and also allows reminder messages to be sent to deliverers if goods have not be delivered by a certain deadline. Secondary security means, such as finger print, retina blood vessel, voice pattern recognition system can also be provided in addition to inserting a valid key 1.
Description
2358428 Security Lock And Key
Technical Field
This invention relates to improvements in devices used as security locks, for controlling access to secure volumes of space. by means of secure doors, lids, security barriers or other physical means of blocking entry to unauthorised personnel.
According to the present invention, there is provided a security lock and key system, characterised by the action of releasing the locking mechanism also damaging the key which is currently inserted into the lock, so that the key cannot be used to release the lock a second time.
Brief description of the drawings
Figure 1 shows a representation of a key, according to the invention. Figure 2 shows a representation of a key, according to the invention, which has been cut into two parts, 1 and 2.
Background to the invention
An expansion in goods delivery services to homes and small business premises, allied to an increase in electronic commerce., is occurring as a result of widespread, low cost, public access to the intemet and television shopping channels. This new type of trading is creating a cost competitive and highly convenient, alternative to conventional retail trading. However, according to the existing state of home and small premises cklivery technology, a problem occurs in matching a goods delivery time which suits the customer with a delivery time which can be achieved by the delivery service provider (DSP) at a reasonable price. A solution to this problem could be achieved, by homes and other premises having secure delivery areas where goods could be left safely, while the homelpremises occupier was absent. This solution would necessitate the DSP having a privileged status, fo r example by being allowed to own or use a mechanical or electronic key, to gain access to the secure area. Such methods of attempting to overcome the delivery in absentia problem have been the subject of some public discussion, but using current technology, the privileged access proposal is unsatisfactory for several reasons.
1. The DSP would need access to a unique key, to fit each of its customers locks. The problem is further exacerbated by, the wide range of types of locks currently on the market. requiring the DSP to hold copies of a range of different types of keys.
2. The multiple t) ype of key problem could be simplified, if one lock manufacturer had a monopoly in the market or all lock manufacturers agreed to use a standard design of lock. These scenarios are not commercially acceptable because they would keep the price of security locks high and reduce the customers choice of lock design.
3. Many occupiers would be reluctant to provide DSPs with keys, which allowed unhindered access to part of their property.
4. DSPs are commonly reluctant to make home deliveries, unless they, can obtain a signature or some ottl,[r of evidence, that they have made a home delivery.
The present invention proposes to minimise the problems caused by the current state of the home delivery, ir allowing DSPs to use a standardised type of low cost lock key which has the following properties:
1 1 The template key, which must be modified by adding a code to operate in conjunction with a given lock, S very simple but versatile design, allowing it to be used with a wide range of mechanical, optiegl od recognition and electronic lock designs.
2. The dimensions of that part of the coded template keys which are inserted into corresponding locks, c standard shape and size, agreed by lock manufactures and relevant members of the goods distribution clia L1 3. The template keys are converted into keys specific to the customers' lock, using information released h the customer.
4. According to the invention, the key can only be used once, because the physical action required to s if and release the locking bolt, after inserting the key, simultaneously destroys the key.
5. The stub of the disabled key, which can be removed from the lock after use, is franked, punctured or etrb 1 with a number or symbols, particular to the lock, providing evidence that the key has been inserted i it)I the customers lock, and that the lock has been released.
Disclosure of the invention
Figure 1 shows a representation of a key, according to the invention. The key, 1 takes the form of a laminilt j di from cardboard, plastic or other suitable material. The construction material is sufficiently workable that it Q b cut by hand, using a simple guillotine, blade or saw and can be punctured using a hand operated holep cb However, the lamina is also sufficiently robust and stiff that it can be used to interact with the movement a.' nil mechanical tumblers inside the lock, to allow the lock to be released. The dimensions of that part of the key v cl is inserted into the key hole will be of a standard size and shape, agreed between lock makers, but the dim n on!,0 of the part of the key external to the key hole are not critical. The agreed dimensions are preferably, 1 no essentially, such that details of the delivery address, bar codes for product tracking and other information of E u the customer, DSP or others in the distribution chain can be added.
By way of an example, which should not in any way be seen as limiting the scope of the invention, the lo: A M( key system could be used as follows: A customer wishing to order goods from a retailer selling goods vi a ai Internet web site provides the retailer with details of the goods which they wish to purchase, gives a d -,1 iei address etc., as for a normal electronic retail transaction, but in addition, provides the retailer with a lock e (as( code number, which allows a key template to be coded, by the retailer or the DPS, to operate in conjunctio: n witl the customers lockIn the example depicted in Figure 1, the customer's lock release code number is given s [ IY and the coding of the template required to release the lock, takes the form of four circular holes punched i th( template. These are labelled items 2, 3, 4, and 5 in Figure 1. It can be seen from Figure 1, that the holes. V( positions on the card which correspond to digits 1126 in the columns headed "Customer delivery code". 11 i no essential for the holes to be circular. but their shape, size tolerance and position on the template key must 1 e ii, 1 a 1 1 accordance with a universal standard, which it is anticipated will be agreed by lock makers and also by manufacturers of equipment for punching the code holes into template keys.
At the customers premises, the customer will have added a security lock to their secure delivery area. The delivery person gains privileged access to the secure area by inserting the coded key into the lock. The lock is designed in such a manner, that it can only be released while the key is stationary within the body of the lock. The operation of the bolt release lever or handle, which allows the door to be opened. also operates a guillotine or other cutting device, which cuts off the coded end of the key, and retains it inside the body of the lock. Furthermore, the movement of the release lever or handle also marks or punctures the removable stub of the key. The pattern of puncture marks is a characteristic of the customers lock, and is used as a replacement for the customers signature, which is normally cited as evidence of delivery.
Figure 2 shows a key which has been cut into two parts, 1 and 2, after being inserted into a matching lock. Part 1 is the coded part of the key, which is retained inside the lock. Part 2 is the stub which is retained by the delivery person, as evidence of delivery. In this example, the lock signature code for the delivery is 2457. The signature code in this example takes the form of a number of punctured holes which are placed and have a position, shape and size tolerance according to the agreed universal standard. The pattern of the punched holes which represent the lock signature are for evidence only, and do not need to be mathematically related in any way with the customer delivery code. The DSP has the choice of a number of methods of retaining evidence of delivery. They may for example, choose to retain the key stub., use an optical scanning system to record the signature code or make a written note of the signature code.
The core invention consists of template keys which are easily coded to fit specific locks and corresponding locks which also destroy the keys, by severing or otherwise damaging them, during the act of releasing the lock. An improvement on the core invention, is the addition of lock signature codes to the external stubs of the disabled keys. It is the intention of the inventors, that the lock and key system described herein should form the basis of an open access technology, which different lock manufacturers, with the agreement of the inventors, can incorporate into a wide range of different designs of security systems, to meet diflerent customer demands. A valid key, according to the invention, could be considered as one which holds the essential information to release a lock in the form of a two dimensional matrix of binary digits- Each of the columns numbered 0 to 9 under the heading "Customer delivery code",. as depicted in Figure 1, can be considered as a column of binary digits, with, for example, an unbroken row within the column being recognised as a zero and a punctured hole within a row being recognised as a one. (Or vice versa.) The binary code can be read by any system which is capable of detecting the difference between an unbroken area and a hole. For example, the reading system could take the form of (a) mechanical pin tumblers, similar to those in known cylinder locks, (b) a battery of corresponding photo diodes and photo cells, linked to an appropriate signal analysis circuit. (c) a battm of electrical continuity test circuits. Those skilled in the arts of lock design will be capable of making a wide range of different types of locks which combine the current invention with different types of binary signal reading systems.
It is to be understood that the use of holes punched in template keys are only one example of hew c(xled information may be added to keys according to the invention. The methods of coding are extended t) wdrig systems in general, including the use of any modification to the geometrical shape of the key, bar codes, I e. m les invisible to the unaided eve, micro dots, codes stored as chemical or biological information includiii DWA information, handwriting/signature recognition systems, finger print or other individual human distingi ishing pattern systems, magnetised strips, embedded microchips and holograms.
The nature of the secure area is not limited by the invention. For example, this could be a porch or ii -hoase attached to a main building, a large. strong, weatherproof box with a locked access door or a portable):)x on wheels, which is anchored to a substantial object. to prevent its removable by unauthorised personnel.
The following improvements are claimed as optional modifications to the core invention, to satisA, d freri m customer requirements i) Locks according to the core invention. which also include an additional bolt release mechanisi ill Ii ch over-rides the key destroying mechanism. allowing some privileged key holders, for exam] he householder. to gain access to the secure area, without their key being disabled- ii) Locks according to the core invention, which also include a small secure storage volume, inside h. m dn body of the lock. which allow the retained parts of disabled keys to be stacked in insertion)i Jer, to indicate the order in which keys were inserted.
iii) Locks which are released by keys according to the core invention, with the keys storing the loc c i -A se code in a single, one dimensional row of digits.
iv) Locks and corresponding keys, according to the core invention., which allow a key to be progran lied to trigger secondary actions, for example switching on a refrigeration unit inside the secure storag:,i( Aune or to temporarily disable the bolt release mechanism, so that the insertion of valid keys thereafto am tot release the bolt, until the lock has been reset by the householder. For example, the items labelle anj 7 in Figu re 1 are holes punched i n the coded part of the key, which programme the key to instli a lo, pc controlled systems, which carry out both of these operations.
v) Mechanical cylinder locks according to the core invention, which include two sets of tumblers, it e f rst of which disengage the cylinder in response to zeros and the second of which, disengage the e-y i r in response to ones, with reference to the binary logic described above. 1 vi) Locks according to the core invention, which can be reprogrammed by the end user. to alter the a] d 1(ck release code number.
vii) Locks according to the core invention, which can be reprogrammed by the end user, to alter the a L Wk signature code.
viii) Locks according to the core invention, which can be programmed by the end user, so that th(3 o lly unlock once and thereafter. have to be re-set before responding to the insertion of a valid key.
- sI-- ix) Locks according to the core invention, which can be released by a plurality of different lock release code numbers, but with each code being valid for a single use only, until the lock has been reset by an authorised person.
X) Locks according to the core invention., which include solenoids with moveable cores. relays or other forms of electromagnetically operated bolts.
xi) Locks according to the core invention, which are remotely linked to computers or other information processing systems by information carrying cables, electromagnetic wave or acoustic wave based information carriers.
xii) Locks according to the c2re invention, which are remotely linked to computers or other information processing systems by IrDA 0 infra red communication systems.
xiii) Locks according to the core invention, which are remotely linked to computers or other information ( ttn-.%) processing systems by Bluetooth 0 radio wave communication systems.
xiv) Locks according to the core invention, which are remotely linked to computers or other information processing systems, which randonily or sequentially assign new lock release code numbers and/or lock signature code numbers to successive commercial transactions, which involve the delivery of goods to the locked security area.
xv) Locks according to the core invention, which are remotely linked to computers or other information processing systems which allow the premises occupier or other privileged persons to remotely gain information via telephone communication systems, relating to the deliveries that have been made during their absence.
xvi) Locks according to the core invention, which are remotely linked to computers or other information processing systems which can be programmed to transmit electronic mail "delivery reminder" messages to the delivery service provider, or other parties involved in the delivery chain, if a coded key, related to an agreed delivery, has not been inserted into the lock, by an agreed delivery deadline.
xvii) Locks according to the core invention. which are remotely linked to audio and/or visual systems which can be programmed to transmit an audio and/or visual message announcing a delivery which has recently been made. For example. a television set may used as part of a home delivery system, to deliver a sub title message such as, "Your pizza has just arrived. " xviii) Locks according to the core invention, which are remotely linked to security information recording and storage systems such as video cameras, finger print, retinal blood vessel, body heat pattern, voice pattern or walking gait recognition systems etc.. which only release the lock after the necessary personal information has been provided by- the delivery person. in addition to inserting a valid key. Using such sophisticated security systems as secondary systems. to back up the present invention, rather than as a replacement has at least two advantages: The secondary systems provide evidence of who has visited a premises and are used to discourage thieves from breaking into a secure area, rather than to limit access to known persons. This means that the lock release system is not limited in any way, to a pool of known home delivery personnel, It also allows the option of the secondary system being over-ridden, in case of secondary system failure. Privileged persons. for example the premises occupier, could of course, be allowed access. using the secondary systems alone. without recourse to the use of a physical key.
Claims (20)
1. A security lock and key system, characterised by the action of releasing the locking mechanism al& 1 m, iging the key which is currently inserted into the lock, so that the key cannot be used to release the lo(k s(cond timd.
2. A security lock and key system. according to the first clain with the disabling damage to the ke in g the separation of the whole or part of that portion of the key which is inserted into the key hole, from h 1 pul Of the key which remains external to the key hole.
3_ A security lock and key system, according to the first or second claim. . which also includes a sin 1 s Wure storage volume, inside the main body of the lock, which allows the retained parts of disabled keys [c t st cked in insertion order, to indicate the order in which keys were inserted.
4. A security lock and key system, according to any of the above claims which also includes an additi na. bolt release mechanism, which overrides the key destroying mechanism, allowing privileged key holders re lease the lock without their key being disabled.
5. A security lock and key system. according to any of the above claims, with the keys storing the 1 re lease code in a single, one dimensional row of digits.
6. A security lock and key system, according to any of the above claims, which allow a key to be prolr A to trigger secondary actions, for example switching on a refrigeration unit inside the secure storage Yph e or to temporarily disable the bolt release mechanism. so that the insertion of valid keys thereafter, cannot ra c the bolt, until the lock has been reset by the householder.
7. A security lock and key system. according to anY of the above claims, with the lock being of a mechla cal type and including two sets of tumblers.
8. A security lock and key system, according to any of the above claims., which can be reprogrammed b th( end user, to alter the valid lock release code number.
9, A security lock and key systein, according to any of the above claims, which can be reprogrammed b., th end user. to alter the valid lock release code number.
10. A secunt lock and key system. according to any of the abo,,c claims, which can be programmed b th( end user, so that insertion of keys only allows the lock to be released once, and thereafter. has to be 1 t b -. fore responding to the insertion of a valid key.
---7 -
11. A security lock and key system, according to any of the above claims, which can be released by a plurality of different lock release code nwnbers. but with each code being valid for a single use only, until the lock has been reset by an authorised person.
12. A security lock and key system, according to any of the above claims, which includes solenoids with moveable cores. relays or other forms of electromagnetically operated bolts.
13. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, by information carrying cables, electromagnetic wave or acoustic wave based information carriers.
14. A security lock and key system, according to any of the above claims, which is remotely linked to computers or tfkrm, other information processing systems, by IrDAO infra red communication systems.
15. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, by Bluetooth radio wave communication systems.
16. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, which randomly or sequentially assign new lock release code numbers and/or lock signature code numbers to successive commercial transactions. which involve the delivery of goods to the locked security area.
17. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems, which allow the premises occupier or other privileged persons to remotely gain information, via telephone communication systems, relating to the deliveries that have been made during their absence.
18. A security lock and key system, according to any of the above claims, which is remotely linked to computers or other information processing systems. which can be programmed to transmit electronic mail "delivery reminder" messages to the delivery service provider. or other parties involved in the delivery chain, if a coded key, related to an agreed delivery. has not been inserted into the lock, by an agreed delivery deadline.
19. A security lock and key system. according to an of the above claims, which is remotely linked to audio and/or visual systems which can be programmed to transmit an audio and/or visual message, announcing a delivery which has recentiv been made
20. A security lock and key system. according to an of the aboNc claims, which is remotely linked to security information recording and storage systems. such as N ideo ameras. finger print. retinal blood vessel, body heat pattern, voice pattern or walking gait recognition s) stems etc. "hich only release the lock after the necessary personal information has been provided by the deliven person. in adkhtjon to inserting a valid key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0001391A GB2358428B (en) | 2000-01-22 | 2000-01-22 | Security lock and key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0001391A GB2358428B (en) | 2000-01-22 | 2000-01-22 | Security lock and key |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0001391D0 GB0001391D0 (en) | 2000-03-08 |
GB2358428A true GB2358428A (en) | 2001-07-25 |
GB2358428B GB2358428B (en) | 2003-05-07 |
Family
ID=9884092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0001391A Expired - Fee Related GB2358428B (en) | 2000-01-22 | 2000-01-22 | Security lock and key |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2358428B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2394509A (en) * | 2002-10-25 | 2004-04-28 | James Welland | Secure delivery box |
WO2007089749A2 (en) * | 2006-01-27 | 2007-08-09 | Ferrellgas, L.P. | Consumer product dispensing system |
US8358199B2 (en) | 2006-11-16 | 2013-01-22 | Andrew Edward Nesling | Delivery container |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110021103A (en) * | 2019-04-09 | 2019-07-16 | 上海上实龙创智慧能源科技股份有限公司 | A kind of visitor guiding system and method based on recognition of face detection |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1090362A (en) * | 1964-10-26 | 1967-11-08 | Security Systems Inc | Improvements in or relating to security systems |
US3927543A (en) * | 1974-01-28 | 1975-12-23 | Gl Directzia Kbumkp Pri Sgns | Desintegrating key |
DE2506673A1 (en) * | 1975-02-17 | 1976-08-26 | Kerapid Elektronik | Ticket operated automatic turnstile - Decodes, cuts and stores entry tickets and has checking and counting facilities |
GB1474667A (en) * | 1974-05-09 | 1977-05-25 | Information Identification Co | Access control assembly |
DE29807184U1 (en) * | 1998-04-21 | 1998-08-13 | Müller, Wolfgang T., 78315 Radolfzell | Electronic service box |
-
2000
- 2000-01-22 GB GB0001391A patent/GB2358428B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1090362A (en) * | 1964-10-26 | 1967-11-08 | Security Systems Inc | Improvements in or relating to security systems |
US3927543A (en) * | 1974-01-28 | 1975-12-23 | Gl Directzia Kbumkp Pri Sgns | Desintegrating key |
GB1474667A (en) * | 1974-05-09 | 1977-05-25 | Information Identification Co | Access control assembly |
DE2506673A1 (en) * | 1975-02-17 | 1976-08-26 | Kerapid Elektronik | Ticket operated automatic turnstile - Decodes, cuts and stores entry tickets and has checking and counting facilities |
DE29807184U1 (en) * | 1998-04-21 | 1998-08-13 | Müller, Wolfgang T., 78315 Radolfzell | Electronic service box |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2394509A (en) * | 2002-10-25 | 2004-04-28 | James Welland | Secure delivery box |
WO2007089749A2 (en) * | 2006-01-27 | 2007-08-09 | Ferrellgas, L.P. | Consumer product dispensing system |
WO2007089749A3 (en) * | 2006-01-27 | 2007-12-21 | Ferrellgas L P | Consumer product dispensing system |
US8358199B2 (en) | 2006-11-16 | 2013-01-22 | Andrew Edward Nesling | Delivery container |
Also Published As
Publication number | Publication date |
---|---|
GB2358428B (en) | 2003-05-07 |
GB0001391D0 (en) | 2000-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070296545A1 (en) | System for management of ubiquitously deployed intelligent locks | |
US8511118B2 (en) | High security, dual-mode padlock construction | |
DE60031294T2 (en) | SAFE DELIVERY OR ACCEPTANCE SYSTEM | |
US8261583B2 (en) | High security, dual-mode padlock construction | |
CA2811317C (en) | Systems and methods for accessing or managing secured storage space | |
US5164718A (en) | Separate lock and unlock codes for a security box | |
GB2371833A (en) | An electromechanical valve assembly for an i.c. engine | |
EP1608250A1 (en) | Closure for a compartment | |
CN101494009A (en) | Apparatus and method for identifying container being unlocked | |
CN101488242A (en) | Controllable switch based on mobile phone short message instructions | |
CA2337906A1 (en) | Secure home delivery method | |
EP1211971B1 (en) | Secure article delivery apparatus and method | |
EP1110187B1 (en) | Cash-box system with sensor | |
US4644104A (en) | Security system including a plurality of centrally programmable locking assemblies | |
US20170053144A1 (en) | Device and method for checking the integrity of physical objects | |
GB2358428A (en) | Destructible key for home delivery container | |
EP1138232A2 (en) | Remote access device and system | |
CN201163485Y (en) | Apparatus for recognizing opening state of container | |
GB2362188A (en) | Security system for lockable enclosures | |
JPH0432463Y2 (en) | ||
CN213838104U (en) | Door lock with sound control function | |
CN212454090U (en) | Safe deposit box | |
CN211180944U (en) | Locker of intelligence registration function | |
Kimiecik | Loss prevention guide for retail businesses | |
Wilson | Neighborhood Watch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20080122 |