Modular lock assembly for an electric bicycle

ABSTRACT

Various embodiments provide for a bike-supported communication network that manages and facilitates communications between components of an electric bicycle and a wireless network. In some embodiments, the systems and methods provide a lock assembly for an electric bicycle, having a lock module that is configured to lock a rear wheel of the electric bicycle and a communication module that facilitates wireless communications between the electric bicycle and a communications network.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/216,440, filed Mar. 29, 2021, entitled SECURITY SYSTEMS ANDCOMMUNICATION NETWORKS FOR ELECTRIC BICYCLES, and is related to U.S.patent application Ser. No. 16/875,874, filed on May 15, 2020, entitledBICYCLE SECURITY DEVICES AND SYSTEM, the contents of which are herebyincorporated by reference in their entirety.

BACKGROUND

Electric bicycles, or e-bikes, are a popular method of transportationfor use by individual riders, families, commercial enterprises, and soon. Generally, electric bicycles are more expensive than traditionalbicycles, and thus enhanced security devices and anti-theft systems thatassist with or prevent unauthorized and/or unwanted use of an electricbicycle, such as its theft, are desirable.

While conventional security devices, such as locks (e.g., cables,chains, D-locks U-locks, wheel locks) or alert systems, can providevarying levels of deterrence or prevention, thieves can still find waysto remove the locks or avoid the alert systems. For example, thieveshave a myriad amount of lock removal tools at their disposal, such aslock picks, cable cutters, hacksaws, bolt cutters, drills, grinders, andso on.

Further, conventional alert systems can be expensive and/or suffer fromvarious issues. For example, conventional systems can present falsealerts upon detecting bike movements due to accidental or innocuousactivities (e.g., and not due to a theft or other illegal activities).Further, such systems may detect the theft of a bicycle when it is toolate (e.g., once the thief has already removed the lock and is ridingaway with the bike), and thus not be useful for deterrence of the theftor recovery of the bike.

These and other drawbacks exist with respect to conventional locks andalert systems.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present technology will be described and explainedthrough the use of the accompanying drawings.

FIG. 1A is a diagram illustrating a network of components for anelectric bicycle.

FIG. 1B is a diagram illustrating a lock as a hub within an electricbicycle network.

FIG. 2A is a block diagram illustrating various modules of a modularlock assembly.

FIG. 2B is a diagram illustrating a device mount in communication withan electric bicycle network.

FIG. 3 is a block diagram illustrating a suitable network environmentwithin which an electric bicycle operates.

FIG. 4 is a block diagram illustrating example components of a bikecommunication system.

FIGS. 5A-5D are diagrams illustrating example bike components asantennas of a bike communication system.

FIG. 6 is a block diagram illustrating example components of a securityaction system.

FIG. 7 is a block diagram illustrating various components of amulti-factor alert system.

FIG. 8 is a flow diagram illustrating an example method of presenting asecurity action for an electric bicycle.

FIG. 9 is a flow diagram illustrating an example method of determining asecurity action for an electric bicycle using information from variousbicycle sensors.

FIG. 10 is a flow diagram illustrating an example method of determininga security action for an electric bicycle based on a context associatedwith the electric bicycle.

FIG. 11 is a diagram illustrating a lock module configured to be adaptedwith a conventional lock.

FIG. 12 is a flow diagram illustrating an example method of unlocking aconventional lock using an associated lock module.

In the drawings, some components are not drawn to scale, and somecomponents and/or operations can be separated into different blocks orcombined into a single block for discussion of some of theimplementations of the present technology. Moreover, while thetechnology is amenable to various modifications and alternative forms,specific implementations have been shown by way of example in thedrawings and are described in detail below. The intention, however, isnot to limit the technology to the particular implementations described.On the contrary, the technology is intended to cover all modifications,equivalents, and alternatives falling within the scope of the technologyas defined by the appended claims.

DETAILED DESCRIPTION Overview

Various systems and methods associated with securing electric bicyclesand alerting users of theft or tampering activities associated withtheir electric bicycles are described. For example, the systems andmethods described herein are configured or implemented to act asanti-theft or anti-tampering devices for an electric bicycle.

Various embodiments provide for a bike-supported communication networkthat manages and facilitates communications between components of anelectric bicycle and a wireless network. In some embodiments, thesystems and methods provide a bike-supported communication device thatcommunicates with a wireless network via one or more wirelesscommunication protocols, where the communication device is configured tomanage communications between the wireless network and variouscomponents of the electric bicycle. The communication device can includea bicycle communications component that facilitates communicationsbetween the communication device and components of the electric bicycle,and a network communications component that facilitates communicationsbetween the electric bicycle and the wireless network.

While described herein with respect to electric bicycles, in someembodiments aspects of the security devices and systems described hereincan be configured or utilized with other bicycles or cycles, such asnon-electric bicycles, tricycles, scooters or other wheeledmicro-mobility vehicles, mopeds, and so on.

Various embodiments of the devices and systems will now be described.The following description provides specific details for a thoroughunderstanding and an enabling description of these embodiments. Oneskilled in the art will understand, however, that these embodiments maybe practiced without many of these details. Additionally, somewell-known structures or functions may not be shown or described indetail, so as to avoid unnecessarily obscuring the relevant descriptionof the various embodiments. The terminology used in the descriptionpresented below is intended to be interpreted in its broadest reasonablemanner, even though it is being used in conjunction with a detaileddescription of certain specific embodiments.

Examples of Electric Bicycle Networks and Suitable CommunicationEnvironments

FIG. 1A depicts an electric bicycle 100 that incorporates many of thevarious features of the technology described herein. As depicted, theelectric bicycle, or e-bike, is a long-tail cargo bike configured to bepropelled either by human pedaling of the e-bike and/or via an electricmotor that assists the human's pedal-power or propels the e-bike withoutpedaling (similar to a moped or scooter). Of course, the electricbicycle 100 can be of various other types or styles, including differentclasses of bikes (e.g., class 1, 2, or 3 e-bike), electric bikes havingdifferent frames (e.g., road bikes, commuter bikes, folding bikes), andso on.

Electric Bicycle Communication Networks

The electric bicycle 100 includes components common to bicycles, such asa front wheel and rear wheel that support a frame of the bicycle, acrankset (that supports pedals, not shown), a chain that extends fromthe crankset to a rear axle of the rear wheel, a seat, handlebars, cargorack, and so on. The frame can include a head tube, a down tube, a toptube and a seat tube, as well as seat stays or other cross tubes. Thefront wheel can be attached to the frame via a fork connected to thehead tube, and the rear wheel can be attached to the frame via a dropoutassembly of the frame.

The electric bicycle 100 also includes a battery pack 110 positionedand/or mounted to a down tube of the frame, a controller 120 mounted toseat-stays of the frame, and an electric motor 130 (e.g., a hub motor)mounted to the rear wheel. In some cases, the battery pack 110 and/orcontroller 120 can be integrated or semi-integrated into the frame ofthe electric bicycle 100. During operation of the electric bicycle 100,the battery pack 110 provides power to the electric motor 130, whichpropels the bicycle under control of the controller 120. In someconfigurations, the battery pack 110 and/or controller 120 are mountedto other components of the frame.

Further, the electric bicycle 100 includes an integrated security device140, as described herein. The integrated security device 140 can includea cable or tether lock component integrated with a wheel lock (having asliding or rotating shackle), which enables a rider to secure his/herbicycle via one or two integrated mechanisms of deterrence or protectionhoused within the bike lock.

In order to communicate with a network 170, the electric bicycle 100includes a communication device 150, such as a wireless communicationdevice that is configured to communicate over a wireless network, suchas a cellular network. The communication device 150 can includecomponents configured to communicate over the network 170, such as WiFicomponents, cellular components (e.g., 4G or 5G cellular components),Bluetooth components, and so on. For example, the communication device150 can include various embedded sensors, processors (microprocessors),and connectivity ports or antennas. In some cases, the communicationdevice 150 functions as an Internet of Things (IoT) device and canenable the electric bicycle 100 to be part of a network of connectede-bikes, such as a fleet of electric bicycles in communication with acentral server or portal.

As described herein, the communication device 150 provides one or morecommunication methods, protocols, systems and/or devices, such ascellular communication technologies, Bluetooth® communicationtechnologies, Near-Field Communication (NFC) technologies, RadioFrequency Identification (RFID) communication technologies, GSM/GPRS,and so on. These technologies can communicate via various communicationprotocols, such as HTTP, MQTT (Message Queueing Telemetry Transport),AMQP (Advanced Message Queueing Protocol), and so on.

Thus, the communication device 150 can include various combinations ofcommunication technologies, in order to establish or support an electricbicycle network. Example combinations include:

a Bluetooth component that facilitates Bluetooth protocol communicationsbetween the communication device and a controller, battery pack, and/orelectric motor, and a wireless component that facilitates WiFi protocolcommunications between the communication device and the wirelessnetwork;

a Bluetooth component that facilitates Bluetooth protocol communicationsbetween a communication device and the controller, battery pack, and/orelectric motor, and a cellular component that facilitates cellularprotocol communications between the communication device and thewireless network;

a bicycle communications component that facilitates communicationsbetween the communication device and a controller, a battery pack,and/or an electric motor of the electric bicycle, and a networkcommunications component that facilitates communications between theelectric bicycle and the wireless network; and so on.

As described herein, the communication device 150, in some cases, acts acommunications hub for the electric bicycle, and can perform variousoperations or methods as the communications hub. For example, thecommunication device 150 can perform a method of facilitatingcommunications between components of an electric bicycle by receiving,via a bicycle communications component of the communications device,information associated with a current operation of a component of theelectric bicycle from a controller of the electric bicycle, andtransmitting, via a network communications component of thecommunication device, a message to a fleet management server that isremote from the electric bicycle over a wireless network, where themessage includes the information associated with the current operationof the component of the electric bicycle.

The communication device 150 can then receive, at the networkcommunications component of the communication device, a reply messagefrom the fleet management server over the wireless network, and send,via the bicycle communications component, a control signal to thecomponent of the electric bicycle to control the current operation ofthe component of the electric bicycle in response to the reply messagereceived from the fleet management server.

In some cases, the communication device 150 is disposed within aninternal area of the frame of the electric bicycle, such as within aninternal area of a top tube of the electric bicycle, an internal area ofa down tube of the electric bicycle, or other internal areas within thebicycle frame.

The electric bicycle 100 can also include a display device 160, which isconfigured to receive input from a rider of the bicycle 100 and/orpresent information to the rider of the bicycle. For example, thedisplay device 160 can present information associated with a currentride or trip (e.g., speed, pedal assist level, battery level, route, andso on), information associated with communications by the communicationdevice 150 over the network 170, and so on. The display device 160 canalso facilitate receiving input from the rider, such as input to adjustthe pedal assist level or to communicate information over the network170).

In some cases, the electric bicycle 100 can include a smart or connectedmount or mounting device 165 that communicates with other components ofthe bicycle 100. The mount 165 can pair with a mounted or attacheddevice, such as a smart phone or mobile device. For example, when apaired device is attached, the mount can send information to thecontroller 120 or communication device 150 that includes informationidentified the paired device and/or the associated user.

Thus, in some embodiments, the electric bicycle 100 provides a bikesupported network of various communication components, such ascomponents configured to trigger alerts and/or alarms associated withunauthorized movement or use of the bicycle 100, as well as componentsconfigured to perform other communication functions, as describedherein. In some cases, the bike supported network includes the controldevice or controller 120 that controls functions of the electric battery110 and/or the hub motor 130.

The controller 120 can also communicate with the display device 160,which can present information to riders, as well as receive input fromriders of the bicycle 100. In some cases, the controller 120 candetermine rider input power, and send such information to the network170 and/or various components. The controller 120 can also communicatewith the security device 140, which can include various componentsconfigured to interact with the controller 120. Further, any or allcomponents can communicate with the communication device 150 or withother components via the communication device 150.

In addition to the components depicted in FIG. 1A, the electric bicyclecan include other components not shown, such as pedals, pedal assistsensors, throttles, torque sensors and other bike or component movementsensors, brakes and braking systems, various accessories, fenders,various types of rims, tires, or wheels, locking or security systems,lights and reflectors, bells or other audible alert systems, GPS,screens, and/or other user interfaces or display devices, and so on.

FIG. 1A and the components, systems, servers, and devices depictedherein provide a general computing environment and network within whichthe technology described herein can be implemented. Further, thesystems, methods, and techniques introduced here can be implemented asspecial-purpose hardware (for example, circuitry), as programmablecircuitry appropriately programmed with software and/or firmware, or asa combination of special-purpose and programmable circuitry. Hence,implementations can include a machine-readable medium having storedthereon instructions which can be used to program a computer (or otherelectronic devices) to perform a process. The machine-readable mediumcan include, but is not limited to, floppy diskettes, optical discs,compact disc read-only memories (CD-ROMs), magneto-optical disks, ROMs,random access memories (RAMs), erasable programmable read-only memories(EPROMs), electrically erasable programmable read-only memories(EEPROMs), magnetic or optical cards, flash memory, or other types ofmedia/machine-readable medium suitable for storing electronicinstructions.

The network or cloud 170 can be any network, ranging from a wired orwireless local area network (LAN), to a wired or wireless wide areanetwork (WAN), to the Internet or some other public or private network,to a cellular (e.g., 4G, LTE, or 5G network), and so on. While theconnections between the various devices and the network 170 and areshown as separate connections, these connections can be any kind oflocal, wide area, wired, or wireless network, public or private.

Further, any or all components depicted in the Figures described hereincan be supported and/or implemented via one or more computing systems orservers. Although not required, aspects of the various components orsystems are described in the general context of computer-executableinstructions, such as routines executed by a general-purpose computer,e.g., mobile device, a server computer, or personal computer. The systemcan be practiced with other communications, data processing, or computersystem configurations, including: Internet appliances, hand-held devices(including tablet computers and/or personal digital assistants (PDAs)),all manner of cellular or mobile phones, multi-processor systems,microprocessor-based or programmable consumer electronics, set-topboxes, network PCs, mini-computers, mainframe computers, AR/VR devices,and the like. Indeed, the terms “computer,” “host,” and “host computer,”and “mobile device” and “handset” are generally used interchangeablyherein and refer to any of the above devices and systems, as well as anydata processor.

Aspects of the system can be embodied in a special purpose computingdevice or data processor that is specifically programmed, configured, orconstructed to perform one or more of the computer-executableinstructions explained in detail herein. Aspects of the system may alsobe practiced in distributed computing environments where tasks ormodules are performed by remote processing devices, which are linkedthrough a communications network, such as a Local Area Network (LAN),Wide Area Network (WAN), or the Internet. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

Aspects of the system may be stored or distributed on computer-readablemedia (e.g., physical and/or tangible non-transitory computer-readablestorage media), including magnetically or optically readable computerdiscs, hard-wired or preprogrammed chips (e.g., EEPROM semiconductorchips), nanotechnology memory, or other data storage media. Indeed,computer implemented instructions, data structures, screen displays, andother data under aspects of the system may be distributed over theInternet or over other networks (including wireless networks), on apropagated signal on a propagation medium (e.g., an electromagneticwave(s), a sound wave, etc.) over a period of time, or they may beprovided on any analog or digital network (packet switched, circuitswitched, or other scheme). Portions of the system may reside on aserver computer, while corresponding portions may reside on a clientcomputer such as a mobile or portable device, and thus, while certainhardware platforms are described herein, aspects of the system areequally applicable to nodes on a network. In an alternative embodiment,the mobile device or portable device may represent the server portion,while the server may represent the client portion.

Lock as a Hub in an Electric Bicycle Network

In some embodiments, the security device 140 can incorporate or includesome or all aspects of the communication device 150. FIG. 1B is adiagram illustrating a lock 145, lock assembly, or security device as ahub of an electric bicycle network. The lock 145 acts as a communicationhub for the electric bicycle 100, where some or all other components ofthe bicycle 100 communicate with other components via the lock 145.

As described herein, the lock 145 includes various components that lock,protect, or secure the electric bicycle 100. A lock component caninclude a mechanically-actuated shackle lock that prevents the rearwheel of the electric bicycle from rotating, an electronically-actuatedshackle lock that prevents the rear wheel of the electric bicycle fromrotating, an integrated cable lock that is configured to fix theelectric bicycle to a fixture at a geographical location that includesthe electric bicycle, an electronic locking module that causes theelectric motor, the battery park, and/or the controller to operate in alocked mode of operation, and so on.

Further, the lock 145 includes components configured to communicate overthe network 170, such as WiFi components, cellular communicationcomponents, Bluetooth components, and so on. The lock 145, therefore,can enable the electric bicycle 100 to be an Internet of Things (IoT)device that communicates with a central server or portal over thenetwork 170.

For example, a lock assembly can include a communication device, such asthe communication device 150, that communicates with a wireless networkvia one or more wireless communication protocols, where thecommunication device is configured to manage communications between thewireless network and the controller of the electric bicycle.

The lock assembly, therefore, can perform various actions, operations,or methods acting as a communication hub for the electric bicycle 100.For example, the lock 145 can receive information associated with acurrent operation of a component of the electric bicycle over aBluetooth communication protocol that manages communications between thecommunications device and the component of the electric bicycle, andtransmit a message to a bicycle management server that is remote fromthe electric bicycle over a wireless network, where the message includesthe information associated with the current operation of the componentof the electric bicycle.

Establishing the lock 145 as the communication hub for the electricbicycle 100 protects the communication components from tampering ordestruction, because the lock 145 is already designed and configured tobe securely attached to the bicycle 100 (and to secure the bicycle whennot in use). Thus, the lock 145 provides a protected housing orcompartment in which to support or dispose of various communication orcomputing components, in order to protect these components from theft,tampering, damage, and/or provide other benefits.

Examples of a Modular Lock Assembly

In some cases, the lock 145 as hub can be configured as a modulardevice, where the lock 145 includes two or more modules selected toperform or provide certain functions for the electric bicycle 100, therider of the electric bicycle 100, the fleet within which the bicycle100 is provided, and so on. FIG. 2A is a block diagram illustratingvarious modules of a modular lock assembly 200.

The modular lock assembly 200, which can be implemented by the lock 145and or the security device 140, includes various modules that can beprovided or removed, depending on the capabilities, functions, orservices to provide to the bicycle 100, the rider, the associated fleet,the provider of the bicycle 100 (e.g., a bike share service) and so on.

The lock assembly 200 includes a lock module 210, such as physical lockthat prevents the rear wheel from moving (e.g., a shackle lock), aphysical lock that fixes the bicycle 100 to a structure (e.g., a cordlock), an electronic lock that prevents various bicycle components fromoperating (e.g., wheels, handlebars or fork, motor, battery, controller)and so on. In some cases, as described herein, the lock module 210 canattach to or be integrated with a conventional lock already fixed to thebicycle 100 and control the operation (e.g., opening and closing) of theconventional lock, without having to remove and provide a new lockingmechanism.

The lock assembly 200 also includes a communication module, such as aBluetooth module 220 and/or IoT module 230. The communication module,which can include one or more communication transmitters/receivers,enables the lock assembly 200 to communicate over differentcommunication protocols, such as Bluetooth, wireless (WiFi), cellular,and so on.

For example, the Bluetooth module 220 can facilitate and supportcommunications between the lock assembly 200 and an associated mobiledevice (e.g., the mobile device of a rider of the bicycle 100) or othercomponents of the bicycle 100. The IoT module 230 can facilitate andsupport communications between the lock assembly 200 and various remoteservers or portals over a communications network, such as the network170. Thus, the IoT module 230 can represent the electric bicycle 100 asan Internet of Things (IoT) device on the communications network.

The lock assembly 200 can also include an action module 240, which isconfigured and/or programmed to perform various actions associated withthe electric bicycle 100, such as actions associated with preventing orresisting theft or tampering events at the electric bicycle 100. Forexample, the action module 200 can control and/or trigger theperformance of alerts or alarms in response to certain events, and/orcan modify operations of other components of the electric bicycle 100during certain unwanted events or conditions. Further details regardingthe components of the action module 240 and/or actions performed by theaction module 240 are described herein.

As described herein, in some embodiments, the electric bicycle 100 canbe part of a network of connected electric bicycles, such as a fleet ofelectric bicycles, a ride share service for a city or location, and soon. In order to facilitate or protect communications between theelectric bicycle 100 and fleet management servers or systems, the lockassembly 200 can include a fleet module 250 that is configured tocommunicate information directly with the fleet management servers ofsystems.

For example, the fleet module 250 can be configured by the provider ofthe fleet of bicycles (e.g., a delivery company using electric bicyclesto make deliveries, a ride share service, a university, and so on), andcan capture, track, and/or store certain information associated with theuse or activities of the electric bicycle 100. Such information can beprovided to the fleet management server or system upon request or atvarious established time periods.

Further, the fleet management server or system can transfer informationor updates to the lock assembly 200 in order to update various databaseor operating parameters of the electric bicycle 100. Thus, the lockassembly 200 can provide a secure and tamper-proof location within whichto store fleet specific information and/or track use/activityinformation for a fleet-provided bicycle, among other benefits.

Examples of Integrated Locking/Unlocking

In some cases, the electric bicycle 100 can include a device mount(e.g., smart phone or mobile device mount) that integrates the chargingof a mounted device with the unlocking of the lock 140, 145, 200 (orother components) of the electric bicycle 100. In some cases, a mount,similar to a mount for the display device 160, can communicate over thebike supported network when paired with a mobile device associated withthe mount (or the bicycle 100).

FIG. 2B depicts a mobile device 280 and associated mount 290. When themobile device 280, such as a device associated with the electric bicycle100, is mounted to the bicycle 100 via the mount 290, the mount sends asignal via the bike supported network or other communication protocols(e.g., Bluetooth) to the lock 200. The signal indicates the mobiledevice is associated with an authorized rider of the bicycle, and thelock 200 unlocks upon receiving the signal. Similarly, when the deviceis removed, the lock 200 may then lock to secure the bicycle 100.

The mount 290 can include various components that identify the mobiledevice 280 is associated with the electric bicycle 100 or is otherwiseassociated with an authorized user of the electric bicycle 100 (e.g., isthe device of one or more users of bicycles provided by a fleet or bikeshare service). For example, the mount 290 can communicate with themobile device 280 over Bluetooth or other similar protocols or canidentify the device 280 via the bike-supported network.

In some cases, the mount 290 can determine the device 280 is in contactor proximate to the mount 290 (e.g., is mounted or attached), andcontrol access to the electric bicycle 100 (e.g., unlocking the lock,enabling the controller 120 and/or motor 130 to operate, and so on). Forexample, the mobile device 280 can communicate over RFID or NFC (nearfield communication) with the mount 290, which receives identificationinformation from the device 280, and performs actions to unlock the lock200 or enable other controls of the electric bicycle 100, as describedherein.

Thus, the mount 290, or an associate system, can receive an identifierfrom the mobile device over a near field communications (NFC) protocolor an RFID protocol when the mobile device contacts or is proximate tothe mount, and determine the identifier is associated with a userauthorized to operate the electric bicycle.

Further, the mount can send signals via the bike supported network orother communication protocols to the other components (e.g., thecontroller 120, motor 130, battery 110, display device 160, and so on)of the bicycle 100. Thus, these components may only operate, or mayoperate with limited functionality, in response to the mount sending thesignal that the mobile device 280 is attached or otherwise paired withthe mount 290.

The mount 290, or a system associated with the mount 290, can perform amethod for securing an electric bicycle by determining that a mobiledevice associated with the electric bicycle is in contact with a mountdisposed on the electric bicycle, and causing a lock assembly to unlockthe electric bicycle in response to the determination that the mobiledevice is in contact with the mount.

Then, in some cases, the mount 290 or associated system can determinethat a mobile device associated with the electric bicycle is no longerin contact with the mount disposed on the electric bicycle and cause thelock assembly to lock the electric bicycle in response to thedetermination that the mobile device no longer contacts the mount. Insome cases, the mount 290 or associated system locks (or relocks) thebicycle when it is no longer moving, in order avoid locking the bicyclewhen it is in motion (and the rider uses their device).

Thus, the device mount 290 can be part of a system that managesoperations of an electric bicycle, which includes the device mount 290that determines a mobile device associated with the electric bicycle isattached, and controller that controls operations of the electricbicycle in response to receiving a signal from the device mount that themobile device attached to the device mount is associated with anauthorized user of the electric bicycle.

Electric Bicycle on a Network

As described herein, the electric bicycle 100 operates on or within anetwork, such as the network 170. FIG. 3 is a block diagram illustratinga suitable network environment 300 within which the electric bicycle 100operates or communicates with remote servers/systems, other bicycles,road or bike path traffic devices, and so on.

The bicycle 100, as described herein, can send information to, andreceive information from, other devices over the communications network170, such as a security server 310, a mobile device 320 having a mobileapplication 325 associated with the bicycle 100, a remote server 330,and so on. Thus, the bicycle 100, via the various communication devices,can act as an IoT device or other communication device on the network170.

For example, the remote server 330 can communicate with the electricbicycle 100 over the network 170 via the modular lock assembly 200, thelock 145, and/or the communication device 150 of a bike supportednetwork. Further, the electric bicycle 100 can communicate, via theaction module 240, alert or alarm information to the remote server 330of a fleet management system, the remote server 310 of a securitysystem, and/or the mobile application 325 of the mobile device 320(e.g., the smart phone of the rider of the bicycle 100).

Examples of a Bike Communication System

As described herein, in some embodiments, the electric bicycle 100 caninclude or support a bicycle network of components, such as a networkthat facilitates communication between various components of theelectric bicycle 100 and remote servers (e.g., remote servers 310, 330over the network 170).

In such embodiments, the electric bicycle 100 supports a bikecommunication system for one or more components, such as thecommunication device 150. The bike communication system utilizes one ormore physical or mechanical components of the electric bicycle 100 as anantenna via which the communication device 150 can transmit and/orreceive information.

For example, the bike communication system can utilize a face plate, aseat post clamp, a crankset, or other mechanical components of thebicycle 100 as an antenna that connects to the communication device 150.By incorporating these components as part of the bike communicationsystem, a provider of the electric bicycle 100, such as a fleet manageror ride share service, can prevent the tampering or removal of thecommunication capabilities of the bicycle 100, because the bicycle 100cannot operate (e.g., cannot move or be pedaled) without thesecomponents. Thus, the bike communication system can integrate suchcomponents in order to resist and/or prevent tampering or removal of thebike communication system.

FIG. 4 is a block diagram illustrating example components of a bikecommunication system 400. The bike communication system 400 includes thecommunication device 150, or another device configured to transmitand/or receive information to/from the network 170.

As described herein, the communication device 150 can be positioned orfixed to the frame of the bicycle 100, such as to a head tube, top tube,down tube, seat tube, and so on. In some cases, the communication device150 can be partially or fully disposed or contained within the frame,such as within the top tube or down tube.

The bike communication system 400 also includes a mechanical component410 or frame component of the electric bicycle 100. The mechanicalcomponent 410 includes or incorporates an antenna 420. For example, themechanical component 410 or frame component can include a stampedantenna, a plate, a printed antenna (e.g., a microstrip patch antenna),a coil, and so on. The antenna 420, in some cases, is a metal foil ormetal plate configured to be attached or integrated (e.g., partially orwholly) into the mechanical component 410.

The bike communication system 400 includes a connection component 430,such as a wire or metal connector, that connects or couples thecommunication device 150 to the antenna 420 via the mechanical component410 of the electric bicycle 100. In some cases, the connection component430 is a printed metal strip or connector that runs within the frame ofthe bicycle 100 between the communication device 150 and the antenna420. In other cases, the connection component 430 is disposed on oroutside of the frame and runs between the communication device 150 andthe antenna 420.

The communication system 400, therefore, can facilitate a method forestablishing an electric bicycle as an Internet of Things (IoT) on anetwork, by fixing a frame plate (or other frame or mechanicalcomponent) to a frame of the electric bicycle, where the frame plateincludes an antenna that connects the electric bicycle to the networkand causing a network communication device of the electric bicycle totransmit information to the network via the antenna of the frame plateof the electric bicycle.

As described herein, the bike communication system 400 can beimplemented utilizing a variety of different mechanical components ofthe electric bicycle 100. FIGS. 5A-5C are diagrams illustrating examplebike components as antennas of the bike communication system 100.

As a first example, FIG. 5A depicts a bike communication system 500 thatutilizes a face plate 505 to communicate over a network, such as thenetwork 170. The communication device 150, disposed on or within the toptube of the electric bicycle 100, utilizes an antenna 510 that isintegrated within or placed onto a surface of the face plate 505 (e.g.,the removable plate that connects the stem to the handlebars). Thecommunication device 150 can connect to the face plate 505 and/orantenna 510 using a wired or printed metal connector, disposed along orwithin the top tube of the bicycle 100. For example, the metal connectorcan run within the top tube (e.g., internally) from the communicationdevice 150 to the antenna 510 of the face plate 505.

As a second example, FIG. 5B depicts a bike communication system 520that utilizes a seat post clamp 522 to communicate over the network 170.The communication device 150, disposed on or within the top tube of theelectric bicycle 100, utilizes an antenna 525 that is integrated withinor placed onto a surface of the seat post clamp 522 (e.g., an attachmentmechanism that fixes a seat post and associated seat to the bicycle100). The communication device 150 can connect to the seat post clamp522 and/or antenna 525 using a wired or printed metal connector,disposed along or within the top tube and seat tube of the bicycle 100.

For example, the metal connector can run within the top tube (e.g.,internally) and seat tube from the communication device 150 to theantenna 525 of the seat post clamp 522. However, in other cases, thecommunication device 150 can be disposed on or within the seat tube, andthe metal connector can run within the seat tube (e.g., internally) fromthe communication device 150 to the antenna 525 of the seat post clamp522.

As another example, FIG. 5C depicts a bike communication system 530 thatutilizes a bike seat 530 to communicate over the network 170. Thecommunication device 150, disposed on or within the top tube of theelectric bicycle 100, utilizes an antenna 535 that is integrated withinor placed onto a surface of the bike seat 532. The communication device150 can connect to the antenna 535 of the bike seat 532 using a wired orprinted metal connector, disposed along or within the top tube and seattube of the bicycle 100.

For example, the metal connector can run within the top tube (e.g.,internally) and seat tube from the communication device 150 to theantenna 535 of the bike seat 532. However, in other cases, thecommunication device 150 can be disposed on or within the down tube, andthe metal connector can run within the seat tube (e.g., internally) fromthe communication device 150 to the antenna 535 of the bike seat 532.

As another example, FIG. 5D depicts a bike communication system 540 thatutilizes a front plate 542 to communicate over the network 170. Thecommunication device 150, disposed on or within the top tube of theelectric bicycle 100, utilizes an antenna 545 that is integrated withinor placed onto a surface of the front plate 542. The communicationdevice 150 can connect to the antenna 545 of the bike seat 542 using awired or printed metal connector, disposed along or within the top tubeand a head tube of the bicycle 100.

In addition to the front plate 542, an antenna can be integrated ontovarious frame plates that attach to the frame (e.g., on a rear rack orseat stay) of the electric bicycle 100. The frame plates, being flushwith the frame, can enable the antenna to be easily installed or removedfrom the electric bicycle 100, and thus enable the activation ordeactivation of the bicycle 100 as an IoT device or communicationdevice. Thus, a retailer, fleet operator, bike share service, or otherprovider of the bicycle, can provide an electric bicycle 100 with orwithout network communication functionality, as well as provide anaftermarket IoT device that can easily be installed to the frame.

Of course, the bike communication system 400 can utilize othermechanical components of the electric bicycle 100 to contain or be partof the antenna 420, such as components located at various endpoints ofthe bicycle 100 and/or at positions that provide clear, unobstructedcommunication paths between the placed antennas and the network 170.Example mechanical or frame components 410 include:

A crank set, such as a crank arm, bottom bracket, and/or one or morechain rings of the crankset;

Handlebars, such as the ends of handlebars;

Rear racks and other accessories attached to a rear portion of theelectric bicycle 100;

A wiring harness or other electric components of the electric bicycle100;

Safety flags or posts of safety flags; and so on.

Thus, in some embodiments, utilizing a mechanical component of theelectric bicycle 100 enables the communication device 150 toreceive/transmit information from/to the bicycle 100 from a position ofthe electric bicycle 100 that is unobstructed from other components ofthe electric bicycle 100, among other benefits. Further, by utilizingmechanical components, the bike communication system 400 can prevent ordeter tampering or avoiding the communication capabilities of thebicycle 100, because removal of or tampering to the antenna can causethe bicycle 100 to be inoperable, among other benefits.

Examples of Performing Security Actions for an Electric Bicycle

As described herein, in some embodiments, the systems and methodsprovide various techniques for identifying, selecting, and/or performingsecurity actions for an electric bicycle. FIG. 6 is a block diagramillustrating example components or modules of a security action system600.

The modules can be implemented with a combination of software (e.g.,executable instructions, or computer code) and hardware (e.g., at leasta memory and processor). Accordingly, as used herein, in some exampleembodiments, a module is a processor-implemented module and represents acomputing device having a processor that is at least temporarilyconfigured and/or programmed by executable instructions stored in memoryto perform one or more of the particular functions that are describedherein. The security action system 600 includes a sensor module 610, aselection module 620, and an action module 630.

In some embodiments, the sensor module 610 is configured and/orprogrammed to receive or access information captured by one of moresensors of the electric bicycle 610. For example, the sensor module 610can receive information from different sensors fixed or attached to theelectric bicycle 100, including sensors configured or implemented tocapture movement information for the electric bicycle 100, statusinformation for one or more components of the electric bicycle 100,location information for the electric bicycle 100, environmentalinformation for the location through which the electric bicycle 100 istraveling, and so on. Further details regarding the types of sensors andthe information captured by the sensors is described herein.

In some embodiments, the selection module 620 is configured and/orprogrammed to apply one or more rules to the received information. Forexample, the selection module 620 can access one or more stored rules orinstructions that set forth processes for determining whether to performa safety action at a given time. The rules or instructions, in somecases, identify an action to perform in response to certain information,or patterns of information, captured by the sensors and provided to thesensor module 610.

For example, the selection module 620 can apply one or more of thefollowing rules to received sensor information:

In some embodiments, the action module 630 is configured and/orprogrammed to select or determine a security action to perform by theelectric bicycle 100 and/or by one or more components (e.g., a horn oralarm, a motor, a controller) of the electric bicycle 100. For example,the action module 630 determines one or more actions based on the rulesapplied by the selection module 620.

Example actions can include: sending an alert to a rider or owner of theelectric bicycle 100, sending an alert to a security service or fleetmanager associated with monitoring the electric bicycle 100, causing theelectric bicycle 100 to initiate an alarm (e.g., an audible or visiblealarm), shutting down one or more components of the electric bicycle 100(e.g., shutting down the battery 110, controller 120, and/or motor 130of the electric bicycle 100), locking one or more components of theelectric bicycle (e.g., causing the lock 140 or 145 to secure the realwheel, locking movement of the fork or front wheel of the electricbicycle 100), and other actions that deter or prevent movement, theft,or tampering of the electric bicycle 100 and/or various components.

As described herein, the systems and methods utilize combinations ofinput data or information when selecting and determining the actions toperform for the electric bicycle 100 and/or its rider/user. Byperforming actions based on certain combinations of data/information,the systems and methods can avoid false alarms or erroneousdeterminations that can occur within conventional systems. In somecases, the bike supported network, which enables communications betweendifferent systems, devices, and/or components, enables actions to beselected and/or determined based on multiple inputs and associated inputcombinations. In doing so, the systems and methods facilitate andprovide an enhanced and robust alert and alarm system that performsactions tailored to theft or tampering events associated with theelectric bicycle 100, among other benefits.

FIG. 7 is a block diagram illustrating various components of amulti-factor alert system 700. The multi-factor alert system 700includes various sensors 710, which capture information about theelectric bicycle 100 and/or components of the electric bicycle 100. Thesensors can be deployed at various positions on the electric bicycle100, including within the controller 120, the security device 140, themotor 130, the battery 110, and various bicycle components or parts(e.g., the frame, the wheels, the tires, the handlebars, the fork, thepedals, and so on).

The sensors 710 can include one or more movement sensors 710A, whichcapture or measure information about the movement of the electricbicycle (e.g., speed, velocity, acceleration, orientation, and so on).For example, the movement sensors 710A can capture information thatindicates the bicycle 100 is moving, the bicycle 100 is not moving, thebicycle 100 is moving at a certain speed or acceleration, the bicycle100 is moving in a vertical direction, and so on.

The sensors 710 can also include one or more tamper sensors 710B, whichcapture or measure information that indicates a component of the bicycle100 has been tampered with or is otherwise inoperable. For example, thetamper sensors 710B can capture information that indicates a wheel hasbeen cut, a tire has been punctured, the lock 145 has been tamperedwith, the battery 110 has been removed or partially removed, and so on.

The sensors 710 can also include one or more location sensors 710C, suchas GPS sensors, which capture or measure a geographical location of thebicycle 100. Further, the sensors 710 can include one or more proximitysensors 710D, which capture or measure information that indicateswhether the electric bicycle 100 is proximate to a paired or associateddevice (e.g., a mobile device of a user, a charger associated with thebicycle 100, a bike rack or other location where the bicycle 100 issecured, and so on). Of course, the sensors 710 can include othersensors configured to capture information about the electric bicycle 100and/or the environment within which the bicycle 100 is located.

The multi-factor alert system 700 includes a decision engine 720, whichis configured to determine and/or select one or more security actions toperform in response to input received from the sensors 710. The decisionengine 720, which can include some or all of the modules of the securityaction system 600 described herein, can utilize multiple inputs from thesensors 710 when selection an action or actions to perform.

Further, the decision engine 720 can utilize information stored in oneor more databases when determining actions. The decision engine 720 canaccess information stored in a fleet database 725, such as informationthat identifies a fleet or group of bicycles associated with theelectric bicycle 100. The fleet database 725 can store information thatidentifies the fleet or owner of the fleet, information that trackslocations of other bicycles within the fleet, and so on.

The decision engine 720 can also access a context database 727, whichstores information associated with a current or predicted context forthe electric bicycle 100. For example, the context database 727 canstore information identifying the rider of the bicycle 100, the owner ofthe bicycle 100, the current route of the bicycle 100, a predicted orknown route for the bicycle 100, a history of locations/routes traveledby the bicycle 100, and so on.

The decision engine 720 also access one or more rules from a rulesdatabase 729. The rules database 729 can include rules to be applied toinput received from the sensors 710 when the decision engine 720determines an action or actions to perform. For example, the rulesdatabase 729 stores some or all of the rules described herein.

In some embodiments, the decision engine 720 and the databases 725, 727,729 (and/or security action system 600) are located within thecontroller 120 and/or lock 145 that acts as a hub for the bike supportednetwork. However, aspects can also reside at various locations remotefrom the bicycle 100, such as at the security system of the remoteserver 310, the fleet management system 330, and/or the mobileapplication 325 depicted in FIG. 3.

Referring back to FIG. 7, the decision engine 720 can select ordetermine one or more actions 730 to perform on behalf of the bicycle100. For example, the decision engine 720 can select or determine analert 730A to send to an owner of the bicycle 100, can select ordetermine a notification or message 730B to send to the owner of thebicycle 100, can select or determine an alarm to be performed by thebicycle 730C, and/or select or determine a disable action 730D, whichcauses one or more components of the bicycle 100 to be disabled and stopoperating.

Thus, the security action system 600 and/or the decision engine 720 ofthe multi-factor alert system 700 perform various processes or methodswhen determining an action or actions to perform. FIG. 8 is a flowdiagram illustrating an example method 800 of presenting a securityaction for an electric bicycle. The method 800 may be performed by thesystem 600 or system 700 and, accordingly, is described herein merely byway of reference thereto. It will be appreciated that the method 800 maybe performed on any suitable hardware.

In operation 810, the system 600 receives input from two or moredistinct or disparate sensors. For example, the system 600 receivesinput from two or more sensors 710. Example input can includeinformation that identifies the bicycle 100 is moving, information thatidentifies the bicycle 100 is within a certain location or geographicalarea, information that identifies a component of the bicycle 100 hasbeen tampered with or is no longer operable, information that identifiesthe bicycle 100 is no longer proximate to an associated device,information that identifies the type of unlocking protocol, and so on.

In operation 820, the system 600 applies one or more rules to the inputreceived from the sensors 710. For example, the system 600 can apply oneor more rules stored in the rules database 729, such as rules thatselect certain actions to be performed. Example rules to be appliedinclude:

If bike is moving, the back wheel is not rotating, and one or morecomponents have sent a tamper signal, cause alarm to be performed;

If wheels are rotating and one or more components have sent a tampersignal, disable operation of motor or controller;

If bike is moving and the back wheel is not rotating, cause alarm to beperformed;

If bike is not moving and one or more components have sent a tampersignal, cause alarm to be performed;

If bike is not moving and bike is not proximate to a paired device, senta notification to the fleet manager; and so on.

Thus, the rules include combinations (e.g., two or more inputs fromsensors 710) that map or relate to one of multiple actions to performfor the bicycle 100.

In operation 830, the system 600 determines the security action toperform for the bicycle 100. For example, after applying one or moreselected rules, the system 600 selects a security action identified bythe rule to be performed.

In operation 840, the system 600 causes an output device to perform thedetermined security action. For example, the system 600 can cause a hornto be initiated, an alarm to be performed, a motor to be disabled, acontroller or battery to be disabled, a message, notification, or alertto be sent, and so on.

In some embodiments, the system 600 or system 700 can determine anaction to perform by actively retrieving or otherwise accessinginformation from the sensors 710 or other bike components in response toan initial received input. FIG. 9 is a flow diagram illustrating anexample method 900 of determining a security action for an electricbicycle using information from various bicycle sensors. The method 900may be performed by the system 600 or system 700 and, accordingly, isdescribed herein merely by way of reference thereto. It will beappreciated that the method 900 may be performed on any suitablehardware.

In operation 910, the system 600 receives an alert or other input from abike sensor, such as one or more sensors 710. For example, the system600 (or system 700) receives a tamper signal from one or more of thetamper sensors 710B, and/or movement information from one or more of themovement sensors 710A.

In operation 920, the system 600 polls additional sensors for statusupdates associated with the electric bicycle 100 and its components. Forexample, the system 600 can poll or otherwise request information fromother sensors 710, such as sensors 710 that measure the movement orlocation of the bicycle 100. In some cases, the system 600 can requestinformation from other components, such as the controller 120, the lock145, the motor 130, the battery 110, and so on.

In operation 930, the system 600 determines a security action to performbased on the information received from the sensors (or othercomponents). For example, the system can select one or more actions 730to perform based on the information retrieved when polling the sensorsand/or bike components.

The following example scenario illustrates selecting a security actionbased on a polling of sensors or bike components. The movement sensor710A measures movement of the back wheel, and sends an alert to thedecision engine 720 that indicates movement of the back wheel. Thedecision engine 720 polls both the location sensor 710C and theproximity sensor 710D for additional information. The decision engine720 receives location information that indicates the bicycle is stillwithin the same geographical location. Based on this information, thedecision engine 720 selects an action to perform that sends anotification to the user of the electric bicycle 100.

The following is another example scenario—the decision engine 720receives the information indicating the movement of the back wheel, andpolls the controller 120 for a status update. The controller 120 sendsinformation indicating that the rider of the bicycle has attempted touse the throttle of the bicycle 100. Based on this information, thedecision engine 720 selects an action to perform that disables operationof the motor 130 of the bicycle 100, and then sends an alert to the userof the bicycle 100.

In some embodiments, the system 600 or system 700 can determine anaction to perform based on a known or predicted context for orassociated with the electric bicycle 100. FIG. 10 is a flow diagramillustrating an example method 1000 of determining a security action foran electric bicycle based on a context associated with the electricbicycle. The method 1000 may be performed by the system 600 or system700 and, accordingly, is described herein merely by way of referencethereto. It will be appreciated that the method 1000 may be performed onany suitable hardware.

In operation 1010, the system 600 receives an alert or other input froma bike sensor, such as one or more sensors 710. For example, the system600 (or system 700) receives a tamper signal from one or more of thetamper sensors 710B, and/or movement information from one or more of themovement sensors 710A.

In operation 1020, the system 600 identifies context informationassociated with the electric bicycle 100. For example, the system 600accesses information stored in the context database 727, such asinformation associated with a location of the bicycle 100. The locationinformation can identify a current geographical location of the bicycle100, a type of location (e.g., city street, bike path, bike rack area,office complex, campus, and so on) where the bike is located, the safetyinformation for the current geographical location of the bicycle 100.

The safety information can indicate a variety of different safetyfactors for the location. Example safety factors include:

a historical safety rating for the location (e.g., 1 to 5, or a binaryrating of “safe” versus “unsafe”);

a current or trending safety rating for the location (e.g., trendingtowards unsafe, or safe over the past month);

whether the location is part of a historical or recent hotspot forthefts or tampering of bicycle or other vehicles;

information identifying specific theft/tampering actions at the location(e.g., more than X locks were cut at the location over the past Y days,or more than X electric bikes were stolen from the location over thepast Y days);

information identifying specific theft/tampering actions at locationsproximate to the location; and so on.

In addition, the context information can indicate the mechanism used tolock the bicycle 100. For example, the user may have locked the bicycle100 via a remote application, via a biometric (e.g., thumbprint or voicecommand) action, via a device paired to the mount 165 of the bicycle165, via a mechanical action, and so on.

In operation 1030, the system 600 determines a security action toperform based on the context information. For example, the system 600can select one or more actions 730 to perform based on applying thecontext information to the alert received from the bike sensor.

As a first example that illustrates the use of context information whendetermining an action to perform, the movement sensor 710A sends analert that the bicycle 100 is moving at a relatively constant speed. Thedecision engine 720 accesses the context database 727 and retrievesinformation that indicates the bicycle 100 is proximate to a charger ata campus location, and causes a notification to be sent to the user ofthe bicycle 100.

As a second example, the decision engine 720 receive the movementinformation and sends a request for context information. The contextinformation indicates the bicycle 100 is in a new location tagged as“high theft.” Based on the context information, the decision engine 720causes an alarm to be sounds at the bicycle, and sends an alert to afleet manager associated with the bicycle 100.

As a third example, the decision engine 720 receives information fromthe tamper sensor 710B that indicates the battery 110 is moving (e.g.,possibly indicating that someone is trying to steal the battery 110).The decision engine 720 determines, based on the context information,that there has been a 200% increase in battery thefts in the area in thepast month, and causes the bicycle 100 to sound an alarm at the bicycle100 (or, in some cases, cause the battery to be inoperable).

As a fourth example, the tamper sensor 710B sends an alert that a wheellock of the bicycle has been mechanically unlocked via a key mechanism.The decision engine 720 accesses the context database 727 and retrievesinformation that indicates the bicycle 100 was locked via a biometricinput (e.g., a thumbprint), and based on a mismatch of lock/unlockmechanisms, sends an alert to the user of the bicycle (and, optionally,sounds an alarm at the bicycle 100).

Thus, the system 600 and/or system 700 can utilize various types ofinformation when selecting and/or determining actions to perform inresponse to possible or detected theft/tampering activities at thebicycle 100. In doing so, the systems 600, 700 seek to determine anaccurate picture of the actual activity at the bicycle 100, in order todetermine which of the various actions to perform.

For example, while the movement of a bicycle can indicate an attemptedtheft of the bicycle, it can also indicate that the bicycle is beingmoved to make room for another bicycle at a bike rack or charger, or isbeing moved for other innocuous purposes. Further, while a tamperingsignal will often indicate someone is trying to steal the bicycle, thebicycle may be accidentally knocked over or bumped into. Thus, thesystems and methods seek to discern nefarious events from theinnocent/accidental events at the bicycle, and perform actionsappropriate to such events, among other benefits.

Examples of Retrofitting a Mechanical Lock

As described herein, in some embodiments, the systems and methods areconfigured to work with conventional mechanical locks, such as wheel orshackle locks that operate to prevent movement of the back wheel of abicycle. For example, the lock 145, which acts as a communication hubfor the electric bicycle 100, can be retrofitted and incorporated into aconventional lock. FIG. 11 is a diagram illustrating a configuration1100 of a lock module 1110 configured to be adapted with a conventionallock, such as the lock 140.

The lock 140 includes mechanical unlock/lock components, such as a keylock mechanism 1125 and a combination lock mechanism 1127. Further, thelock 140 can include a second locking mechanism, such as an integratedcable 1130 lock. Further details regarding the integrated lockingmechanism are found in related U.S. patent application Ser. No.16/875,874, filed on May 15, 2020, entitled BICYCLE SECURITY DEVICES ANDSYSTEM, which is incorporated by reference in its entirety.

The lock module 1110 can connect or otherwise be coupled to the lock 140via a cable 1115 and connector 1117. The lock module 1110, which caninclude the components described herein with respect to lock 145 and/orlock 200, enables operation of the lock 140 via the bike supportednetwork and its various components. Thus, the lock module, connected tothe bike network, enables the lock to be operated (e.g., locked orunlocked) via input received at the associated mobile application 325and/or via the display device 160 or other bike control input devices.

FIG. 12 is a flow diagram illustrating an example method 1200 ofunlocking the conventional lock 140 using the associated lock module1110. The method 1000 may be performed by the lock module 1110 and,accordingly, is described herein merely by way of reference thereto. Itwill be appreciated that the method 1200 may be performed on anysuitable hardware.

In operation 1210, the lock module 1110 receives a lock/unlock requestfrom a user of the bicycle 100. For example, the user can provide inputvia an associated application (e.g., mobile application 325), which ispaired to the lock module 1110 over Bluetooth or other communicationprotocols.

In operation 1220, the lock module 1110 causes the lock 140 to actuate alock/unlock action. For example, via the cable 1115 and connection 1117,the lock module causes a motor within the lock 140 to turn on, rotatingthe shackle or rotating arm to lock or unlock the wheel. As anotherexample, the lock module 1110 can cause a spring or othermechanically-actuated mechanism of the lock 140 to release the shackleor rotating arm to lock or unlock the wheel.

In operation 1230, the lock module 1110 updates a status of the lock 140in a database. For example, the lock module 1110, after performing anaction to lock or unlock the lock 140, causes one or more databases toupdate information associated with a current status (e.g., locked orunlocked) of the lock 140. Such information can be utilized by thevarious systems (e.g., systems 600, 700) when determining securityactions to perform for the bicycle 100.

Thus, in some embodiments, the systems and methods can retrofit existinglocks (e.g., wheel locks) to be part of the bike supported networkand/or to communicate with various remote locking systems and othersecurity systems, among other benefits.

CONCLUSION

Unless the context clearly requires otherwise, throughout thedescription and the claims, the words “comprise,” “comprising,” and thelike are to be construed in an inclusive sense, as opposed to anexclusive or exhaustive sense; that is to say, in the sense of“including, but not limited to.” As used herein, the terms “connected,”“coupled,” or any variant thereof, means any connection or coupling,either direct or indirect, between two or more elements; the coupling ofconnection between the elements can be physical, logical, or acombination thereof. Additionally, the words “herein,” “above,” “below,”and words of similar import, when used in this application, shall referto this application as a whole and not to any particular portions ofthis application. Where the context permits, words in the above DetailedDescription using the singular or plural number may also include theplural or singular number respectively. The word “or”, in reference to alist of two or more items, covers all of the following interpretationsof the word: any of the items in the list, all of the items in the list,and any combination of the items in the list.

The above detailed description of embodiments of the disclosure is notintended to be exhaustive or to limit the teachings to the precise formdisclosed above. While specific embodiments of, and examples for, thedisclosure are described above for illustrative purposes, variousequivalent modifications are possible within the scope of thedisclosure, as those skilled in the relevant art will recognize.

The teachings of the disclosure provided herein can be applied to othersystems, not necessarily the system described above. The elements andacts of the various embodiments described above can be combined toprovide further embodiments.

Any patents and applications and other references noted above, includingany that may be listed in accompanying filing papers, are incorporatedherein by reference. Aspects of the disclosure can be modified, ifnecessary, to employ the systems, functions, and concepts of the variousreferences described above to provide yet further embodiments of thedisclosure.

These and other changes can be made to the disclosure in light of theabove Detailed Description. While the above description describescertain embodiments of the disclosure, and describes the best modecontemplated, no matter how detailed the above appears in text, theteachings can be practiced in many ways. Details of the electric bikeand bike frame may vary considerably in its implementation details,while still being encompassed by the subject matter disclosed herein. Asnoted above, particular terminology used when describing certainfeatures or aspects of the disclosure should not be taken to imply thatthe terminology is being redefined herein to be restricted to anyspecific characteristics, features, or aspects of the disclosure withwhich that terminology is associated. In general, the terms used in thefollowing claims should not be construed to limit the disclosure to thespecific embodiments disclosed in the specification, unless the aboveDetailed Description section explicitly defines such terms. Accordingly,the actual scope of the disclosure encompasses not only the disclosedembodiments, but also all equivalent ways of practicing or implementingthe disclosure under the claims.

From the foregoing, it will be appreciated that specific embodimentshave been described herein for purposes of illustration, but thatvarious modifications may be made without deviating from the spirit andscope of the embodiments. Accordingly, the embodiments are not limitedexcept as by the appended claims.

What is claimed is:
 1. A lock assembly for an electric bicycle, the lockassembly comprising: a lock module that is configured to lock a rearwheel of the electric bicycle; and a communication module thatfacilitates wireless communications between the electric bicycle and acommunications network.
 2. The lock assembly of claim 1, wherein thecommunication module includes: a Bluetooth module that facilitatescommunications between the lock assembly and a mobile device associatedwith the electric bicycle; and an Internet of Things (IoT) module thatfacilitates communications between the lock assembly and one or moreremote servers over the communications network.
 3. The lock assembly ofclaim 1, further comprising: an action module that perform actionsassociated with theft events that include the electric bicycle.
 4. Thelock assembly of claim 1, further comprising: an action module thatmodifies operations of components of the electric bicycle in response totheft events detected at the electric bicycle.
 5. The lock assembly ofclaim 1, further comprising: an action module that causes one or morealarms to be performed in response to theft events detected at theelectric bicycle.
 6. The lock assembly of claim 1, further comprising:an action module that sends one or more alerts over the communicationsnetwork in response to theft events detected at the electric bicycle. 7.The lock assembly of claim 1, further comprising: a housing that securesthe lock assembly to a seat tube of a frame of the electric bicycle andcontains the communication device.
 8. The lock assembly of claim 1,wherein the lock module includes a mechanically-actuated shackle lockthat prevents the rear wheel of the electric bicycle from rotating. 9.The lock assembly of claim 1, wherein the lock module includes anelectronically-actuated shackle lock that prevents the rear wheel of theelectric bicycle from rotating.
 10. The lock assembly of claim 1,wherein the lock module includes an integrated cable lock that isconfigured to fix the electric bicycle to a fixture at a geographicallocation that includes the electric bicycle.
 11. The lock assembly ofclaim 1, wherein the lock module includes an electronic locking modulethat causes an electric motor, a battery park, or a controller tooperate in a locked mode of operation.
 12. The lock assembly of claim 1,wherein the electric bicycle is part of a fleet of electric bicycles,the lock assembly further comprising: a fleet module that communicatesinformation associated with the electric bicycle to a fleet managementserver over the communications network
 13. The lock assembly of claim 1,wherein the communication device includes a transmitter configured toperform cellular communications over the communications network.
 14. Thelock assembly of claim 1, wherein the communication device is configuredto represent the electric bicycle as an Internet of Things (IoT) deviceon the communications network.
 15. The lock assembly of claim 1, whereinthe communication device is adapted to communicate over thecommunications network via an antenna integrated into one or more framecomponents of the electric bicycle.
 16. The lock assembly of claim 1,wherein the communication device includes: a Bluetooth component thatfacilitates Bluetooth protocol communications between the communicationdevice and a controller, a battery pack, or an electric motor of theelectric bicycle; and a wireless component that facilitates WiFiprotocol communications between the communication device and thecommunications network.
 17. The lock assembly of claim 1, wherein thecommunication device includes: a Bluetooth component that facilitatesBluetooth protocol communications between the communication device and acontroller, a battery pack, or an electric motor of the electricbicycle; and a cellular component that facilitates cellular protocolcommunications between the communication device and the communicationsnetwork.
 18. The lock assembly of claim 1, wherein the lock componentincludes an electronic locking module that causes the electric motor,the battery park, or the controller to operate in a locked mode ofoperation.
 19. A modular lock for an electric bicycle, the modular lockcomprising: a lock module that is configured to secure the electricbicycle; a Bluetooth module that facilitates communications between themodular lock and a mobile device associated with the electric bicycle;and an Internet of Things (IoT) module that facilitates communicationsbetween the modular lock and one or more remote servers over a wirelessnetwork.
 20. The modular lock of claim 19, further comprising: an actionmodule that modifies operations of components of the electric bicycle inresponse to theft events detected at the electric bicycle.