HK1248385A1 - Lock for providing redundant channels of access - Google Patents
Lock for providing redundant channels of access Download PDFInfo
- Publication number
- HK1248385A1 HK1248385A1 HK18107463.3A HK18107463A HK1248385A1 HK 1248385 A1 HK1248385 A1 HK 1248385A1 HK 18107463 A HK18107463 A HK 18107463A HK 1248385 A1 HK1248385 A1 HK 1248385A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- lock
- access
- user
- knob
- administrator
- Prior art date
Links
Description
Cross Reference to Related Applications
This application claims priority to U.S. provisional patent application No.62/189,195 filed on day 6/7/2015, which is incorporated herein by reference in its entirety. This application is related to U.S. patent application No.15/060,327 filed on 3/2016 and U.S. patent application No.15/147,759 filed on 5/2016, also incorporated herein by reference in their entirety.
Technical Field
The present invention relates to locks and mobile devices, and more particularly to systems and methods for security locks and access control systems with redundant access channels.
Background
The access control (access control) market continues to advance as biometric or wireless communication technologies are incorporated into lock systems to form what are commonly referred to as electromechanical locks or smart locks. Smart locks can generally be divided into two categories: 1) a cylinder-based smart lock; 2) surface mounted smart locks.
Smart locks of the cylinder type are usually provided with a removable button comprising a wireless reader. These wireless button readers are configured to receive and process wireless signals transmitted by a user device (e.g., such as an RFID-enabled smart card or an RFID-enabled smart phone). These card-based or phone-based wireless devices may then be used as keys to access one or more locks. After processing the wireless signals received from the user device, the wireless button reader typically transmits instructions and information to the electronics in the button or cylinder of the electromechanical lock. If the user has sufficient credentials, the button or key cylinder will then activate another device within the button or key cylinder that allows the user to turn the electric lock by turning the button in a clockwise or counterclockwise direction. The button is rotated to allow a user to engage or disengage the deadbolt of the electromechanical lock. One of the advantages of a cylinder type RFID lock is that it is easy to install, requires no wiring in most cases, and is battery powered, which allows it to operate autonomously for some period of time.
Another type of lock currently available includes surface mounted locks that are controlled by RFID readers, biometric readers, code-based readers, or some combination thereof. Some of these locks also include an embedded wireless communication transceiver that is capable of wireless communication with the owner of the lock. However, these often require complex and invasive installation procedures, such as drilling or cutting a door frame, for example. Thus, removal of such surface mounted locks is as difficult as if installed. Furthermore, surface mounted locks typically rely on batteries as a power source. However, their dependence on the battery makes the lock susceptible to battery exhaustion or failure. While many surface mounted locks have hidden mechanical key override devices in the event of a battery failure, these mechanical key override devices are unsafe because they may be easily bumped, pried or drilled. Once struck, pried or drilled, other redundant security functions intended to enhance the security of the lock (e.g., biometric scanners) may become useless.
Lock cylinder type smart locks with RFID button locks are also susceptible to damage, in part, due to the manner in which they are installed. Indeed, as shown in FIG. 1A, some wireless reader buttons 108 on products available today are typically attached to the electromechanical cylinder 101 by a pivot or metal rod 102. The pivot or metal lever 102 is generally free to rotate when not in use, which prevents an unintended user from breaking or damaging the lock 100. In particular, some electromechanical lock cylinders may become disabled if a harmful intruder simply applies a large amount of rotational force to the push button, thereby allowing the harmful intruder to enter the user's home. With a freely rotating pivot, electromechanical lock cylinders generally do not become ineffective from being subjected to a strong rotational force. As shown in FIG. 1A, pivot 102 is typically a narrow conduit that couples the electronics on button 103 and 105 to the electronics within electromechanical cylinder 106. The command sent to the electromechanical cylinder 101 either engages or disengages the button, which in turn engages or disengages the deadbolt of the cylinder, allowing user access.
In addition, integrated wireless communication capabilities often require the addition of a continuous and reliable power source to the lock. For example, the wireless button shown in FIG. 1A typically has a single power supply 105. To avoid damage, the single power supply 105 is typically disposed inside a button 108 disposed on the inward facing surface of the door. However, these power supplies 105 may lose charge or suffer other unexpected failures. When the power source 105 is exhausted or fails, a user-directed lock operator is typically required to replace the power source or to cut, drill, or even completely destroy the door frame 109. While some lock systems have added an alternative supplemental power source to power the inner button 108 from the outside toward the door surface, these devices are typically located in a room that has been protected by a lock or are not readily available.
There are other disadvantages to using RFID core-type smart locks. Generally, the RFID cylinder type smart lock uses a passive RFID technology, which is known to be vulnerable to hackers or reverse engineering. Moreover, they lack flexibility in the event that a user's device 110 (e.g., their RFID-enabled card or RFID-enabled smart phone) is lost or stolen. In these cases, information relating to the user's RFID-enabled card or RFID-enabled smartphone would have to be physically deleted from the lock's memory. This typically requires a system administrator or locksmith to go to the location of the lock and physically update the memory and any associated electronics in the lock. Because system administrators and locksmiths must repeat this process for each lock, the cost of updating such a system may be significantly increased if a lost or stolen RFID-enabled card is configured to access a large number of locks.
In addition, because these locks typically do not provide alternate redundant access channels for opening the lock, a user may be prevented from visiting a location and being locked out of the door until an alternate RFID enabled card is provided, the RFID enabled lock has been updated, or another person has found credentials with the lock. Also, if a user relying on his smart phone with RFID functionality runs out of phone battery and the handset is turned off, the user may be locked out of the door due to the inability of the RFID functionality to operate.
A large number of users in various countries and groups today still do not own or use smart phones. Therefore, many solutions relying only on smartphones with RFID functionality are not feasible. Some manufacturers have incorporated biometric readers or keypads for entry of access codes into their access control systems to provide solutions for these users who are unable to obtain a smartphone. However, the quality and level of security provided by these alternative access channels may be limited due to size, price, and power limitations of the components used in the biometric reader or code-based solution.
Credentials (e.g., fingerprints or fixed digital passwords) used in association with these alternate access channels may be stored in local memory embedded in the lock. Thus, enrolling a new user typically requires the user to physically go to the location of the lock to enter his or her credentials (e.g., a fingerprint or a fixed digital password), or to transfer his or her credentials via a portable memory device (e.g., a USB flash drive). In either case, the system administrator may be required to physically go to the location of the lock to manually transfer the user's credentials to the lock. If the user no longer needs to be able to access any locks, the lock may need to be re-onsite to be updated to remove the user's credentials and access information from the lock.
Another drawback of these systems is the lack of control to limit access to the lock in time. That is, once the user has been provided access to the lock (e.g., by entering his or her password or fingerprint onto the lock), it is difficult to control when the user may access the lock. Typically, users of these systems can access the lock all the time (7 days, 24 hours). Therefore, most of these devices also do not maintain usage logs of various events or activities that provide usage information of the lock. Thus, the lock owner or system administrator is typically unable to analyze information about when and who attempted to use a particular lock.
While some locks store a log containing usage information, it is typically stored in a memory system located on the lock, and thus may require an administrator to make a field access to the lock to electronically transmit the log. Some manufacturers have enabled locks to wirelessly transmit information to a device, such as a user's smart phone. However, these locks are subject to similar power limitations as the locks described above. In particular, the wireless communication devices in these locks consume a large amount of power when transmitting and receiving data. Thus, a wireless communication device powered by a battery may only last for a limited time before the battery is depleted and exhausted.
Mechanical locks typically do not have a protruding button, and therefore are not as susceptible to the same degree of vandalism, as compared to cylinder type RFID button locks. Moreover, they are not easily affected by the power supply. However, mechanical locks, due to their design, are vulnerable to attack by other tools that may enable an unintended person to gain access to the field by breaking, destroying, drilling or cutting the lock cylinder with various commercially available tools.
To protect the lock from such attacks, some mechanical lock manufacturers provide a protection device against such damage, called a drill-stop lug 111. Anti-drill bosses are typically added to the face of the lock cylinder on the outward facing side of the door. As shown in fig. 1A, the drill-protection projections are typically robust shells made of durable materials that cover portions of the exposed lock cylinder. The anti-drill projections are typically screwed 112 into place from the inside of the door outward, which prevents any disassembly of the system from the outside of the door, but allows disassembly from the inside of the door. The anti-drill protrusions 111 are generally durable enough to withstand a blunt blow with a hammer, a special pliers tear down, and a drill hole that would otherwise damage the mechanical lock. However, it is often impractical to add anti-drill projections to mechanical lock cylinders because they typically have a freely rotating anti-drill protective disc that prevents the lock and key from being used properly. Furthermore, the bur guard is not considered aesthetically pleasing and, therefore, while they provide enhanced safety protection, they are not used frequently.
RFID button locks typically do not have a drill-stop protrusion. Therefore, they cannot resist lateral thrusts, such as the lateral thrust of a weight that can drop the button off the cylinder body. When the button is disengaged from the cylinder body, the lock may be broken and rendered unusable, or the lock may be broken and a user with poor intent may be able to enter the venue.
There are many devices on the market today that use bluetooth technology to enable communication between the lock and the smartphone. However, bluetooth communications may also be vulnerable to hacking because an unintended person may intercept and decode the bluetooth signal transmitted between the phone and the lock.
Accordingly, there is a need for a more secure wireless cylinder-type smart lock solution that can be opened and operated by a card, smart phone, or by other redundant means such as a biometric reader or access code. The solution should also be managed by a smart phone application, mobile device or computer to enable the owner of the lock to control the lock and the user's access rights in real time and wirelessly. Control of access rights should allow the owner of the system to give some users selective permission, for example by providing some users with unrestricted access to the lock and other users with time-limited or single-use access rights. The solution should also be able to withstand various forms of physical damage and vandalism to make it highly safe. The solution should also incorporate redundant power supplies to prevent power failures and not include mechanical override in the event of a power failure.
Disclosure of Invention
In various embodiments, the present invention provides systems, methods, and apparatus for controlling and monitoring access control systems. According to some embodiments of the invention, an access control system includes a smart lock that provides redundant access control. The smart lock includes a storage medium, a power source, a hardware processor, a lock cylinder having a cam that engages the deadbolt, and a button that engages the cam to unlock the deadbolt.
The button includes a plurality of redundant access channels for receiving authentication information. The redundant access channel may include a biometric scanner to receive biometric information, a cryptographic keypad, and/or a wireless transceiver to receive a token from the mobile device and send a response to the mobile device.
The smart lock is configured to verify authentication information received from the password keypad, biometric scanner, and/or mobile device based on a set of rules determined by an administrator, and unlock the deadbolt when the user is authenticated through a first channel of the plurality of redundant access channels. If the user is unable to open the lock through the first channel, the smart lock is enabled to allow access through a second channel of the plurality of redundant access channels. In this way, the user may unlock the lock using the second channel when the user is no longer able to access the smart lock using the first channel.
The access control system may include one or more smart locks. The system may be accessed by a user requesting access to the smart lock and controlled by a supervisor or administrator restricting access to the smart lock. In some embodiments, the user may access and a supervisor or administrator may control access to the smart lock from their respective mobile device in near real-time. Administrators and administrators may use mobile devices to configure rules and access rights that control how and when a user may open a smart lock. In this way, an access control system may be provided that enables supervisors and administrators to control and monitor users in near real time without having to install a hard-wired internet or data connection to the door or lock. Since the lock cylinder is adapted to fit a standard slot, there is no need to modify or readjust the door frame and lock system.
In some aspects of the invention, a supervisor or administrator may configure rules and access rights that limit how a user accesses the smart lock. The access rights specify which locks the user may access, and the configurable rules specify conditions that must be met before the smart lock is opened. The rules allow a supervisor or administrator to restrict the user's access according to location and time. In this way, a supervisor or administrator is enabled to precisely control how the user opens the smart lock.
Each time a user attempts to open the smart lock, both the supervisor and the administrator may request the user for a password or token. When a user submits a request, a supervisor or administrator may receive the request in near real-time and determine whether to grant the user access. The supervisor or administrator may ask the user to provide additional authentication information, such as a password, to ensure the user's identity. If the supervisor or administrator determines to grant the user access, a token or password is sent to the user in near real-time. In some embodiments, the request may be sent based on a triggering event. Thus, a supervisor or administrator can control the access of the user as the case may be.
The password may be fixed or dynamic. Dynamic passwords enable a supervisor or administrator to grant a user single use or limited time access to a lock. The password may be provided wirelessly to the lock from the mobile device or manually entered onto the keypad. Thus, the user may be given access to the lock using the password even if the user's mobile device is unavailable.
In some embodiments of the invention, the wireless transceiver of the smart lock is configured to communicate directly and in near real-time with the mobile device as well as with a network device, a control access server, or an administrator device. The lock may then receive information from the network device, the control access server, or the administrator device indicating approval or denial of user access to the lock.
According to some embodiments of the invention, the smart lock comprises a wireless modem configured to create a cellular broadband connection and communicate with the administrator device or the central access server in near real-time. When the lock receives a token, biometric scan, or password, it may send a request to access the lock according to a set of configuration rules. The lock may then receive instructions from the administrator device or central access server in real time to grant or deny the access request. In this way, the lock may itself establish a connection with the administrator device or the central access server if the user's mobile device is unable to communicate with the administrator device or the central access server. Thus, the lock may communicate with the administrator device or the central access server without relying on the user's mobile device to relay the communication.
In other embodiments of the invention, the smart lock may also be configured to communicate with a network device that relays communications to an administrator device or central access server. The network device may be a wireless receiver, router, repeater or similar device that uses a near field wireless transmitter or wireless LAN to establish a short range wireless connection. Thus, the smart lock may similarly create a connection to communicate with an administrator device or a central access server without relying on the user's mobile device to relay communications.
The smart lock may include an inertial module. The inertia module is configured to determine a door status indicating whether the door has been opened or closed. The lock may similarly be configured to determine a deadbolt state indicating whether the deadbolt is in a locked position or an unlocked position. The lock is capable of communicating the door state and the deadbolt state to an administrator device or a central access server in near real time. Thus, the administrator device or central access server may determine whether the door has been opened, closed, locked, or unlocked.
According to some embodiments of the invention, the button of the smart lock may be removable and rechargeable. The button may include a charging interface that mates with a charging interface of the charging station. When the button is low, the user may remove the button and charge the button with a charging station. In further embodiments of the present invention, the button may include an I/O port that allows a user to power the button from, for example, an external device or a charging station. The I/O port also allows the user to retrieve access information stored on the button. Thus, when the button is charging at the charging station, the recharge button may extract the access information stored on the button through the I/O port. In some embodiments, the charging station is coupled to a network connection that enables it to transmit access information to an administrator device or a central access server.
According to some embodiments of the invention, the lock further comprises a bump protector, and the button forms a bump knob. The rose protector and rose knob protect and conceal the hardware processor, power supply and lock cylinder. The rose protector has an outer wall and an inner wall that form an annular groove for interlocking with the rose knob. The inner wall is formed substantially perpendicular with respect to the door, and the outer wall is formed conically with respect to the door. Due to the conical shape of the outer wall, the annular groove has a gradual thickness decreasing along a plane perpendicular to the door. In this way, the shape of the outer conical wall deflects a strong impact.
The raised knob has an outer surface and an inner surface. The outer and inner surfaces form an annular rim for interlocking with the annular groove of the rose protector, and an opening including a power source, a hardware processor, and a redundant access channel for receiving authentication information. The annular rim has a thickness matching the graduated thickness of the annular groove.
The rose protector has a set of through holes for one or more securing rods and one or more fasteners that secure the rose protector to the door. Thus, when the rim of the rose knob is slidably interlocked with the annular groove of the rose protector, the rose knob is non-removably secured to the rose protector. The raised knob may be freely rotated until valid authentication information is received from a password keypad, biometric scanner, or mobile device, after which the raised knob is configured to actuate the cam to unlock the deadbolt. The bump knob and the bump protector are made of a strong material, such as a stainless steel material, and may have a finished surface that reduces the coefficient of friction of the surface. In this manner, the bump knob and bump protector may be protected from damage and breakage.
Drawings
The objects and features of the present invention can be better understood with reference to the following detailed description and the accompanying drawings.
Fig. 1A and 1B illustrate an exemplary wireless reader button and anti-drill boss configuration.
Fig. 2A, 2B, 2C and 2D illustrate an access control system according to an embodiment of the present invention.
3A, 3B, 3C, 3D, 3E, 3F, 3G, and 3H illustrate a smart lock for an access control system according to an embodiment of the present invention.
FIG. 4 illustrates a smart lock with a rechargeable power source according to an embodiment of the present invention.
FIG. 5 illustrates a process for opening a smart lock according to an embodiment of the present invention.
FIG. 6 illustrates a process for registering a trigger event in an access control system according to an embodiment of the present invention.
FIG. 7 illustrates a process for controlling access to a smart lock in an access control system according to an embodiment of the present invention.
8A, 8B, 8C, 8D, and 8E illustrate interfaces for controlling access to a smart lock in an access control system according to embodiments of the present invention.
9A, 9B, 9C, 9D, 9E, and 9F illustrate interfaces for controlling a smart lock in an access control system according to embodiments of the present invention.
10A, 10B, and 10C illustrate a user interface for accessing a smart lock in an access control system according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention include systems, methods, and apparatus that enable a user to open a lock using redundant access channels and enable a supervisor or administrator to control the user's access in near real-time.
An exemplary access control system is shown in fig. 2A and 2B, which provides redundant channels of access to a user while transmitting usage information in near real-time. The system comprises one or more smart locks 204, a central access server 205 and devices 201, 202 and 203 for accessing and controlling the smart locks. As described in more detail below, the user opens the smart lock 204 through one or more access channels. The supervisor and administrator control how the user accesses the smart lock 204 from either the master device 201 or the administrator device 202. The user may communicate with a supervisor, administrator, and open the smart lock through the user device 203. The user may also manually open the smart lock without the user device 203. The central access server 205 relays and stores information exchanged between users and supervisors or administrators in near real-time. Notably, a "near real-time" communication is a communication that may appear to occur in real-time or substantially in real-time, but that experiences slight, unnoticeable, or insignificant delays due to the network infrastructure. When the user is no longer able to open the smart lock through one of the access channels, for example because the access channel is unavailable or unavailable, the user may open the smart lock through the other available access channels. Thus, the access control system 200 enables a user to open a smart lock using redundant access channels and allows a supervisor or administrator to control the user's access in near real-time.
The supervisor device 201 and the administrator device 202 create and assign rules and access rights to users who want to gain access to one or more smart locks 204. The access rights identify the smart lock 204 that each user is authorized to open. The rules add conditions that must be met before the user is allowed to open the smart lock 204. For example, access rights may be configured by the supervisor device 201 or the administrator device 202 to specify a set of smart locks 204 that a user may open, while rules specify dates and times that the user is allowed to open particular smart locks.
As shown in fig. 2B, the supervisor device 201 and the administrator device 202 are also configured to specify which access channels the user may use to provide authentication information to open the smart lock 204. As explained in more detail below, the access channel may be, for example, scanning biometric information into the biometric scanner 214, entering a password on the keypad 215, or wirelessly sending a token from the mobile device 216. The smart lock may provide any or all combinations of access channels to the user. For example, a first access channel setting for regular use or default use may be the wireless transmission of a token from the user's mobile device 216, and second and third access channels may be a biometric scanner 214 and a password keypad 215, respectively, for use when the first access channel becomes unavailable to the user.
The supervisor device 201, the administrator device 202, or the user device 203 may be a mobile device, a software service, or a software application. The mobile device may be, for example, a smartphone, a tablet computer, or a handheld device. The mobile device includes a touch screen display 207, a storage medium 208, and a processor 209. In some embodiments, the mobile device includes a wireless transceiver 210 for receiving and transmitting RFID, NFC, or bluetooth signals or signals through the mobile device's cellular or internet connection.
The central access server 205 may be a cloud-based server and may be connected to a remote server 206. Remote server 206 may include a call center having an agent for receiving user calls and access requests.
In some embodiments of the invention, the mobile device comprises an NFC element 211, the NFC element 211 may be a SIM or SD card equipped with an NFC transmitter. An SD card with NFC functionality may be placed in an SD card slot of a mobile device to provide NFC communication capabilities for the smartphone. Similarly, an NFC enabled SIM card may be placed in the SIM card slot of the mobile device to provide NFC communication capabilities for the smartphone.
As shown in fig. 2A, individual persons in the access control system may have different roles. For example, the individual may be a supervisor, an administrator, or a user. Administrators can add, delete, and configure administrator or user access rights. Administrators can similarly add, delete, and configure users' access rights. The user is an individual seeking access to a location protected by the smart lock. Individual access rights may be configured for each user or administrator, or access rights may be configured at a more general level for a group of users or administrators. Similarly, a user or administrator may access a particular smart lock or set of smart locks.
For example, in a business setting of an access control system, supervisor device 201 or administrator device 202 may be operated by a supervisor or manager who wishes to control how and when their employees access areas within the enterprise. A business manager may designate a supervisor as an administrator who may further designate a group of employees as users who may access a particular set of smart locks. As another example, in a residential setting, supervisor device 201 or administrator device 202 may be operated by a parent to control access to people entering different areas of their premises and to monitor access information for those people. Parents who designate themselves as supervisors may designate their babysitter as an administrator and their children as users, and which areas of the premises that the babysitter and children may access, and how or when the babysitter and children may access them. As described in more detail below, a supervisor or parent may receive alerts or reports of how and when an employee, caregiver, or child is attempting to access a location controlled by the smart lock 204.
The supervisor or administrator of the access control system uses a set of rules 212 and access rights 213 to configure how the user opens the smart lock. The access rights 213 identify each individual or group of individuals in the access control system and each smart lock or group of smart locks in the access control system. Access rights 213 also associate each individual with a smart lock. Rule set 212 specifies what access channels may be used to open the smart lock, and what conditions, if any, are required to enable an individual to open the smart lock. For example, a parent who designates himself as a supervisor may configure access rights and rules for the nanny so that they can use a password or biometric scan to open the smart lock. The rules may further be configured to have conditions such that the nanny may open the smart lock only on certain days of the week or after each access request is approved by the parent.
The access rights and rules may be stored in the supervisor, administrator, user's mobile device, or in a smart lock or central access server. As explained in more detail below, the supervisor or administrator may create, modify, or delete access rights and rules from supervisor device 201, supervisor device 202, or central access server 205. When a supervisor or administrator creates, modifies, or deletes access rights or rules, the access rights or rules may be communicated to a central access server or the user's mobile device. The user's mobile device may then communicate the access rights or rules to the smart lock as part of the token. When a user attempts to open the smart lock, access rights and rules may be checked from the mobile device or smart lock. For example, if the user provides a password or biometric scan, the smart lock may check access rights and rules to determine if the user is authorized to open the smart lock on a given day or time. As another example, before sending a token to a smart lock, the user's mobile device may check access rights and rules to determine whether the user is authorized to open a particular smart lock. If the user is not authorized, the mobile device will not pass the token to the smart lock. In some embodiments of the invention, the access rights and rules may be checked from the supervisor device 201, the administrator device 202, or the central access server 205.
Smart locks may be installed to protect a particular area or room within a site, thereby enabling a supervisor or administrator to precisely control where individuals may access. For example, in a cell tower, smart locks may be installed on the front doors of facilities, the doors of storage rooms, and the doors of cabinets, where batteries, copper cables, electronics, and other assets, which are often the target of theft, are protected. A business manager (e.g., a supervisor) may then grant certain employees (e.g., users) access to the facility while limiting access to the closet and cabinet doors to a select few employees. As described above, the business manager may further set rules to specify how and what conditions (if any) the employee has access to the smart lock.
As another example, the area within the venue may be, for example, a basement, a backyard, a living room, a front gate, a fitness center, or a garage. Thus, in a residential setting, a parent may have the caregiver access the basement, backyard, or parent's living room only for a certain period of time when the caregiver is attending a child. As described below, the parent may further configure rules to grant the nanny conditional access rights that require the nanny to request permission each time he or she seeks to access the smart lock. The parent may further configure access rights and rules to grant the child access to different areas or rooms in the home and be more restricted. For example, a parent may configure access rights and rules to deny a child access to a room (e.g., a basement) in a house, or to restrict access to an area such as a fitness center during certain times of the day. The parent may further configure rules to specify which access channels the child may use to access the area, such as using the child's fingerprint to access the backyard, for example.
According to some embodiments of the invention, the user opens one or more smart locks 204 by wirelessly communicating 216 from the user's mobile device to the smart lock. By using the wireless capabilities of the user's mobile device, the smart lock 204 can connect to the central access server 205 without requiring a direct connection between the two. In this manner, access to the smart lock 204 may be controlled remotely without the need to implement a hardwired system on the door frame or lock.
As described above, the smart lock 204 may be opened by wirelessly transmitting a token from the user's mobile device to the smart lock 204. The token contains a password comprising letters, numbers, symbols, or any combination thereof. As discussed in more detail below, the password may be dynamic or fixed. The smart lock 204 authenticates the token based on access rights and rules determined by a supervisor or administrator and by comparing the received password to a password generated by a process stored in the smart lock 204. If the received password matches the password generated by the process, the smart lock 204 will accept the token. The smart lock 204 communicates to the user's mobile device 203 whether the token has been authenticated and whether the token matches a stored process-generated token based on the access rights and rules. This information may then be sent from the user mobile device 203 to the central access server 205 where it may be relayed as a notification or alert to the supervisor device 201 or administrator device 202.
The supervisor device 201 and the administrator device 202 are configured to specify whether the user can access the smart lock 204, and what access rights the user has, using the wireless capabilities of the user's mobile device. For example, the supervisor device 201 and the administrator device 202 may specify whether the user's access rights to a particular smart lock 204 or group of smart locks 204 are fixed or conditional.
Conditional access rights allow a supervisor or administrator to approve each time a user attempts to open the smart lock 204. For example, when a user with conditional access rights attempts to access the smart lock 204 or group of smart locks 204, the system will alert the supervisor device 201 or administrator device 202 that the user 203 is seeking access to the smart lock 204 and request in near real time that the supervisor device 201 or administrator device 202 grant the user access to the smart lock 204. The user may then determine whether to grant or deny the user access. The determination may be based on additional conditions or verification steps. For example, a supervisor or administrator may request that the user provide identifying information, such as an additional secret, for example, that proves the user's identity or authenticity. As another example, a supervisor of an administrator may deny the user access because the user does not intend to access a particular smart lock 204 or intend to be able to access at a particular date or time. As described in more detail below, if the supervisor or administrator determines that the user should be granted access to the smart lock 204, the supervisor device 201 or administrator device 202 may then provide the user with a token. If the supervisor or administrator determines that the user should be denied access to the smart lock 204, the supervisor device 201 or administrator device 202 does not provide a token to the user, and the user will not be able to open the smart lock 204. In this way, the supervisor device 201 or the administrator device 202 may allow or deny access to the smart lock 204 in near real-time. In some embodiments, when the supervisor or administrator determines whether to grant or deny the user access, the supervisor device 201 or administrator device 202 sends an alert to the user to notify the user that their access request has been granted or denied.
The fixed access rights allow the user to gain access to the smart lock 204 without first receiving approval from the supervisor device 201 or the administrator device 202. For example, a user may be granted fixed access rights to open a particular smart lock 204 without restriction. For example, such fixed access may be provided with a fixed password that a user may enter on a keypad of the smart lock 204, for example. The user may then open the smart lock 204 with the fixed password without first requesting approval from the supervisor device 201 or the administrator device 202. In some embodiments, when a user with fixed access rights has accessed or attempted to access the smart lock 204, the user's mobile device 203 may still notify the supervisor device 201 or the administrator device 202. For example, after the user enters a fixed password on the smart lock's keypad, the smart lock may communicate to the user's mobile device that it received a valid fixed password and unlocked the smart lock. The user's mobile device may then notify the supervisor device 201, administrator device 202, or central access server 205 in near real-time that the user accessed the smart lock 204 and unlocked the smart lock 204.
The supervisor device 201 and the administrator device 202 may also be used to allow a user to open one or more smart locks 204 by entering a password on a keypad 215 or by biometric scanning 214. These access channels enable the user to access the smart lock 204 without using the mobile device because, as described in more detail below, a password may be entered manually by the user or a biometric scan may be performed. In this way, a user may gain access to the smart lock 204 in the event that the user does not have a mobile device, or their mobile device is lost, damaged, or otherwise unable to wirelessly send a token to the smart lock 204. Thus, according to some embodiments of the present invention, a keypad or biometric scan for entering a password serves as a redundant access channel providing the user access to the smart lock 204. In other embodiments of the present invention, a keypad or biometric scan for entering a password may be used as the primary or default access channel, and wireless communication from the user's mobile device to the smart lock 204 may be used as the redundant access channel. In still other embodiments of the present invention, users may need to authenticate themselves using a combination of alternative access channels. For example, a user may need to provide a combination of a dynamic password and a fingerprint before being granted access to a lock.
As described above, the token may include a password that may be wirelessly transmitted from the user's mobile device 203 to the smart lock 204. As described in more detail below, the password may also be displayed on the user device so that the user may manually enter it into the keypad of the smart lock 204. The smart lock 204 authenticates the fixed password by comparing the entered password with a process-generated password stored on the smart lock 204. If the process generates a matching password, the smart lock 204 will grant the user access.
In some embodiments of the invention, the password may be a dynamic password generated by a Code Generation System (CGS). A dynamic password is a unique, single-use, time-limited, or one-time password generated by the central access server upon request. The password is based in part on the time at which the password was requested.
According to some embodiments of the present invention, the generation of the password provided to the user is based on unique information about the user's mobile device and the time at which the password was requested or is being generated. For mobile devices, the password may be based on, for example, the international mobile equipment identity ("IMEI"), the network ID of the mobile device, or a combination of the two, and the time at which the request was sent from the mobile device.
Alternatively, the password may be fixed. The fixed password does not change or expire, can be used multiple times, and can be obtained without a request from a supervisor or administrator. A supervisor or administrator who wishes to prevent the fixed password from being compromised may need to use the fixed password in conjunction with other information or biometric scans.
The user may request a dynamic or fixed password by contacting a supervisor or administrator. For example, the user's mobile device 203 may include a mobile application that allows the user to send a request for a password to the supervisor device 201, the administrator device 202, or the central access server 205 through the mobile device's cellular data, WiFi, or NFC/bluetooth connection. As another example, a user may submit a request by making a voice call from the user's mobile device or sending a text message to a supervisor, administrator, or central access server agent. In this way, the user may send a request even when the mobile device is not able to connect to the internet, or is not equipped with a data or internet connection.
In some embodiments of the invention, the smart lock 204 may be opened by providing a biometric scan of the user. As described in more detail below, the smart lock 204 includes a storage medium 301, and the storage medium 301 may store biometric data for each user that is granted access to the lock. The biometric data may include, for example, a fingerprint of each user. When the user receives the biometric scan, the smart lock 204 compares the scan to the biometric data stored at the smart lock 204. If the scanned and stored biometric data match, the smart lock will grant the user access. When a biometric scanner is used as a redundant access channel, the user may provide a biometric scan, for example, if the user does not have a mobile device or loses his or her mobile device and cannot obtain a token or password.
Fig. 2C illustrates that the smart lock 204 is coupled to the supervisor device 201, the administrator device 202, or the central access server 206, thereby bypassing the mobile device, in accordance with some embodiments of the present invention. For example, the smart lock 204 may be coupled to a network device 217, the network device 217 relaying communications to the supervisor device 201, the administrator device 202, or the central access server 206. Network device 217 may be, for example, a wireless receiver, router, repeater, or similar device. As another example, as described in more detail below, the smart lock 204 may bi-directionally communicate directly with the supervisor device 201, the administrator device 202, or the central access server 206 via a cellular broadband connection.
In a configuration where the smart lock 204 communicates with the network device 217 as shown in fig. 2C, the smart lock 204 may establish a short-range wireless connection using a near-field wireless transmitter or a wireless LAN. The connection may be established using, for example, bluetooth, NFC, ZigBee or similar short range wireless network technology. For example, network device 217 may be a wireless repeater, expander, or router located in a home and communicating with the smart lock using bluetooth. The network device 217 may then be coupled to a supervisor device, an administrator device, or a central access server using a network connection, such as the internet, an ethernet, or similar connection. Network device 217 may then relay communications from the smart lock to a supervisor device, an administrator device, or a central access server in near real-time. Thus, the smart lock is able to communicate with a supervisor device, an administrator device, or a central access server in near real time, even when the user's smart phone or mobile device is stolen or inoperable.
As shown in FIG. 2D, in some embodiments of the invention, the smart lock may include a wireless transmitter that communicates directly with a central server or administrator. For example, the smart lock 204 may include a cellular broadband or wide area network connection that enables the button to communicate directly with the supervisor device 201, the administrator device 202, or the central access server 206. The lock may include a wireless modem for creating a cellular broadband connection and communicating information in near real-time. For example, the modem may be an Intel XMM 62553G modem embedded on a chipset in the lock. In other embodiments, the modem may be a USB dongle, data card, or similar device for providing access to a cellular network and may be coupled to the lock through an I/O port as described in more detail below. The cellular network may be, for example, a GSM | GPRSEGE, UMTS, HSDPA, HSPA, HSPA +, CDMA, LTE or similar cellular network.
Enabling the smart lock to communicate with a supervisor device, an administrator device, or a central access server provides additional control over the user accessing the smart lock. For example, the smart lock may be configured to send a request to a supervisor device or an administrator device for approval each time a user attempts to gain access to the smart lock. Thus, even if the user attempts to gain access using a password or biometric scan, a supervisor or administrator may approve each access request.
As another example, the smart lock may use a connection with a supervisor device, an administrator device, or a central access server to verify that the user is authorized to open the smart lock. In particular, after receiving the authentication information, the smart lock may communicate with a supervisor device, an administrator device, or a central access server, which checks a set of configurable rules to verify that the user is authorized to access the smart lock.
In another aspect of the invention, the supervisor device, administrator device, or central access server may communicate instructions to the smart lock to perform certain functions or processes. For example, if the central access server determines that the deadbolt of the smart lock is unlocked, the central server may instruct the smart lock to lock the deadbolt. In this way, if the administrator or user leaves home without remembering whether he or she locked the door, the administrator or user can confirm whether the door was not locked, and if not, the door will be locked remotely. In other embodiments, the supervisor device, administrator device, or central access server may communicate instructions to the smart lock to block information received from certain devices or biometrics received from certain users. For example, if a user's mobile device has been reported lost or stolen, a supervisor device, administrator device, or central access server may instruct the smart lock to block any communications it receives from that particular mobile device. Similarly, a supervisor device, administrator device, or central access server may send an instruction to the smart lock that no longer allows a particular user to unlock the smart lock using their biometric scan, and report any such biometric scans that it receives from that user.
According to some embodiments of the invention, the button comprises an inertial module for detecting and measuring the movement and position of the door. The inertial module may include a combination of sensors for detecting and measuring motion and/or position, such as, for example, MEMS-based accelerometers, gyroscopes, and/or magnetometers. The MEMS-based accelerometer may be a 1-axis, 2-axis, or 3-axis accelerometer, and the measurements may include, for example, velocity and acceleration of the door in these axes. The measurements provided by the accelerometer may be filtered and analyzed to determine if the movement is associated with the opening or closing of the door. Other sensors that may be used may include magnetic sensors, such as magnetic switches, that produce measurements in response to changes in magnetic field. Potentiometers may also be used to generate signals corresponding to the angular movement and position of the hinges of the doorframe. Other embodiments may include optical or ultrasonic sensors that measure the reflection of light or sound waves when the door is opened or closed.
The measurements made by the sensors of the inertial module are used to track the change in position and the movement of the door so that the button can determine whether the door is open or closed. In some embodiments, the button may determine whether the door is open or closed by comparing the sensor measurements to known acceleration and/or motion profiles associated with the opening and closing of the door. For example, the motion of a closed door can be characterized by a change in its acceleration; the button may determine that the door is closed if the acceleration increases sharply (i.e., the user pushes the door) followed by a sharp decrease (i.e., the door contacts the doorframe and closes). As another example, the motion of a closed door may be characterized by its speed; if the speed or acceleration reaches a maximum threshold, it may be determined that the door has reached a rate or speed at which it will eventually close. Similarly, if the speed or acceleration of the door never reaches the minimum threshold, it may be determined that the door is not being pushed with sufficient closing force. The button may be configured to record the number of times the door is opened or closed. For example, the button may record when the door is opened or closed by keeping a log in the storage medium of the smart lock.
In other aspects of the invention, these sensors may be used to detect whether the deadbolt of the lock cylinder has been rotated, thereby indicating to a user whether the door has been locked or unlocked. For example, an accelerometer may be used to detect rotation of a button that extends a deadbolt into a door mortise. The button may also be configured to record when the cam has been engaged to lock or unlock the deadbolt. In some embodiments of the invention, the button may include a locked or unlocked state of the deadbolt to confirm whether the door is open or closed. For example, if the button detects that the door is closed, the button may confirm that the door is closed by determining whether the latch bolt changes from the unlocked state to the locked state (which indicates that the door is closed and locked).
In some embodiments of the invention, the button communicates to the network device, administrator device, supervisor device, or central access server whether the door is open, closed, locked, or unlocked. In this way, a user can remotely determine whether their door is open or closed.
Fig. 3A and 3B illustrate smart locks according to some embodiments of the invention. The smart lock includes a storage medium 301, a power source 302, a hardware processor 303, a key cylinder 304, and a button 305. The smart lock may also include a wireless transceiver 306, a password keypad 307, and a biometric scanner 308. The lock cylinder includes a cam 309 that engages a latch bolt (not shown). The user provides authentication information to the smart lock, which is verified by the hardware processor 303 and the storage medium 301. The authentication information may be, for example, a scanned fingerprint of the user, a password entered on a keypad, or a token wirelessly transmitted from the user's device. When the smart lock verifies the authentication information, the button 305 engages the cam 305, thus unlocking the deadbolt. The storage medium 301 stores information and data used to verify authentication information, to keep a log of access events and smart lock usage, and to identify the smart lock. For example, the storage medium may store resume introduction data for users authorized to open the lock or a unique identification number identifying the smart lock.
The hardware processor 303 is configured to verify the authentication information received from the access channel based on the access rights and rules determined by the supervisor or administrator. When the user is authenticated through the access channel, the hardware processor may unlock the deadbolt. In one aspect of the invention, when the first redundant access channel becomes unavailable to the user, the hardware processor 303 is configured to allow access through the second redundant access channel to unlock the deadbolt.
In some embodiments, the smart lock includes a wireless transceiver 306 for receiving and transmitting RFID, NFC, or bluetooth signals to the user's mobile device. As described above, the user may wirelessly send the token to the smart lock 204. When the wireless transceiver 306 receives the token, the smart lock validates the token as described above. The wireless transceiver may also transmit the access information to the user's mobile device. The access information provides detailed information about the access event, such as which users accessed the smart lock, and the access time. The access information may be stored in the storage medium 301 of the smart lock. The access information is stored at the smart lock until the mobile device accesses the lock, at which time the smart lock will send the access information to the user's mobile device. The mobile device will then transmit the access information to the central access server. When the user's mobile device is stolen or unable to receive wireless communications, the smart lock will wait until the next capable mobile device attempts to access the smart lock.
The smart lock cylinder 304 is adapted to fit a standard profile slot. In some embodiments of the present invention, the key cylinder 304 of the smart lock is a european profile (or "european german industry standard (Euro DIN)") design. In other embodiments, the lock cylinder may be oval, circular, scandinavia, japanese, european union or scherzeiger (Schlage) type profiles. Whereas a european profile lock cylinder typically includes a rotatable knob inside the door to engage or disengage the deadbolt, smart locks instead have a freely rotating button 305. The freely rotatable button 305 may be rotated several times about its axis, in contrast to a knob which is typically rotated a half or quarter turn to engage or disengage the deadbolt. As explained in more detail below, the rotating freely rotating button 305 generates rotational energy that can be used to power and recharge the power source 30 within the lock for several days.
When the user's authentication information has been verified, the smart lock is enabled to engage the deadbolt. Specifically, the button 305 may be pushed inward, thereby activating the clutch that engages the cam 309. As the user continues to turn the button 305, the cam 309 moves the deadbolt from the locked position to the unlocked position. The user will not be able to open the smart lock until the user is authorized to access the location (e.g., by wirelessly transmitting a token, providing a biometric scan, or entering a password on a keypad). The button is free to rotate, but does not engage the cam, until the user is authorized.
As shown in fig. 3A, the button is disposed at an outward facing end of the lock cylinder. In one aspect of the invention, the smart lock uses a single button, which enables the smart lock to accommodate different sizes or lock formats. For example, the freely rotatable button 305 may also be applicable to single-entry locks, button-entry locks, double-entry locks, and padlocks. For example, the padlock may include only a free-wheeling button, without an internal knob.
Figure 3B illustrates a front view of a lock cylinder according to some embodiments of the present invention. The buttons may include several access channels, such as a password keypad 307 and a biometric scanner 308, and the password keypad 307 and biometric scanner 308 may be hidden by the cover 310. In the event that a user cannot wirelessly send a token using their mobile device to unlock the door (e.g., the user's mobile device is stolen or the device's battery has been depleted), the user may gain access by entering a password using a numeric keypad or by using a biometric scanner. When the cover 310 is in the closed position, the cover 310 hides the keypad 307 from view.
As shown in fig. 3C, according to some embodiments of the present invention, the smart lock includes a knob or second button 311 disposed at an opposite, inward-facing end of the lock cylinder 304. As explained in more detail below, the outer button 305 may have a longer radius and a greater thickness than the inner button 311, which may reduce the force or speed required to rotate the button and charge its internal power source. In embodiments where the smart lock includes an internal button 311, the internal button 311 may engage or disengage the deadbolt without the need to provide authentication information to the smart lock or request access from a supervisor or administrator. Thus, the user can lock or unlock the door at any time to exit from the inside of the venue.
According to some embodiments of the invention, as shown in fig. 3E, the lock may include a bump protector 317 and the button may form a bump knob 318. Raised knobs 318 protect and hide the mechanical and electrical components inside the smart lock, such as, for example, the hardware processor, power supply, and lock cylinder. Similarly, the rose protector 317 protects and conceals the mechanical and electrical components inside the lock, such as, for example, the hardware processor, power supply, and lock cylinder. The bump protector 317 and bump knob 318 together enclose the internal mechanical and electronic components so that these components are completely protected from damage or attack. For example, as described above, a brute force impact on the pivot would severely damage or break the internal components of the lock, the rose protector 317 and rose knob 318 blocking and preventing such vandalism. Similarly, the rose protector 317 and rose knob 318 integrally conceal the lock cylinder to prevent someone from picking the lock.
As shown in FIG. 3F, the rose protector 317 has an outer wall 319 and an inner wall 320, the outer wall 319 and the inner wall 320 forming an annular groove 321 for interlocking with the rose knob 318. The inner wall 320 extends generally perpendicularly relative to the door 322. The outer wall 319 is formed to have a conical shape with an axis extending substantially perpendicularly with respect to the door 322. Due to the conical shape of the outer wall 319, the annular groove 321 has a gradual thickness decreasing along a plane perpendicular to the door. In this way, the shape of the external conical wall deflects a strong force exerted on the bump protectors 317. For example, a person striking the bump protector 317 with a hammer will not be able to strike the bump protector 317 flush with the head of the hammer due to the curvature and angle of the conically curved surface of the bump protector 317.
The raised knob 318 may have an outer surface 323 and an inner surface 324. The outer surface 323 and the inner surface 324 may form an annular rim 325. The annular rim 325 is formed to have a thickness that matches the tapered thickness of the annular groove 321 so that the annular rim 325 can interlock with the annular groove 321 of the rose protector 317. The outer surface 323 and the inner surface 324 also form an opening 326. Internal mechanical and electrical components, such as, for example, a power supply, a hardware processor, or redundant access channels for receiving authentication information (e.g., a biometric scanner, a password keypad, or a wireless transceiver), may be disposed in the opening 326.
The bump knob is slidingly fitted within the annular groove 321 of the bump protector 317, allowing the bump knob 318 to rotate freely about its central axis. According to some embodiments of the present invention, the raised knob 318 may be freely rotated until valid authentication information is received from a password keypad, biometric scanner, or mobile device. As described below, when valid authentication information has been provided, the raised knob is configured to actuate the cam to unlock the deadbolt. Further, as described in more detail below, when the user is unable to open the lock through the first channel, the hardware processor is configured to allow access through the second channel. In this way, a person cannot attempt to break the lock by applying a violent rotational force. That is, while some locks may be broken by twisting the button with more than a certain amount of rotational force, the protruding knob 318 may rotate freely until the user provides valid access information.
In some embodiments of the present invention, the raised knob has a frustum 336. Both the biometric scanner 308 for receiving biometric information and the password keypad 307 may be disposed on the frustum 336. The biometric scanner 308 may be placed in the center of the frustum 336 and the keys of the keypad 307 may be placed around the biometric scanner 308. In this manner, the lock may provide multiple access channels to the user simultaneously.
As shown in FIG. 3G, the rose protector 317 may have a set of through holes 327 for one or more retaining rods 328 and one or more fasteners 329 used to secure the rose protector to the door. Thus, when the annular rim 325 of the rose knob 318 slidably interlocks with the annular groove 321 of the rose protector 317, the rose knob 318 is non-removably secured to the rose protector 317.
In some embodiments of the invention, the lock cylinder may be a double-opening lock cylinder that allows double-button or double-key access on each side. This allows for an embodiment, as shown in FIG. 3H, where the first bump guard 330 and the first bump knob 331 are disposed on one side of the door 332, while the second bump guard 333 and the second bump knob 334 are disposed on the opposite side of the door 323. In some embodiments of the present invention, electrical and mechanical components (e.g., such as a hardware processor and power source) may be disposed in the openings formed by the first and second raised knobs 331 and 334. In other embodiments of the invention, a single set of electrical and mechanical components is shared by the two raised knobs, but is disposed on one side of the door. For example, in some embodiments, there may be a single hardware processor or power source disposed in the raised knob 334, but which is also coupled to the raised knob 331. Preferably, the raised knob having a single set of electrical and mechanical components is a raised knob disposed on the inside of the door 332. Thus, if someone attempts to break or damage the external raised knobs, the electrical and mechanical components will remain hidden and protected inside the door.
In some embodiments of the present invention, the second protrusion protector 333 may be secured to the first protrusion protector 331 by one or more securing bars and one or more fasteners 335. One or more fasteners may be inserted from the side of the door of the second protrusion protector 333. In this way, the one or more fasteners 335 are completely hidden from the other side of the door and inaccessible. Thus, the first protrusion protector 331 cannot be removed until the second protrusion protector 333 has been unfastened and removed.
In some aspects of the present invention, the bump knob 318 and bump protector 317 are constructed of a strong material, such as stainless steel, for example. In this manner, the bump knob 318 and bump protector 317 may be subjected to a large amount of force. In some embodiments of the present invention, the surfaces of the rose knob 318 and rose protector 317 may be finished with a finishing process. For example, the bump knob 318 and bump protector 317 may be finished with ultrasonic polishing, magnetic polishing, sand blasting, tumbling, electroplating, chemical coating, hot dipping, buffing, sanding, grinding, or buffing processes. As mentioned above, this helps to prevent someone from breaking or damaging the lock by attempting to apply an excessive rotational force. According to some embodiments of the present invention, a finishing process or coating is applied to the surface to smooth the surface and significantly reduce the coefficient of friction of the raised knob. For example, the finishing process or coating may reduce the coefficient of friction of the steel from 0.8 to 0.16, or to 0.04. The reduced coefficient of friction thereby prevents someone from applying damaging rotational forces to the raised knob.
Although described with respect to an electromechanical lock, according to further embodiments of the present invention, the button, raised protection 317 and raised knob 318 are adapted to enclose various types, shapes and sizes of smart locks, such as, for example, a mechanical cylinder lock or padlock. For example, the rose protector 317 and rose knob 318 may be added to the cylinder of a padlock in the same manner as described above for a single-throw cylinder lock. As another example, the button, the rose knob and the rose protector may conform to a standard profile design, such as a european profile design (sometimes also referred to as a european german industry standard lock cylinder), an oval, a circle, scandinavia, japanese, european union or sierra type profile. In one aspect and advantage of the present invention, the rose protector 317 and rose knob 318 are modular and can be retrofitted to the standard and/or pre-existing profile of a mechanical lock or padlock cylinder without the addition of wires or other components. Thus, existing locks or padlocks can be upgraded using buttons, raised knobs, and raised protectors without the need to reassemble the door frame, padlock shackle, or padlock body. In this manner, the present invention can transform virtually any key-type padlock or existing mechanical lock into a smart keyless button-type padlock or lock system (e.g., by adding buttons, raised protectors, and raised knobs to the lock cylinder consistent with embodiments of the present invention).
According to some aspects of the present invention, the raised knob 318 also includes a release mechanism that allows the raised knob 318 to be pressed inward for further rotational movement. The release mechanism may be, for example, one or more movable pins or pegs mounted inside the button. As described above, the raised knob 318 may be freely rotated until the user provides valid authentication information, thereby actuating the release mechanism. Thus, until the user is authenticated, the pin or peg may not be placed in a blocking position that prevents the raised knob 318 from being pushed inward. Once the user is authenticated, the pin or peg moves from its blocking position, allowing the raised knob 318 to be pushed inward. Once pushed inward, the raised knob 318 may engage the deadbolt or latch of the lock cylinder. Further rotation of the raised knob 318 may then cause the plug latch to open or close.
According to some embodiments of the present invention, the knob 318 actuates the cam for a first series of rotations, and after the first series of rotations, it can actuate the latch of the lock cylinder. In this manner, the raised knob 318 may also be used as a door handle and to open and close the latch bolt. For example, a first series of rotations may be used to engage or disengage the deadbolt. A second series of rotations can then be used to open the unlocked latch or, if a european german industry standard lock cylinder is used, the rotations will lock or unlock the lock cylinder.
The rotational movement of the raised knob 318 may also be used as a code mechanism in a manner similar to the manner in which a rotary number lock is used to open a combination safe, according to some embodiments of the present invention. The raised knob may include a display having indicia with numbers or letters. The display may then be used to associate the rotational movement of the raised knob 318 with displaying a number or letter. Thus, the user can provide a dynamic or fixed code to unlock the lock by rotating the knob according to and with reference to the indicia to achieve the desired combination. The hardware processor may then be configured to verify the authentication information based on the rotational movement of the raised knob by associating the rotational movement of the raised knob with the displayed numbers and letters. The hardware processor may then determine the password corresponding to the rotational movement and then electronically verify the password as described above and below.
Figure 3D illustrates that the button is removable from the lock cylinder in some embodiments of the invention. The detachable button may include a charging interface 313 and an input/output port ("I/O port") 314. The power source 302 may be a rechargeable power source, such as, for example, a capacitor bank, a rechargeable battery, or the like. The button may also include an energy harvesting element 316, as described in more detail below. By removing the button from the key cylinder, the user can bring the button to a charging station 315, where its charge can be restored. The charging station 315 may be coupled to a power outlet where charge may be transferred to the rechargeable power source 302 through the recharging interface 313. The recharging interface 313 may be, for example, a wire, a plug, or one or more contact pins for receiving current from a charging station 315 having a mating interface. When the recharging interface is coupled to a charging station 315 having a matching cord, plug, or contact pin configuration, the charging station 315 provides power to the button. The rechargeable power source 302 stores the charge received from the charging station 315.
The button may also be charged through the I/O port 314. The I/O port 314 may be, for example, USB, firewire, Thunderbolt (Thunderbolt), e-SATA, Ethernet, or similar port for transmitting power and/or data. In some embodiments of the present invention, the I/O port 314 may receive power from an external device (e.g., a portable battery charger) having a matching interface capable of transferring charge. For example, the external device may be a battery pack having a USB connection. In still other embodiments of the invention, the I/O port 314 may receive power from a charging station 315 having a matching port interface. The charging station 315 may transmit power from the power outlet to the button's power supply 302 through the I/O port 314.
The charging station 315 may be coupled to the supervisor device 201, the administrator device 202, or the central access server 206. For example, the charging station 315 may include an ethernet port or WiFi transmitter for establishing an internet connection and communicating with the supervisor device 201, the administrator device 202, or the central access server 206. When connected to the I/O port 314, the charging station 315 can retrieve data stored in the storage medium 301. As described above, such data may include, for example, information and data used to verify authentication information, to maintain access information (e.g., logs of access events and smart lock usage), and to identify the smart lock. The charging station 315 may then transmit the data extracted from the storage medium 301 to the supervisor device 201, the administrator device 202, or the central access server 206. Thus, when the button is charging, it may transmit access information to other devices or a central access server.
According to some embodiments of the invention, the I/O port may be used to connect the smart lock to a wireless modem. For example, a USB dongle, data card, or similar device for providing access to a cellular network may be inserted into the I/O port to enable the smart lock to communicate with an administrator device, or a central access server over a cellular broadband connection.
In some embodiments of the invention, a valid credential is required to release the button from the lock cylinder. For example, the button may only be removed if a valid password or biometric scan is received. In this way, when the button is disposed on the exterior surface of the door, the button cannot be stolen or removed by a thief or harmful vandals. In other embodiments, the button may be configured to be removed from the lock cylinder without the need to provide credentials. For example, when the button is disposed on the inner surface of the door facing the inside of the house, the button can be removed at any time.
According to some embodiments of the present invention, as shown in fig. 3H, the smart lock includes a button disposed on an inner surface of the door and a button disposed on an outer surface of the door. In such a configuration, the buttons disposed on the inner surface of the door may be removable and rechargeable, while the buttons disposed on the outer surface of the door are neither removable nor rechargeable. The external buttons thus draw power from the power source of the internally facing buttons. In this way, an energy efficient dual button smart lock with external buttons that are resistant to external damage may be provided.
As explained above, the token transmitted by the mobile device may contain a password, such as a single-use dynamic password. In one aspect of the invention, the password may be automatically generated from the mobile device and transmitted from the mobile device, thereby eliminating the need for interaction with the user. In particular, the user's mobile device may determine or detect that it is located near the smart lock. For example, using the location-based capabilities of the mobile device, the mobile device may determine that the user is approaching a location. In some embodiments, this determination may be aided by analyzing past user patterns and inferring that the user is returning home from work and is opening the way of their home door. The mobile device may instead make this determination by using its NFC/bluetooth or wireless capabilities. After detecting the lock, the mobile device may identify the lock and the location secured with the lock. The mobile device may then automatically transmit this information to the central access server to determine whether the user is allowed access to the smart lock. If the user satisfies all conditions for accessing the lock (e.g., the user is allowed to access the lock at a particular time and date), the access control system will generate a dynamic password. The dynamic password may be generated at the supervisor device, the administrator device, or the central access server and then sent to the mobile device, or alternatively, it may be generated by a mobile application on the user's mobile device. The mobile device may then transmit the password to the smart lock, which verifies the password using a process stored in the lock. Once the password is verified, the user may push the button inward and engage or disengage the deadbolt using the clutch system. If the user is not allowed to open the lock, the administrator will be notified that an unauthorized user is attempting to open the lock.
According to some embodiments of the present invention, the buttons include a light indicator 312 that changes color based on the mode of operation. For example, if the authentication information has been accepted, green light is emitted; if the authentication information is rejected, red light is emitted; in standby mode, it emits blue light.
As described above, the smart lock is powered by the power supply 302. In some embodiments of the present invention, as shown in FIG. 4, the button includes a redundant power source. The redundant power supplies may be used to power the storage medium, the wireless transceiver, and the illuminated indicator in the event of a failure of one of the power supplies. For example, the redundant power source may be a capacitor or a bank of batteries 401 located inside the button. When the charge of the battery or capacitor is low, the button may transmit this information to the next mobile device accessing the lock. The mobile device may then communicate this information to a supervisor or administrator. Alternatively, a color indicator may be used to communicate a low charge or battery level.
In other embodiments, the button has a set of capacitors 401 that are charged by rotational movement of the button. The energy stored by the rotational motion is sufficient to last several days and provide a convenient, reliable and redundant power source if another power source (e.g., a battery) fails. The button is free to rotate about its central axis, generating a high level of kinetic energy. The button may rotate a full turn, although some knobs are limited to a quarter or half turn. Like the clockwork spring of the crown, the elements inside the push-button collect the rotary motion of the push-button and convert it into electrical energy, and store it for future use. The more revolutions the button is rotated, the higher the charge stored in the lock. In one exemplary embodiment, the rotational movement of the button drives a series of gears and springs 402 that transmit rotational energy generated by turning the button. Because the spring and gear 402 in the lock may be smaller than the button, the button may rotate at a lower speed and torque. Thus, by proportionally adjusting the size of the button relative to the gears and springs within the lock, the amount of force required to power the lock may be reduced.
In other embodiments, rotational motion of the button is applied to the piezoelectric element 403. When the user rotates the button, the rotational motion of the button is applied to a piezoelectric element that generates a piezo, which is then transmitted and stored as an electrical charge in a capacitor bank or battery. The piezo may be generated by strain, tension or torsion from button rotation. Strain, tension or torsion is applied to the piezoelectric element and generates an electrical charge that can be stored in the capacitor bank. In other embodiments, the piezo may be generated by converting rotational motion into vibrational energy. In particular, a gear or spring within the button may be in contact with the piezoelectric sheet that vibrates with each rotation of the button.
In other embodiments, rotational motion may additionally be converted to electrostatic or electromagnetic energy. For example, rotation of the button may be used as mechanical energy to rotate an armature in the generator 404. In further embodiments, the rotational movement of the button may be stored in a spring or similar mechanical device.
3A-C and FIG. 4 depict several components within a button, in other embodiments of the present invention, these components may be located outside of the button. For example, the wireless transceiver, memory, hardware processor and capacitor/battery pack may be disposed outside of the key cylinder and buttons in the lock housing. These components may be connected to the button through a key cylinder. In other embodiments, these components may be internal to the cylindrical lock core, or internal to the door protrusion.
FIG. 5 illustrates a process for using a lock with an access channel according to an embodiment of the present invention. In step 501, a user selects a first access channel. If a channel is available as shown in step 502, the user may provide authentication information 504. For example, if the access channel is wirelessly sending a token to the smart lock, the access channel may be determined to be unavailable, such as when the user's mobile device is lost, stolen, or the power source is exhausted. If the first channel of access is not available, a second redundant channel of access 503 is selected. For example, the second redundant access channel may be a biometric scan or a password entered on a keypad of the smart lock.
The smart lock verifies the authentication information, as shown in step 505. As described above, if the authentication information includes a token or password, the token or password is compared with a token or password generated by a process stored on the smart lock. If the authentication information is a biometric scan, the scanned data is compared to biometric data stored at the smart lock. In this manner, the present invention provides redundant access channels that ensure that a user can access a lock even when the user's mobile device is lost or unavailable.
If the authentication information is verified, then the access rights are checked to determine if the user is authorized to access the smart lock, as shown in step 506. For example, it is determined whether a supervisor or administrator allows a user to access the smart lock at a given date or time. If the user is authorized to open the lock, the user is granted access and the button may engage the cam to open the smart lock 507. If the authentication information is invalid or the supervisor or administrator decides to deny the user access to the lock, the button will not engage the cam and unlock the smart lock 508. As described above, the rules and access rights may be checked at the user device, the central access server, the supervisor device or the administrator device.
FIG. 6 illustrates a process for controlling a lock having an access channel according to an embodiment of the present invention. In step 601, a trigger event is registered. The triggering event may be used to initiate a process of automatically opening the smart lock. The triggering event may be, for example, when the user's mobile device has come within a predetermined distance (e.g., 10 feet) of the smart lock. For example, the triggering event may then cause the mobile device to automatically send a token to the button.
The trigger event may be registered based on other capabilities of the mobile device. For example, if the mobile device has gesture recognition sensors and software, a trigger event may be registered based on when the user shakes his or her mobile device in a particular manner. Alternatively, the mobile device may register a trigger event when the user selects a button or enters a code on a mobile application on the mobile device.
After the mobile device registers for a triggering event, the mobile device identifies a smart lock to be opened, as shown at step 602. It is then determined whether the rule is configured to grant conditional access or fixed access to the user, as shown in step 603. If the user has conditional access rights, the mobile device will submit a request to a supervisor or administrator, as shown in step 604. Otherwise, at step 605, the rules and access rights are evaluated to determine if the user is authorized to open the lock.
As described above, the mobile device may submit the request to the administrator in several ways. For example, the mobile device may submit a request to a supervisor device, an administrator device, or a central server using its data connection, by sending a text message, or by calling to a central access server having a call center. In some embodiments of the invention, an administrator, manager or central access server may require the user to provide additional credentials before issuing the token. For example, the request submitted by the user's mobile device may include the user's location, password, or other similar identifying credentials, such as their phone number or email address. As another example, the additional credentials may include GPS coordinates of the user's mobile device that confirm that the user is located at the location of the smart lock. In other embodiments, the user may also be required to take a picture of the smart lock and provide the picture along with the request to prove that the user is at the location of the smart lock. After the credentials are successfully verified, the token is sent to the user's mobile device.
If the supervisor or administrator approves the user's request, or the user has sufficient access to open the lock, the user may receive the token, as shown in step 606. If the supervisor or administrator denies the user's request, or the user is not authorized to open the lock, the user will not receive a token, as shown in step 607.
The user may then provide authentication information to the smart lock, as shown in step 608. If the user is to open the lock by entering a password on the keypad, the user may for example receive the password as a text message or receive the password displayed on the mobile application, and the user may enter the password on the smart lock keypad. If the user's mobile device is to wirelessly send a token to the smart lock, the mobile device may automatically send the token upon receipt.
In one aspect of the invention, an additional layer of security may be required before authentication information can be provided to the smart lock. For example, the user may be prompted to enter a password in the mobile device before the mobile device is to wirelessly send authentication information to the button. In other embodiments, the rule may be configured to require the user to scan his or her fingerprint on the mobile device before receiving the token. As described above, the mobile device may also automatically send authentication information without further interaction with the user. For example, the mobile device may send authentication information after launching the mobile application.
In some embodiments, the button may be part of an interconnect hub that may be controlled through a single interface and that causes the devices to be automated based on events occurring in the access control system. For example, the interconnected network of devices may include a home thermostat, lighting system, sound system, and access control system that communicate wirelessly over WiFi or bluetooth. The home thermostat, lighting system, sound system, and access control system may communicate with each other or with a central server using the same application programming interface ("API"). Automation may be based on certain rules or events through the use of APIs, home thermostats, lighting systems, sound systems, and access control systems. For example, after a user unlocks his home door with his mobile device, the access control system may communicate the user preferences to the thermostat to turn on an air conditioner at a particular temperature, turn on certain lighting devices in the living room, and begin playing particular user-specified music on the speaker system.
In some embodiments, as described above, a change in the movement or position of a door may register a triggering event that causes the interconnect hub of a device to perform some task or sequence of tasks. For example, when it is determined that a door has been opened, a triggering event may be registered to notify a thermostat to turn on an air conditioner at a particular temperature, turn on certain lighting devices in the living room, and begin playing particular user-specified music on the speaker system.
Fig. 6 illustrates a process for enabling a supervisor or administrator to control an access control system. In step 701, a set of configurable rules and access rights are displayed to a supervisor or administrator. In step 702, an administrator or manager configures access rights to determine which smart locks a user may access. In step 703, the supervisor or administrator configures rules that specify which access channels the user may use to open the smart lock, and what conditions, if any, must be satisfied before opening the smart lock.
As described above, when a user with conditional access privileges submits a request to open the smart lock, a supervisor or administrator receives the access request, as shown in step 704. For example, the request may be received in the form of a text message, a telephone call, or as a notification displayed on a supervisor or administrator's mobile application. The request may be received directly from the user or from a central access server that receives the request from the user.
In step 705, the user request is authenticated. For example, the user may be authenticated, e.g., by requesting the user to provide additional credentials (e.g., a password). As another example, an administrator or manager may obtain the ID of a user's mobile device to determine whether the mobile device has been reported as lost or stolen. If stolen, the rule may be configured to automatically deny the access request and notify the supervisor, administrator, or user attempting to use.
If the supervisor or administrator authenticates the user, the supervisor or administrator may proceed to step 706 where the supervisor or administrator determines whether to grant the user access. In this step, the rules and access rights may be checked to determine if the user is authorized to open a particular lock, and if there are any conditions that must be met before the lock is opened. For example, it may be determined that the user is not authorized to open a particular smart lock, or that the user is not authorized to open a smart lock on a particular date. If the user is authorized, the supervisor or administrator may still decide to deny the user access. For example, even if the user is authorized, the supervisor or administrator may prioritize his/her decision to approve the request. If the supervisor or administrator determines to approve the request, a token or password is generated and provided to the user. The token or password may be sent to the user as described above. For example, the token or password may be sent in the form of a text message, a phone call, or as a notification displayed on the user's mobile application. The token or password may then be provided to the user at step 708.
According to some embodiments of the invention, a mobile application may be installed on a supervisor device, an administrator device, or a user device to control access using an access control system. The supervisor or administrator's mobile application may provide the following interfaces: viewing the access information; creating access rights; viewing the access log; managing user rights; unlocking the lock; and creating a report of successful entry and denied entry, including detailed information of why entry was denied (e.g., the user is allowed to access the lock outside of the time range or date the user is allowed to access the lock, or the user is not allowed to open the lock in the first instance). In this way, the access control system provides the benefits of the security and reliability of the mechanical lock and key system, while also providing reporting and real-time value-added services for mobile devices and electronic lock systems. Also, the user's mobile application may provide the following interfaces: receiving an access alert; requesting access rights; viewing the access log; and to open the lock.
In one aspect of the invention, the mobile application provides a "notifier" function as shown in FIG. 8A, which notifies supervisors, administrators, and users of information relating to access events and access rights. For supervisors and administrators, the mobile application will receive information about access events, such as when a user accesses a lock. As shown in fig. 8A, this function provides a warning to the supervisor or administrator that Johnson Smith (Johnson Smith) wishes to open a gate, Johnson Smith is near a gate, or Johnson Smith is attempting to open a gate. The alert notifies the supervisor or administrator of the access event or change in access privileges in near real time. Because the event can be quickly communicated to the supervisor or administrator, the mobile application can additionally provide the supervisor or administrator with the option of denying the user access to the protected location in near real-time. Similarly, the mobile application may also receive an alert when the user attempts to open the lock with invalid authentication information (e.g., an incorrect password).
With the wireless or location-based capabilities of the mobile device, the mobile application may determine how long the user stays in the protected location. The mobile application may also receive information from the button regarding the time it was locked and unlocked to determine when the user gained access and subsequently left the protected location. As explained in more detail below, the button on the lock also communicates the locked/unlocked state of the lock to the user's mobile device. The user's mobile device may then send the lock/unlock status to the central access server, which may then send a notification to a supervisor or administrator regarding the status of the lock. In this way, after the user subsequently leaves the protected site, the supervisor or administrator may be alerted that the site is still unlocked, and the user may be contacted to notify him or her that he or she has forgotten to lock the site.
In one aspect of the invention, as shown in FIG. 8B, the mobile application may display to a supervisor or administrator which areas of the protected site have been locked or unlocked. When a user unlocks or locks a place with their mobile device, the mobile device transmits information to the central access server. The central access server then provides the locked/unlocked status to the supervisor or administrator. When the user locks or unlocks the venue using the alternate access channel, this information is stored on the smart lock and is transmitted to the central access server the next time the smart lock is opened using the mobile device.
The mobile application is also programmed to provide a user interface for displaying and configuring how the places may be unlocked. For example, as shown in FIG. 8C, the mobile application may display whether the place may be opened automatically or manually.
Another interface of the mobile application provides a display of which users can access the lock. As shown in fig. 8D, the interface displays a photograph of each user, along with their personal information, such as name and contact information. Each user in the list may be selected or deleted. Selecting the user will cause the mobile application to display another interface that displays other detailed information about the user.
In one aspect of the invention, the notifier will display alerts and messages relating to changes made to the user's access rights. As shown in fig. 8E, the notifier may remind the user that he or she has access to a particular location (e.g., gate a) at a particular time (e.g., from monday through friday afternoon 5 pm to 8 pm). Similarly, the notifier may notify the user that he or she received new access rights to a particular area, or that these access rights have been restricted or revoked.
Although fig. 8A-8E illustrate the alert and messaging functionality of a notifier using a mobile application interface, alerts and messages regarding access rights may also be delivered to a user in the form of SMS text, email, or phone calls. Thus, for example, when a user's access rights change, the user may receive SMS text informing the user that his or her access rights have changed.
In one aspect of the invention, the mobile application provides an "authorization" function that enables supervisors and administrators to create and change access rights for users, and allows users to request access rights. The access rights of each user are stored in a supervisor device, an administrator device or a central access server, where each user's attempt to access the lock can be verified.
As shown in fig. 9A, the mobile application may provide an interface for a supervisor or administrator to create user access rights and rules. For example, the interface allows a supervisor or administrator to specify the user's contact information (e.g., name, phone number, occupation, age), the particular individual locks that the user has access to, the access channels the user may use (e.g., passwords, biometric scans, wirelessly sending tokens to smart locks, or any combination thereof), and the user's access conditions (e.g., restrictions on the time of day). Authorization functions of the mobile application are available to administrators and administrators. In some embodiments of the authorization function used by the administrator, after providing the access information, the administrator submits the information as a request to the administrator. This information is then communicated to a supervisor who ultimately approves or denies the creation of access rights for the new user. Access rights can be created in near real time; when the supervisor approves the user's request or the administrator's request, the user may immediately begin using their mobile device, password, or biometric scan to access the specified smart lock.
In one aspect of the invention, as shown in FIG. 9B, a supervisor or administrator may specify a particular lock, area, or door within a site. As shown in fig. 9B, a supervisor or administrator may select a locked area (e.g., front door, gym, entertainment room, or office) to grant access to the user. Mobile applications make it possible to do this remotely and only in real time; the supervisor or administrator does not need to go to the site to make a copy of the key or update any records, which can result in delays.
The state may correspond to information received from the sensors described above, which corresponds to the door being opened or closed and the deadbolt being locked or unlocked.
As described above, the authorization function allows a supervisor or administrator to add restrictions to the user's access. As shown in fig. 9C, the supervisor or administrator may allow the user to have permanent sporadic access, or may limit the user's access to temporary, or may limit access to during selected time intervals of the day, week, month, or year.
The authorization function may additionally allow a supervisor or administrator to provide one-time access based on different circumstances. As described above, a user may receive one-time access by sending a request to a supervisor or administrator. The request may be via a user authorization interface of the user's mobile application, or in the form of an SMS text, email, or phone call. The request may be for a particular lock or set of locks, and for a particular type of access. The supervisor or administrator may determine to approve or deny the request in near real-time. If the supervisor or administrator approves the request, the user may open the lock. Through the use logging and reporting functionality, a supervisor or administrator may determine when a user has completed using a lock and disable or delete the user's access rights. Alternatively, if the supervisor or administrator decides to grant the user access, the supervisor or administrator may provide the user with a dynamic password that can only be used once and expires after use.
An access type interface, as shown in FIG. 9D, allows an administrator or manager to configure rules to specify which access channels a user may use to open a smart lock. For example, a supervisor or administrator may specify whether the user may open the smart lock by sending a token wirelessly to the smart lock, entering a password on a keypad, using a biometric scan, or any combination thereof. The supervisor or administrator may also add conditions that limit when the user may access the smart lock, such as adding time or date restrictions. For example, a supervisor or administrator may specify that the user may access the lock through a smartphone or mobile device on mondays through fridays, but that the user must additionally provide a biometric scan or password on weekends.
In one embodiment of the invention, a supervisor or administrator may add a user's biometric scan to the smart lock using their respective mobile device. For example, a user may scan their fingerprint on their smartphone and send it to a supervisor or administrator via SMS text or a mobile application. The supervisor or administrator may then add the fingerprint to the central access server or to the smart lock the next time their mobile device communicates with the smart lock. In this way, a biometric scan of a new user may be added to the smart lock remotely without requiring the user to be first at the smart lock.
Users may use a mobile application on their mobile device to send requests for access rights. After registration, the user may load a list of places and their corresponding locks and request access from the corresponding supervisor or administrator of the smart lock. The user may search for a supervisor or administrator and request access rights directly from them. As an alternative to using a mobile application, the user may request access by SMS text, email or phone call.
As shown in fig. 9E, the supervisor or administrator can modify the access rights of each user through the authorization interface at any time. In one aspect of the invention, access rights can be modified without the need to notify or inform the user. In this way, a supervisor or administrator may remotely change or delete access rights associated with a mobile device without requiring any access to or interaction with the user. Thus, if a mobile device is stolen or lost, a supervisor or administrator may disable the particular mobile device, preventing it from being used by unauthorized persons or in an undesirable manner. Before the mobile device may be disabled, the supervisor or administrator may be prompted to provide additional credentials to authenticate his or her identity. If the disabled phone is subsequently used to access the smart lock (e.g., a thief or unwanted person uses the disabled phone to access the smart lock), the smart lock will deny the access and notify the supervisor or administrator of the unauthorized attempted access. As shown in the following illustrative example, the authorization interface allows a supervisor or administrator to revoke authorization of a user, disable the user, or remove it completely from the lock. These changes to the user's access rights can be implemented in near real time.
In one aspect of the invention, the mobile application provides a "reporting" function, enabling supervisors and administrators to view records and logs of access events for each user or each lock. A record of various access events (e.g., when and how the user seeks or gains access to the smart lock) may be stored in the storage medium of the button as described above, or in a mobile application of the user's mobile device. For example, when a user seeks or gains access to a smart lock using his or her mobile device, a record of the access event may be stored in the mobile device or in a button. Similarly, if the user is accessing the smart lock via a redundant access channel (e.g., password or biometric scan), an access event may be stored in the button and wirelessly transmitted to the central access server at a later stage when another mobile device comes into contact with the smart lock.
The access event may further include information received by the sensor indicating whether the door has been opened or closed or whether the deadbolt has been locked or unlocked.
The log of access events for each user or each smart lock may be aggregated and communicated to a supervisor or administrator on a periodic or near real-time basis. For example, as shown in FIG. 9F, a log of user access events for the current day may be aggregated and reported to a supervisor or administrator. The log displays detailed information for each access event for a particular user, such as what smart lock was accessed, the manner of access, and the precise time the user was accessed and the time the user stayed at the site. The log may further include a record of successful and unsuccessful unlocking of the smart lock, a time period for which the user is allowed to unlock the smart lock, and a time at which the user requests access to the smart lock. Similar logs may be aggregated for each smart lock, reporting the person accessing the smart lock, the manner of access, and the time of access. Supervisors and administrators can set the frequency with which they prefer to receive log reports. The report may be transmitted to a central access server or directly to a supervisor or administrator.
In other embodiments of the invention, the log may be transmitted directly from the smart lock to an administrator or central server, bypassing the mobile device. As described above, the smart lock may communicate this information directly to a central server or administrator using its wireless connection or through a network device.
In one aspect of the invention, logs and reports may be processed to discover patterns related to access usage and users. In particular, logs and reports may be mined to detect patterns relating to how and when a user accesses different smart locks. Using these identified access behavior patterns, the access control system may then predict access events to enhance security or access control of the system. For example, if the logs and reports indicate that the user came home from the front gate at 5:00 pm every weekday, the access control system may automate processes or tasks in the interconnected equipment, such as communicating with the lighting system to turn on the lights of the front courtyard, communicating with the thermostat to turn on the air conditioner.
10A-10C illustrate user interfaces for logging into a mobile application, requesting a token or password, and receiving a token or password. As described above, the user may be required to provide credentials, such as a password, as shown in FIG. 10A before the user is allowed to request a token or password. As shown in FIG. 10B, the interface allows the user to see which smart locks they can access, and if they cannot access the smart locks, or only conditional access rights, they can submit a request to a supervisor or administrator. As shown in fig. 10B, the user may submit the request in several ways, such as by sending a reminder to a mobile application on the supervisor or administrator's mobile device, or by sending text or placing a call to them, for example. As shown in fig. 10C, if the user has been authenticated and the supervisor or administrator approves access, the user will receive a token or password. If the user receives the password, the password may be displayed to the user for entry by the user on the keyboard. If the user receives the token, the token may be wirelessly transmitted to the smart lock.
In other aspects of the invention, user patterns discovered using the log may be used to optimize certain components of the smart lock. For example, the log may be used to determine when a user is typically away from home and arriving at home. With this information, the smart lock may determine a particular period of time during which the smart lock is least likely to be used, and may thereby change some functions of the smart lock or its operating mode. For example, the smart lock may determine that no one is typically returning or leaving home during the working hours of the weekday. During this time, the smart lock may enter a "sleep" mode, at which time the smart lock may disable certain functions to reduce power consumption.
Variations, modifications, and other implementations of what is described herein will occur to those of ordinary skill in the art without departing from the spirit and the scope of the invention and the claims hereof.
Claims (20)
1. A lock for providing redundant access channels, comprising:
a hardware processor;
a power source;
a lock cylinder adapted to fit a standard profile slot of a door, the lock cylinder including a cam for engaging a latch bolt;
a button for engaging a cam to unlock the deadbolt and form a raised knob for protecting and concealing the hardware processor, the power source, and the lock cylinder; and
a rose protector for protecting and concealing the hardware processor, the power source, and the lock cylinder such that the hardware processor, the power source, and the lock cylinder are fully protected and concealed by the rose knob and the rose protector;
wherein the bump protector has an outer wall and an inner wall forming an annular groove for interlocking with a bump knob, the inner wall being formed substantially perpendicular with respect to the door, the outer wall being formed conically with respect to the door, the annular groove having a gradually changing thickness decreasing along a plane perpendicular to the door due to the conical shape of the outer wall, wherein the outer wall is shaped to deflect a strong impact,
wherein the raised knob has an outer surface and an inner surface that form: 1) an annular rim for interlocking with the annular groove of the rose protector, the annular rim having a thickness matching the graduated thickness of the annular groove; and 2) an opening comprising a power source, a hardware processor, and a plurality of redundant access channels for receiving authentication information, the redundant access channels comprising a biometric scanner for receiving biometric information, a cryptographic keypad, and a wireless transceiver configured to communicate with the mobile device in near real-time,
wherein the rose protector has a set of through holes for one or more securing rods and one or more fasteners that secure the rose protector to the door and the rose knob is non-removably secured to the rose protector when the annular rim of the rose knob slidably interlocks with the annular groove of the rose protector;
wherein the raised knob is free to rotate until valid authentication information is received from the password keypad, biometric scanner, or mobile device, upon receipt of valid authentication information, the raised knob is configured to actuate the cam to unlock the locking bolt, and
wherein the hardware processor is configured to verify authentication information received from the password keypad, biometric scanner, or mobile device based on a set of rules determined by an administrator, unlock the locking bolt when a user is authenticated through a first channel of the plurality of redundant access channels, and allow access through a second channel of the plurality of redundant access channels when the user is unable to open the lock through the first channel.
2. The lock of claim 1, wherein the lock cylinder is a double-throw lock cylinder allowing key access from both sides, wherein the hardware processor is a first hardware processor, the power source is a first power source, the rose protector is a first rose protector, and the rose knob is a first rose knob, the lock further comprising:
a second hardware processor;
a second power supply;
a second button for engaging a cam to unlock a deadbolt and forming a second raised knob for protecting and hiding the second hardware processor, second power source, and the lock cylinder,
a second bump protector for protecting and concealing the second hardware processor, second power source, and the lock cylinder such that the second hardware processor, second power source, and the lock cylinder are fully protected and concealed by the second bump knob and the second bump protector; and is
Wherein the second bump protector has an outer wall and an inner wall forming an annular groove for interlocking with the second bump knob, the inner wall being formed substantially perpendicular with respect to the door, the outer wall being formed conically with respect to the door, the annular groove having a gradually changing thickness decreasing along a plane perpendicular to the door due to the conical shape of the outer wall, wherein the shape of the outer wall deflects a strong impact,
wherein the second raised knob has an outer surface and an inner surface that form: 1) an annular rim for interlocking with the annular groove of the second rose protector, the annular rim having a thickness matching the graduated thickness of the annular groove; and 2) an opening including the second power supply and the second hardware processor,
wherein the second rose protector has a set of through holes for one or more securing rods and one or more fasteners that secure the rose protector to the door and the second rose knob is non-removably secured to the second rose protector when the annular rim of the second rose knob slidably interlocks with the annular groove of the second rose protector; and is
Wherein the first bump protector and the first bump knob are disposed outside the door, and the second bump protector and the second bump knob are disposed inside the door.
3. The lock of claim 2, wherein the second rose protector is secured to the first rose protector by one or more securing rods and one or more fasteners, wherein the one or more fasteners are inserted from the second rose protector and conceal the one or more fasteners from the outside of the door.
4. The lock of claim 1, wherein the raised knob has a frustum, and wherein the biometric scanner and the passcode keypad for receiving biometric information are disposed on the frustum.
5. The lock of claim 1, wherein the rose knob and rose protector are made of stainless steel.
6. The lock of claim 1, wherein the raised knob has a finished surface with a coating that substantially reduces the coefficient of friction of the raised knob.
7. The lock of claim 1, wherein the lock is a lock selected from the group consisting of an electromechanical lock, a mechanical lock, and a padlock.
8. The lock of claim 1, wherein, after verification of the authentication information, the raised knob actuates the cam to unlock the deadbolt by actuating a release mechanism to move from a blocking position to an unlocked position such that the raised knob can be pushed inward and engage the cam upon further rotation.
9. The lock of claim 1, wherein the lobe knob actuates the cam through a first series of rotations, and after the first series of rotations, the lobe knob actuates a latch of the lock cylinder.
10. The lock of claim 1, further comprising a numeric display that associates rotational movement of the raised knob with an alphanumeric display, and wherein the hardware processor is further configured to verify authentication information based on the rotational movement of the raised knob, wherein the rotational movement of the raised knob is associated with an alphanumeric display and corresponds to a passcode, and wherein the hardware processor electronically verifies the passcode.
11. An access control system for providing redundant access channels, comprising:
a lock according to claim 1;
a user mobile device configured to request access to the lock;
an administrator device for controlling access to the lock by the user mobile device, the administrator device configured to grant or deny access requests in near real-time, wherein, upon granting access to the lock, the user mobile device is configured to receive authentication information including a token for opening the lock and provide the token to the lock; and is
Wherein the lock comprises a storage medium for storing access information and the lock is configured to send a response comprising the stored access information.
12. The system of claim 11, wherein the response sent from the lock includes an access record indicating whether the token was accepted by the lock and whether the lock was opened, and wherein the step of sending the response includes: sending the response from the user mobile device to an administrator device in near real-time.
13. The system of claim 11, wherein the administrator device is configured to grant access to the user mobile device based on a set of configurable rules, and wherein the set of configurable rules includes:
a user role associated with a set of permissions for one or more locks, the set of configurable rules restricting access by the user based on the user's location, the time of accessing the lock, and the user's role; and
a trigger event, the mobile device automatically sending a request to access a lock based on the mobile device registering for the trigger event.
14. The system of claim 11, wherein the power source is a rechargeable power source and includes a piezoelectric element, and rotational motion of the button is applied to the piezoelectric element and generates a piezoelectric that is stored in the rechargeable power source.
15. The lock of claim 1, wherein the wireless transceiver is further configured to communicate in near real-time with one of: 1) a network device, 2) a control access server, and 3) an administrator device.
16. The lock of claim 15, further comprising a wireless modem configured to create a cellular broadband connection and communicate with the administrator device or central access server in near real time and create a short range wireless connection to communicate with the administrator device or central access server in near real time.
17. The lock of claim 16, wherein the lock is configured to receive instructions from the central access server or the administrator device over the cellular broadband connection to block access by a user based on a biometric scan, a password, or a mobile device IMEI of the user.
18. The lock of claim 16, wherein the lock is configured to:
receiving a token, biometric scan or password,
sending a request to access the lock based on a set of configurable rules, an
Receiving instructions from the administrator device or the central access server to grant or deny access requests in near real-time.
19. The lock of claim 16, wherein the button comprises an inertial module configured to determine a door state indicating whether the door has been opened or closed and to communicate the door state to the administrator device or the central access server in near real time, and wherein the lock is configured to determine a deadbolt state indicating whether the deadbolt is in a locked position or an unlocked position and to communicate the deadbolt state to the administrator device or the central access server in near real time.
20. A system for controlling a lock having redundant channels of access, the system comprising:
the lock for providing redundant access channels of claim 16; and
a network device, wherein the lock is coupled to the network device by a short-range wireless connection, and the network device is coupled to the administrator device or the central access server by a network connection.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201562189195P | 2015-07-06 | 2015-07-06 | |
| US62/189,195 | 2015-07-06 | ||
| PCT/IB2016/000963 WO2017006171A2 (en) | 2015-07-06 | 2016-07-06 | Systems and methods for secure lock systems with redundant access control |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK1248385A1 true HK1248385A1 (en) | 2018-10-12 |
| HK1248385B HK1248385B (en) | 2020-05-22 |
Family
ID=57047246
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| HK18107463.3A HK1248385B (en) | 2015-07-06 | 2016-07-06 | Lock for providing redundant channels of access |
Country Status (6)
| Country | Link |
|---|---|
| US (2) | US10163289B2 (en) |
| EP (2) | EP3582193B1 (en) |
| CN (2) | CN110223428A (en) |
| HK (1) | HK1248385B (en) |
| TW (1) | TW201716677A (en) |
| WO (1) | WO2017006171A2 (en) |
Families Citing this family (41)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11190936B2 (en) | 2007-09-27 | 2021-11-30 | Clevx, Llc | Wireless authentication system |
| US10778417B2 (en) * | 2007-09-27 | 2020-09-15 | Clevx, Llc | Self-encrypting module with embedded wireless user authentication |
| US10181055B2 (en) | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
| US10581844B2 (en) * | 2014-09-05 | 2020-03-03 | Utc Fire & Security Corporation | System and method for access authentication |
| NZ740623A (en) * | 2015-08-12 | 2022-12-23 | Airbolt Pty Ltd | Portable electronic lock |
| US9847020B2 (en) * | 2015-10-10 | 2017-12-19 | Videx, Inc. | Visible light communication of an access credential in an access control system |
| US10049194B2 (en) * | 2015-11-27 | 2018-08-14 | International Business Machines Corporation | Control access to function of information device |
| DE102015225778A1 (en) * | 2015-12-17 | 2017-06-22 | Deutsche Post Ag | Device and method for the personalized provision of a key |
| US11220844B2 (en) | 2016-04-18 | 2022-01-11 | Spectrum Brands, Inc. | Electronic lock with wireless exterior to interior door communication |
| DE102017211855A1 (en) * | 2017-07-11 | 2019-01-17 | BSH Hausgeräte GmbH | Household appliance with at least one movable door or flap |
| MY194318A (en) * | 2017-08-28 | 2022-11-28 | Timetec Holding Sdn Bhd | Mobile-based access control system |
| US20190043294A1 (en) * | 2017-09-14 | 2019-02-07 | Intel Corporation | Intelligent door controller and automated security attendant |
| CN107979472A (en) * | 2017-12-01 | 2018-05-01 | 江苏乐希科技有限公司 | A kind of coding lock system and authentication method |
| EP3505710B1 (en) | 2017-12-28 | 2023-10-18 | Netatmo | Smart lock having an electromechanical key with three positions |
| US10253528B1 (en) | 2018-02-21 | 2019-04-09 | Axtuator OY | Digital lock |
| CN108564688A (en) * | 2018-03-21 | 2018-09-21 | 阿里巴巴集团控股有限公司 | The method and device and electronic equipment of authentication |
| CN108386085B (en) * | 2018-03-30 | 2023-03-31 | 山东英才学院 | Code case |
| TWI679540B (en) * | 2018-08-02 | 2019-12-11 | 欣揚科技有限公司 | Authority control method and its system |
| EP3671401A1 (en) * | 2018-10-11 | 2020-06-24 | Defond Electech Co., Ltd | A control system for use in controlling operation of an electrical appliance |
| BR102019011656A2 (en) * | 2019-06-04 | 2020-12-15 | Trilobit Comércio, Montagem E Fabricação De Placas Eletrônicas Ltda. | ACCESS CONTROL SYSTEM |
| TWI687578B (en) * | 2019-06-12 | 2020-03-11 | 林 招慶 | An offline electronic lock system with recording function |
| BR112022004889A2 (en) * | 2019-09-17 | 2022-09-27 | Cezar Carvalho Nilton | REMOTE MANAGEMENT SYSTEM APPLIED TO ELECTRONIC LOCKS WITH ACCESS CONTROL VIA MOBILE DEVICE |
| CN110714660B (en) * | 2019-11-12 | 2025-01-28 | 深圳市龙兄弟数码锁有限公司 | Double-opening structure of electronic lock and electronic lock having the same |
| NL2024354B1 (en) * | 2019-12-02 | 2021-08-31 | Bold Security Tech B V | A vandal-proof mechatronic lock system |
| EP4132328A4 (en) * | 2020-04-06 | 2024-04-03 | Boxlock, Inc. | DEVICES, SYSTEMS, APPARATUS AND METHODS FOR INTELLIGENT CAM LOCKS AND KEY LOCK CASES |
| US20210407240A1 (en) * | 2020-06-24 | 2021-12-30 | Samer Jaber | Fingerprint Security System |
| EP4161033A4 (en) * | 2020-06-30 | 2023-11-01 | Yunding Network Technology (Beijing) Co., Ltd. | METHOD AND SYSTEM FOR CONTROLLING AN INTELLIGENT DEVICE |
| TWI734568B (en) * | 2020-07-24 | 2021-07-21 | 關貿網路股份有限公司 | Vehicle equipment seal |
| CN112466012B (en) * | 2020-11-30 | 2023-02-14 | 福州汇思博信息技术有限公司 | Method and system for controlling cash register cashbox through Bluetooth |
| CN113705819B (en) * | 2021-07-21 | 2023-11-24 | 南通大学 | Quantum bit interaction error perception CNOT line nearest neighbor comprehensive method |
| SE545778C2 (en) | 2021-09-24 | 2024-01-09 | Assa Abloy Ab | Electronic lock comprising a first credential interface and a second credential interface |
| SE547698C2 (en) * | 2022-02-04 | 2025-11-11 | Assa Abloy Ab | Controlling power state of a lock assembly |
| US11655653B1 (en) * | 2022-04-15 | 2023-05-23 | Digilock Asia Ltd. | Electronically operated lock cylinder |
| US20240141691A1 (en) * | 2022-11-02 | 2024-05-02 | Zachary Dan Griffith | Universal door lock indicating devices, kits, and methods |
| GB2624694A (en) * | 2022-11-28 | 2024-05-29 | Era Home Security Ltd | Window Handle Sensor |
| EP4528685A1 (en) * | 2023-09-21 | 2025-03-26 | dormakaba Schweiz AG | Multi-channel signaling method for access control |
| TWM655449U (en) * | 2024-01-03 | 2024-05-11 | 大陸商上海銘唯五金有限公司 | Narrow door lock drive device with electronic switching status |
| EP4625372A1 (en) * | 2024-03-28 | 2025-10-01 | Assa Abloy Ab | Electronic lock comprising a wireless key interface and a code input interface |
| US20250327333A1 (en) * | 2024-04-23 | 2025-10-23 | U-tec Group Inc. | Smart lock knob position detection device |
| US20250349168A1 (en) * | 2024-05-08 | 2025-11-13 | Honeywell International Inc. | Building access control using a mobile device |
| CN120071485B (en) * | 2025-04-27 | 2025-07-18 | 浙江德施曼科技智能股份有限公司 | A cross-lock door opening method and system for intelligent door locks |
Family Cites Families (36)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB1201564A (en) * | 1968-05-09 | 1970-08-12 | Micro & Prec Mouldings Chelten | Improvements in or relating to door furniture |
| US3550411A (en) * | 1968-06-13 | 1970-12-29 | Schlage Lock Co | Lock protecting mechanism |
| US3621685A (en) * | 1969-10-01 | 1971-11-23 | Thomas J Sargent | Cylindrical lock |
| US3718015A (en) * | 1971-03-17 | 1973-02-27 | Schlage Lock Co | Lock set handle |
| US3779590A (en) * | 1972-02-07 | 1973-12-18 | Norris Industries | Non removable knob trim |
| US3768284A (en) * | 1972-06-29 | 1973-10-30 | R Kent | Maximum security lock assemblies |
| US3856339A (en) * | 1973-04-09 | 1974-12-24 | Schlage Lock Co | Releasable knob for a lock |
| US4062579A (en) * | 1976-08-09 | 1977-12-13 | Norris Industries, Inc. | Knob attachment for door latch |
| US4132092A (en) * | 1978-04-18 | 1979-01-02 | Chicago Lock Co. | Protective cover for a handle lock |
| US4838055A (en) * | 1988-05-02 | 1989-06-13 | Gallagher Francis E | Anti-thief key lock for vending machines |
| US5186030A (en) * | 1991-11-25 | 1993-02-16 | Taiwan Fu Hsing Industry Co., Ltd. | Locking device for an auxiliary lock |
| US5216910A (en) * | 1992-09-02 | 1993-06-08 | Lin Jui Chang | Auxiliary lock with an anti-breakage device |
| JPH10504075A (en) * | 1993-10-29 | 1998-04-14 | サージェント アンド グリーンリーフ,インコーポレイテッド | Electronic combination lock |
| US6564601B2 (en) * | 1995-09-29 | 2003-05-20 | Hyatt Jr Richard G | Electromechanical cylinder plug |
| US6374653B1 (en) * | 1997-12-22 | 2002-04-23 | Security People, Inc. | Mechanical/electronic lock and key therefor |
| TW366035U (en) * | 1998-09-04 | 1999-08-01 | Tong Lung Metal Ind Co Ltd | Positioned adjustable apparatus for auxiliary lock |
| US6568727B2 (en) * | 2001-02-05 | 2003-05-27 | Newfrey Llc | Retention and reinforcement system for knobs and levers |
| US6523375B2 (en) * | 2001-02-09 | 2003-02-25 | Schlage Lock Company | Deadbolt thumbturn assembly |
| CA2369968C (en) * | 2002-02-01 | 2009-11-24 | Pierre Veillette | Auxiliary door lock |
| JP4546235B2 (en) * | 2004-12-28 | 2010-09-15 | 美和ロック株式会社 | Lock structure |
| US7428836B2 (en) * | 2006-01-17 | 2008-09-30 | Zhen-Lin Yang | Door lock having reinforced strength |
| US7281401B2 (en) * | 2006-02-08 | 2007-10-16 | I-Tek Metal Mfg. Co., Ltd. | Protective sleeve for latch mechanism for lock |
| AT502024B1 (en) * | 2006-03-02 | 2007-01-15 | Evva Werke | Double-knob cylinder for frame of electronically secured locking system, has knob formed as pan-shaped plug-in part and comprising base with perforation inside which contact is provided, where contact is connected to evaluation circuit |
| TWM321926U (en) * | 2006-11-24 | 2007-11-11 | Tong Lung Metal Ind Co Ltd | Reinforcing structure of auxiliary lock |
| US7596975B1 (en) * | 2006-12-21 | 2009-10-06 | Zhi Man Yuan | Lock mechanism |
| US8375753B2 (en) * | 2007-02-08 | 2013-02-19 | Knock N'lock Ltd. | Solenoid-operated electromechanical lock |
| US8797138B2 (en) * | 2009-01-13 | 2014-08-05 | Utc Fire & Security Americas Corporation, Inc. | One-time access for electronic locking devices |
| CH701503A2 (en) * | 2009-07-29 | 2011-01-31 | Kaba Ag | Electronic closing. |
| DE102010043705B4 (en) * | 2010-11-10 | 2024-02-08 | Bks Gmbh | Locking device |
| WO2013157762A1 (en) * | 2012-04-17 | 2013-10-24 | Yoon Byungman | Digital entrance opening and closing device |
| CA2903811A1 (en) * | 2013-03-15 | 2014-09-25 | Spectrum Brands, Inc. | Electro-mechanical locks with bezel turning function |
| CN203224923U (en) * | 2013-04-18 | 2013-10-02 | 广州龙芯中科电子科技有限公司 | Intelligent door lock |
| CN104424678B (en) * | 2013-08-30 | 2016-12-28 | 聚龙股份有限公司 | A kind of electronic coding lock system and control method thereof |
| WO2016139528A1 (en) * | 2015-03-03 | 2016-09-09 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices |
| US9672674B2 (en) * | 2015-07-06 | 2017-06-06 | Acsys Ip Holding, Inc. | Systems and methods for secure lock systems with redundant access control |
| US9852562B2 (en) * | 2015-07-06 | 2017-12-26 | Acsys Ip Holding, Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
-
2016
- 2016-07-06 CN CN201910525921.2A patent/CN110223428A/en active Pending
- 2016-07-06 EP EP19188834.6A patent/EP3582193B1/en active Active
- 2016-07-06 WO PCT/IB2016/000963 patent/WO2017006171A2/en not_active Ceased
- 2016-07-06 EP EP16775319.3A patent/EP3320522B1/en active Active
- 2016-07-06 HK HK18107463.3A patent/HK1248385B/en unknown
- 2016-07-06 TW TW105121472A patent/TW201716677A/en unknown
- 2016-07-06 CN CN201680051614.XA patent/CN108027992B/en active Active
-
2017
- 2017-05-08 US US15/588,847 patent/US10163289B2/en active Active
-
2018
- 2018-12-05 US US16/211,011 patent/US11321978B2/en active Active
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11321978B2 (en) | Systems and methods for secure lock systems with redundant access control | |
| US9672674B2 (en) | Systems and methods for secure lock systems with redundant access control | |
| HK1248385A1 (en) | Lock for providing redundant channels of access | |
| CN107889536B (en) | Lock and method for redundant access control | |
| US10726653B2 (en) | Systems and methods for redundant access control systems based on mobile devices | |
| US9685012B2 (en) | Access management and resource sharing platform based on biometric identity | |
| US9501881B2 (en) | Access management and resource sharing system based on biometric identity | |
| KR102261462B1 (en) | Security enhanced door lock and door security management system using that | |
| HK40019552A (en) | Lock for providing redundant channels of access | |
| HK40019552B (en) | Lock for providing redundant channels of access | |
| JP6796804B2 (en) | Electric lock system and electric lock device | |
| US11842587B1 (en) | System, comprising a lock unit for a cabinet and at least one portable user terminal | |
| KR20200080893A (en) | Smart doorlock | |
| KR20030082286A (en) | A doorlock security device using Real-time Password Generator | |
| HK1248024B (en) | Lock and methods for redundant access control | |
| JP2007164714A (en) | Access management device |