TW201816668A - Passive RFID door lock - Google Patents

Passive RFID door lock Download PDF

Info

Publication number
TW201816668A
TW201816668A TW106121718A TW106121718A TW201816668A TW 201816668 A TW201816668 A TW 201816668A TW 106121718 A TW106121718 A TW 106121718A TW 106121718 A TW106121718 A TW 106121718A TW 201816668 A TW201816668 A TW 201816668A
Authority
TW
Taiwan
Prior art keywords
mobile device
reader
locking device
cloud service
passive rfid
Prior art date
Application number
TW106121718A
Other languages
Chinese (zh)
Other versions
TWI737755B (en
Inventor
特洛伊 M 布朗
Original Assignee
品譜公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 品譜公司 filed Critical 品譜公司
Publication of TW201816668A publication Critical patent/TW201816668A/en
Application granted granted Critical
Publication of TWI737755B publication Critical patent/TWI737755B/en

Links

Abstract

An electronic or non-electronic lockset with a passive RFID tag operating methods and system is described herein. The passive RFID tag is affixed to or near the lockset. Using an application on a mobile device, a user can leverage the mobile device to enable features such as user notifications, home automation control, and home security control. A visitor to a home uses an application on their mobile device to scan the passive RFID to gain entry to a home through verification by a remote homeowner.

Description

被動式無線射頻識別門鎖Passive radio frequency identification door lock

本發明大體係關於鎖定裝置;特定言之,本發明係關於可用一經貼附被動式無線射頻識別(RFID)標籤操作之一電子鎖定裝置。The present invention is directed to a locking device; in particular, the present invention relates to an electronic locking device that can be operated with a passive radio frequency identification (RFID) tag attached thereto.

鎖定及保全系統廣泛用於住宅及商業市場中。鎖定及保全系統藉由要求特定經授權憑證而控制透過門進入保全區域(諸如一建築物或其他保全空間)。現有保全系統可包含電子鎖,該等電子鎖可控制機械鎖定總成,諸如一閂鎖(deadbolt)在其延伸與回縮位置之間的移動。包含呈無線射頻識別(「RFID」)標籤讀取器之形式之RFID解決方式之現有保全系統未併入被動式RFID標籤解決方案。Locking and security systems are widely used in the residential and commercial markets. The lockout and security system controls access to the security area (such as a building or other security space) through the door by requiring specific authorized credentials. Existing security systems may include electronic locks that control the mechanical locking assembly, such as the movement of a deadbolt between its extended and retracted positions. Existing security systems that include RFID solutions in the form of radio frequency identification ("RFID") tag readers are not incorporated into passive RFID tag solutions.

根據一個態樣,本發明提供一種包括配合一行動裝置使用之一鎖具之系統。該系統包括一鎖定裝置、一被動式無線射頻識別(「RFID」)標籤及一行動裝置。該鎖定裝置可在一鎖定位置與一解鎖位置之間移動。該被動式RFID標籤經貼附至該鎖定裝置之一外殼。該行動裝置包括一讀取器且經組態以:掃描該被動式RFID標籤,自動傳輸一或多個通知且更新一雲端服務。 根據另一態樣,本發明提供一種系統,其具有一鎖定裝置、一被動式無線射頻識別(「RFID」)標籤及一行動裝置。該鎖定裝置可在一鎖定位置與一解鎖位置之間移動。該被動式RFID標籤經貼附至該鎖定裝置之一外殼。該行動裝置包括一讀取器且經組態以:掃描該被動式RFID標籤且發出一或多個命令至一家庭自動化控制器。According to one aspect, the present invention provides a system including a lock for use with a mobile device. The system includes a locking device, a passive radio frequency identification ("RFID") tag, and a mobile device. The locking device is moveable between a locked position and an unlocked position. The passive RFID tag is attached to one of the housings of the locking device. The mobile device includes a reader and is configured to scan the passive RFID tag, automatically transmit one or more notifications, and update a cloud service. According to another aspect, the present invention provides a system having a locking device, a passive radio frequency identification ("RFID") tag, and a mobile device. The locking device is moveable between a locked position and an unlocked position. The passive RFID tag is attached to one of the housings of the locking device. The mobile device includes a reader and is configured to scan the passive RFID tag and issue one or more commands to a home automation controller.

相關申請案 本申請案主張2016年6月29日申請為「Passive RFID Door Lock」之美國臨時專利申請案第62/356,209號之權利,該案之全部內容以引用方式併入本文。 已簡化本文提供之圖及描述來繪示與對本文描述之裝置、系統及方法之清晰理解相關之態樣,同時為清楚起見免除可在典型裝置、系統及方法中發現之其他態樣。一般技術者可認識到,其他元件及/或操作可為實施本文描述之裝置、系統及方法所期望及/或必要的。因為此等元件及操作在本技術中眾所周知,且因為其等並不促成對本發明之更佳理解,故在本文中可不提供此等元件及操作之一論述。然而,本發明被視為固有地包含將為一般技術者所知之所描述態樣之所有此等元件、變動及修改。 在說明書中對「一項實施例」、「一實施例」、「一繪示性實施例」等之參考指示,所描述之實施例可包含一特定特徵、結構或特性,但每一實施例可或可未必包含該特定特徵、結構或特性。再者,此等片語未必參考相同實施例。此外,當結合一實施例描述一特定特徵、結構或特性時,認為熟習此項技術者知道結合其他實施例實施此特徵、結構或特性,無論其是否明確描述。另外,應瞭解,以「至少一個A、B及C」之形式包含在一清單中之項目可意謂(A);(B);(C);(A及B);(A及C);(B及C);或(A、B及C)。類似地,以「A、B或C之至少一者」之形式列出之項目可意謂(A);(B);(C);(A及B);(A及C);(B及C);或(A、B及C)。 在圖式中,可以特定配置及/或排序展示一些結構或方法特徵。然而,應瞭解,可不需要此等特定配置及/或排序。實情係,在一些實施例中,此等特徵可按不同於在繪示性圖中展示之一方式及/或順序配置。另外,在一特定圖中包含一結構或方法特徵並不意謂暗示在所有實施例中需要此特徵,且在一些實施例中此特徵可不包含在內或可與其他特徵組合。 在一些實施例中,本發明係關於一門鎖(電子或非電子),其併入一被動式RFID標籤。門鎖提供無需使用一經併入RFID標籤讀取器之RFID優點。例如,被動式RFID標籤可利用一使用者之行動裝置(諸如一智慧型電話)、一可組態應用程式(「app」)及網際網路(或「雲端」)。被動式RFID標籤可呈貼紙形式、印刷電路板(「PCB」)形式或其他組態。預期其中可利用一使用者之裝置之運算處理能力來實現另在無併入門鎖中之更先進無線電子設備的情況下將不可用的特徵之實施例。術語「門鎖」意在被廣泛地解釋為涵蓋與一門相關聯之任何硬體,包含但不限於一鎖、一門柄、一門把手、一鉸鏈等。在一些實施例中,被動式RFID標籤可經安裝於與門鎖分開之一門上(諸如在一附近位置中)。 圖1展示針對至少一項例示性實施例之一例示性系統組態100。在所展示之實例中,系統包含一雲端伺服器102、一家庭自動化控制器(HAC) 104、一使用者裝置106、一標籤110及一鎖108。雲端伺服器102可進一步包括一網路(諸如一區域網路、廣域網路、網際網路或類似物)或作為其之一部分。HAC 104可為(有線或無線地)連接至與鎖108相關聯之住所周圍之其他裝置之一家庭保全系統或自動化系統。HAC 104可控制鎖108及/或其他裝置(未展示)。此等裝置可包含但不限於燈、娛樂裝置或廚房器具等。使用者裝置106可為一可攜式使用者裝置,諸如一智慧型電話、蜂巢式電話、平板電腦或類似物。 圖2展示安裝至一門202之一例示性鎖200 (電子或非電子)。在所展示之實例中,鎖200包含具有一電池固持器206之一內部總成204、一扭轉件208、一鎖閂210、一鎖扣板212、一使用者輸入214、一外部總成216、一機械鎖定總成218及一鑰匙220。外部總成216可進一步包括呈貼紙形式之一被動式RFID標籤或類似物。在一些情況中,可將憑證及/或命令無線地提供至鎖200,諸如在2014年2月25日申請為「Electronic Deadbolt」之美國授權前公開案第2014/0250956號及2014年3月10日申請為「Wireless Lockset With Integrated Antenna, Touch Activation, and Light Communication Method」之美國專利第9,024,759號中揭示,該等案以引用之方式併入本文。 圖3係展示使用使用者裝置106上之軟體應用程式來使用門之一例示性通知程序之一簡化流程圖。裝置之一使用者可經由軟體應用程式起始程序。在此實例中,方法300開始於方塊302,其中一使用者掃描貼附至或緊鄰門鎖之被動式RFID標籤。在決策方塊304,軟體應用程式判定標籤是否經辨識。若「否」,則程序結束。若「是」,則方法移至方塊306且自動發送通知。所發送之通知包含但不限於SMS文字訊息、電子郵件或類似物。通知亦可包含社群網路狀態更新,諸如Twitter®上之一「tweet」或Facebook®上之一狀態更新。更新可為例如「Finally home! (終於到家了!)」之一狀態更新或類似物。可由裝置使用者經由軟體應用程式或類似物預組態待發送之通知。接著,程序移至方塊308,且可向一雲端服務 (即,圖1之雲端102)通知鎖標籤掃描。一雲端服務可經組態以追蹤所掃描之鎖以及其他資訊(諸如所掃描之時間、檢查蹤跡資訊更新等)。甚至更進一步,雲端服務可觸發及/或發出其他命令(諸如至一家庭自動化控制器(即,圖1之HAC 104)之一命令)。門使用通知程序接著被視為完成且程序結束。 圖4係展示基於使用使用者裝置106上之軟體應用程式來使用門之一例示性家庭自動化觸發程序之一簡化流程圖。裝置之一使用者可經由軟體應用程式起始程序。在此實例中,方法400開始於方塊402,其中一使用者掃描貼附至或緊鄰門鎖之被動式RFID標籤。在決策方塊404,軟體應用程式判定標籤是否經辨識。若「否」,則程序結束。若「是」,則方法移至方塊406且發射、發出或觸發命令。可經由使用者裝置或雲端服務102將命令發出至家庭自動化控制器(即,圖1之HAC 104)。所發出之命令可包含但不限於停用防盜警報器、將家庭自動化場景設定至「夜晚」及/或開啟或啟動住宅中之一器具(諸如一咖啡壺來沖泡一壺咖啡)。此等非限制性實例被視為可發出至一家庭自動化控制器之大量不同命令之實例,如一般技術者基於現今及未來使用之家庭自動化控制器之不同能力所知。家庭自動化觸發程序接著被視為完成且程序結束。 圖5係展示基於由一訪客使用使用者裝置106上之軟體應用程式來使用門之一例示性家庭自動化門解鎖程序之一簡化流程圖。裝置之一使用者可經由軟體應用程式起始程序。在此實例中,方法500開始於方塊502,其中一使用者掃描貼附至或緊鄰門鎖之被動式RFID標籤。在方塊504,藉由軟體應用程式發出一命令至一雲端服務。在決策方塊506,雲端服務判定一房主之帳戶是否經鏈接至被掃描之RFID標籤。若「否」,則程序結束。若「是」,則程序移至方塊508且發送一訊息給房主。訊息指示一訪客出現在門口。可經由文字訊息、電子郵件或類似物發送訊息。訊息可包含識別訪客之資訊且房主發出驗證資訊。在決策方塊510,若一使用者未驗證訪客,不授權進入或不解鎖門,則「否」且程序結束。若使用者驗證且因此決策方塊510為「是」,則程序移至方塊512且經由家庭自動化控制器104解鎖門。房主可經由返回訊息(諸如經由文字訊息、電子郵件或類似物)發送驗證。解鎖訊息可經由雲端服務102發送且可包含進一步命令,諸如停用防盜警報器或類似物。在方塊514,訪客可在離開處所時掃描鎖標籤。在方塊516,可經由軟體應用程式觸發命令。命令包含但不限於重新鎖定門、重新啟用警報系統及/或傳輸一驗證訊息給房主。家庭自動化門解鎖程序接著被視為完成且程序結束。 現參考圖6,展示其中實現門鎖具應用程式之裝置106之一例示性運算環境600之一簡化方塊圖。繪示性實施方案600包含一裝置106,該裝置106可經由一或多個網路102與一或多個其他運算系統或裝置626通信。如展示,裝置106包括儲存媒體610。 繪示性裝置106包含至少一個處理器602 (例如,一微處理器、微控制器、數位信號處理器等)、記憶體604及一輸入/輸出(I/O)子系統606。雖然未具體展示,但應理解,I/O子系統606可尤其包含一I/O控制器、一記憶體控制器及一或多個I/O埠。處理器602及I/O子系統606經通信耦合至記憶體604。記憶體604可經體現為任何類型之適當電腦記憶體裝置(例如,揮發性記憶體,諸如各種形式之隨機存取記憶體)。 I/O子系統606經通信耦合至數個組件,包含一或多個使用者輸入裝置608 (例如,一觸摸螢幕、鍵盤、虛擬小鍵盤、麥克風等)、包括一軟體應用程式612之一或多個儲存媒體610、一或多個輸出裝置614 (例如,揚聲器、LED等)、一或多個感測裝置616、618、620、一或多個攝影機或其他感測器應用程式622 (例如,基於軟體之感測控制)及一或多個網路介面624。 儲存媒體610可包含一或多個硬碟機或其他適當資料儲存裝置(例如,快閃記憶體、記憶卡、記憶棒及/或其他)。在一些實施例中,系統軟體(例如,一作業系統等)、框架/中間軟體(例如,API、目的程式庫等)之部分能被儲存於儲存媒體610中。為更快處理或其他原因,系統軟體或框架/中間軟體之部分可在運算裝置106之操作期間複製至記憶體604。 一或多個網路介面624可將運算裝置106通信耦合至一網路(例如,諸如一區域網路、廣域網路、個人雲端、企業雲端、公共雲端及/或網際網路)。因此,網路介面624可包含例如如依照特定運算系統600之規格及/或設計而需要的一或多個有線或無線網路介面卡或配接器。(若干)網路介面624可使用例如近場通信(NFC)、無線保真度(Wi-Fi)、射頻識別(RFID)、紅外線(IR)或其他適當技術提供短程無線或光學通信能力。此外,無線通信可使用Zigbee或Z-Wave協定。 (若干)其他運算系統626可經體現為任何適當類型之運算系統或裝置諸如前述類型之裝置之任一者或其他電子裝置或系統。例如,在一些實施例中,其他運算系統626可包含用於儲存儲存在儲存媒體610中之資料之部分之一或多個伺服器電腦。此外,運算裝置626可進一步包含用以提供用於顯示給一使用者之一介面來實施所陳述之本發明之實施例之應用程式628。運算系統600可包含為清楚描述而未在圖6中繪示之其他組件、子組件及裝置。一般言之,運算系統600之組件藉由電子信號路徑如在圖6中展示般通信耦合,該等電子信號路徑可經體現為能夠促成各自裝置及組件之間的通信之任何類型之有線或無線信號路徑。 實例 在下文中提供本文揭示之被動式RFID鎖之繪示性實例。被動式RFID鎖之一實施例可包含下文描述之實例之任一或多者及任何組合。 實例1係一種包括配合一行動裝置使用之一鎖具之系統。該系統包括一網路、一鎖定裝置、一被動式無線射頻識別(「RFID」)標籤及一行動裝置。該鎖定裝置可在一鎖定位置與一解鎖位置之間移動。該被動式RFID標籤經貼附至該鎖定裝置之一外殼。該行動裝置包括一讀取器且經組態以:掃描該被動式RFID標籤,自動傳輸一或多個通知且更新一雲端服務。 在實例2中,實例1之標的物經進一步組態以包含一家庭自動控制裝置,其經通信耦合至該行動裝置且經組態以基於從該行動裝置接收之一訊息而執行一或多個動作。 在實例3中,實例1之標的物經進一步組態使得回應於藉由該行動裝置之一軟體應用程式辨識該被動式RFID標籤而自動傳輸該一或多個通知。 在實例4中,實例3之標的物經進一步組態使得該一或多個通知包含一文字訊息或一電子郵件。 在實例5中,實例3之標的物經進一步組態使得該一或多個通知包含一社群網路狀態更新。 在實例6中,實例1之標的物經進一步組態使得該雲端服務追蹤掃描時間。 在實例7中,實例1之標的物經進一步組態使得該雲端服務追蹤檢查蹤跡資訊。 在實例8中,實例1之標的物經進一步組態使得該雲端服務基於該鎖掃描而發出一或多個額外命令。 在實例9中,實例8之標的物經進一步組態使得該一或多個額外命令包含發出至一家庭自動化控制器之一命令。 在實例10中,實例1之標的物經進一步組態使得該讀取器係一近場通信(NFC)讀取器。 實例11係一種包括配合一行動裝置使用之一鎖具之系統。該系統包括一網路、一鎖定裝置、一被動式無線射頻識別(「RFID」)標籤及一行動裝置。該鎖定裝置可在一鎖定位置與一解鎖位置之間移動。該被動式RFID標籤經貼附至該鎖定裝置之一外殼。該行動裝置包括一讀取器且經組態以:掃描該被動式RFID標籤且發出一或多個命令至一家庭自動化控制器。 在實例12中,實例11之標的物經進一步組態使得經由一雲端服務發出該一或多個命令。 在實例13中,實例11之標的物經進一步組態使得該一或多個命令導致一或多個器具執行一或多個操作。 在實例14中,實例13之標的物經進一步組態使得該一或多個器具經通信耦合至該家庭自動化控制器。 在實例15中,實例11之標的物經進一步組態使得該讀取器係一近場通信(NFC)讀取器。 實例16係一種包括配合一行動裝置使用之一鎖具之系統。該系統包括一網路、一鎖定裝置、一被動式無線射頻識別(「RFID」)標籤及一行動裝置。該鎖定裝置可在一鎖定位置與一解鎖位置之間移動。該被動式RFID標籤經貼附至該鎖定裝置之一外殼。該行動裝置包括一讀取器且經組態以:掃描該被動式RFID標籤且發射一命令至一雲端服務。回應於經由該雲端服務從該鎖定裝置之一擁有者接收一驗證解鎖該鎖定裝置。 在實例17中,實例16之標的物經進一步組態使得該驗證係該行動裝置之一使用者之一授權。 在實例18中,實例16之標的物經進一步組態使得該鎖定裝置被鎖定且回應於藉由該行動裝置進行之該被動式RFID標籤之一後續掃描而傳輸一通知給該擁有者。 在實例19中,實例16之標的物經進一步組態使得經由文字訊息接收該驗證。 在實例20中,實例16之標的物經進一步組態使得該讀取器係一近場通信(NFC)讀取器。RELATED APPLICATIONS This application claims the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the benefit of the present disclosure. The drawings and the description herein are provided to illustrate the aspects of the present invention, and the invention may be omitted, and other aspects found in typical devices, systems, and methods are omitted for clarity. One of ordinary skill in the art will recognize that other elements and/or operations may be desired and/or necessary to implement the devices, systems, and methods described herein. Because such elements and operations are well known in the art, and because they do not facilitate a better understanding of the present invention, one of these elements and operations may not be discussed herein. However, the present invention is to be considered as being inclusive of all such elements, variations and modifications of the embodiments described. In the description of the "invention", "an embodiment", "an exemplary embodiment", and the like, the described embodiments may include a particular feature, structure, or characteristic, but each embodiment This particular feature, structure, or characteristic may or may not be included. Furthermore, such phrases are not necessarily referring to the same embodiments. In addition, it is to be understood that the skilled artisan skilled in the art will be able to carry out this feature, structure, or feature in combination with other embodiments, whether or not explicitly described. In addition, it should be understood that items included in a list in the form of "at least one A, B and C" may mean (A); (B); (C); (A and B); (A and C) ; (B and C); or (A, B and C). Similarly, items listed in the form of "at least one of A, B or C" may mean (A); (B); (C); (A and B); (A and C); (B And C); or (A, B and C). In the drawings, some structural or method features may be shown in a particular configuration and/or order. However, it should be understood that such specific configurations and/or rankings may not be required. In fact, in some embodiments, such features may be configured in a manner and/or order that is different than shown in the illustrative drawings. In addition, the inclusion of a structural or method feature in a particular figure is not intended to suggest that this feature is required in all embodiments, and in some embodiments this feature may not be included or may be combined with other features. In some embodiments, the present invention is directed to a door lock (electronic or non-electronic) that incorporates a passive RFID tag. The door lock provides the advantage of not having to use an RFID tag that incorporates an RFID tag reader. For example, a passive RFID tag can utilize a user's mobile device (such as a smart phone), a configurable application ("app"), and the Internet (or "cloud"). Passive RFID tags can be in the form of stickers, printed circuit boards ("PCB") or other configurations. Embodiments are contemplated in which the computing processing capabilities of a user's device can be utilized to implement features that would otherwise be unavailable in the case of more advanced wireless electronic devices without the entry lock. The term "door lock" is intended to be interpreted broadly to encompass any hardware associated with a door, including but not limited to a lock, a door handle, a door handle, a hinge, and the like. In some embodiments, the passive RFID tag can be mounted on a door that is separate from the door lock (such as in a nearby location). FIG. 1 shows an exemplary system configuration 100 for at least one exemplary embodiment. In the illustrated example, the system includes a cloud server 102, a home automation controller (HAC) 104, a user device 106, a tag 110, and a lock 108. The cloud server 102 can further include or be part of a network such as a regional network, a wide area network, the Internet, or the like. The HAC 104 can be a home security system or an automated system (wired or wirelessly) connected to one of the other devices surrounding the residence associated with the lock 108. The HAC 104 can control the lock 108 and/or other devices (not shown). Such devices may include, but are not limited to, lights, entertainment devices, kitchen appliances, and the like. User device 106 can be a portable user device such as a smart phone, cellular phone, tablet or the like. 2 shows an exemplary lock 200 (electronic or non-electronic) mounted to a door 202. In the illustrated example, the lock 200 includes an inner assembly 204 having a battery holder 206, a torsion member 208, a latch 210, a latch plate 212, a user input 214, and an outer assembly 216. , a mechanical locking assembly 218 and a key 220. The external assembly 216 can further include a passive RFID tag or the like in the form of a sticker. In some cases, credentials and/or commands may be provided wirelessly to the lock 200, such as US Pre-Provisional Publication No. 2014/0250956 and "March 10, 2014" filed as "Electronic Deadbolt" on February 25, 2014. U.S. Patent No. 9,024,759, the entire disclosure of which is incorporated herein by reference. 3 is a simplified flow diagram showing one of an exemplary notification procedure using a software application on user device 106 to use a door. A user of the device can initiate the program via the software application. In this example, method 300 begins at block 302 where a user scans a passive RFID tag attached to or in close proximity to the door lock. At decision block 304, the software application determines if the tag is recognized. If "No", the program ends. If YES, the method moves to block 306 and the notification is automatically sent. The notifications sent include, but are not limited to, SMS text messages, emails, or the like. Notifications can also include social network status updates, such as one of the "tweets" on Twitter® or one status update on Facebook®. The update can be a status update or the like such as "Finally home!". The notification to be sent can be pre-configured by the device user via a software application or the like. The program then moves to block 308 and a lock label scan can be notified to a cloud service (i.e., cloud 102 of FIG. 1). A cloud service can be configured to track scanned locks and other information (such as time scanned, check trace information updates, etc.). Even further, the cloud service can trigger and/or issue other commands (such as one of the commands to a home automation controller (ie, HAC 104 of Figure 1)). The door usage notifier is then considered complete and the program ends. 4 is a simplified flow diagram showing one example of an exemplary home automation trigger based on the use of a software application on the user device 106. A user of the device can initiate the program via the software application. In this example, method 400 begins at block 402 where a user scans a passive RFID tag attached to or in close proximity to the door lock. At decision block 404, the software application determines if the tag is recognized. If "No", the program ends. If "yes", the method moves to block 406 and the command is fired, issued, or triggered. Commands may be issued to the home automation controller (ie, HAC 104 of FIG. 1) via the user device or cloud service 102. The issued commands may include, but are not limited to, deactivating the burglar alarm, setting the home automation scene to "night" and/or opening or starting one of the appliances in the home (such as a coffee maker to brew a pot of coffee). These non-limiting examples are considered to be examples of a number of different commands that can be issued to a home automation controller, as is known to those of ordinary skill in the art based on the different capabilities of home automation controllers used today and in the future. The home automation trigger is then considered complete and the program ends. 5 is a simplified flow diagram showing one exemplary home automation door unlocking procedure based on the use of a software application on a user device 106 by a visitor. A user of the device can initiate the program via the software application. In this example, method 500 begins at block 502 where a user scans a passive RFID tag attached to or in close proximity to the door lock. At block 504, a command is issued to the cloud service by the software application. At decision block 506, the cloud service determines if the account of a homeowner is linked to the scanned RFID tag. If "No", the program ends. If "yes", the program moves to block 508 and sends a message to the homeowner. The message indicates that a visitor is present at the door. Messages can be sent via text message, email or similar. The message may include information identifying the visitor and the homeowner issues verification information. At decision block 510, if a user does not authenticate the visitor and does not authorize access or unlock the door, then "NO" and the process ends. If the user authenticates and therefore decision block 510 is "YES", then the program moves to block 512 and the door is unlocked via the home automation controller 104. The homeowner can send the verification via a return message, such as via a text message, email or the like. The unlock message may be sent via the cloud service 102 and may include further commands, such as deactivating an anti-theft alarm or the like. At block 514, the visitor can scan the lock tag as it leaves the premises. At block 516, the command can be triggered via the software application. Commands include, but are not limited to, relocking the door, re-enabling the alarm system, and/or transmitting a verification message to the homeowner. The home automation door unlocking program is then considered complete and the program ends. Referring now to Figure 6, a simplified block diagram of one exemplary computing environment 600 of an apparatus 106 in which a door lock application is implemented is shown. The illustrative embodiment 600 includes a device 106 that can communicate with one or more other computing systems or devices 626 via one or more networks 102. As shown, device 106 includes storage medium 610. The illustrative device 106 includes at least one processor 602 (e.g., a microprocessor, microcontroller, digital signal processor, etc.), memory 604, and an input/output (I/O) subsystem 606. Although not specifically shown, it should be understood that I/O subsystem 606 can include, inter alia, an I/O controller, a memory controller, and one or more I/O ports. Processor 602 and I/O subsystem 606 are communicatively coupled to memory 604. Memory 604 can be embodied as any type of suitable computer memory device (e.g., volatile memory, such as various forms of random access memory). The I/O subsystem 606 is communicatively coupled to a plurality of components, including one or more user input devices 608 (eg, a touch screen, keyboard, virtual keypad, microphone, etc.), including one of the software applications 612 or A plurality of storage media 610, one or more output devices 614 (eg, speakers, LEDs, etc.), one or more sensing devices 616, 618, 620, one or more cameras, or other sensor applications 622 (eg, , software-based sensing control) and one or more network interfaces 624. Storage medium 610 may include one or more hard disk drives or other suitable data storage devices (eg, flash memory, memory cards, memory sticks, and/or the like). In some embodiments, portions of system software (eg, an operating system, etc.), framework/intermediate software (eg, API, destination library, etc.) can be stored in storage medium 610. Portions of the system software or framework/intermediate software may be copied to memory 604 during operation of computing device 106 for faster processing or for other reasons. One or more network interfaces 624 can communicatively couple computing device 106 to a network (eg, such as a regional network, a wide area network, a personal cloud, an enterprise cloud, a public cloud, and/or the Internet). Thus, network interface 624 can include, for example, one or more wired or wireless network interface cards or adapters as required in accordance with the specifications and/or design of a particular computing system 600. The network interface 624 can provide short range wireless or optical communication capabilities using, for example, near field communication (NFC), wireless fidelity (Wi-Fi), radio frequency identification (RFID), infrared (IR), or other suitable technology. In addition, wireless communication can use the Zigbee or Z-Wave protocol. The (several) other computing system 626 can be embodied as any suitable type of computing system or device, such as any of the foregoing types of devices or other electronic devices or systems. For example, in some embodiments, other computing system 626 can include one or more server computers for storing portions of data stored in storage medium 610. Moreover, computing device 626 can further include an application 628 for providing an embodiment for displaying the stated invention to one of a user. Computing system 600 can include other components, sub-assemblies, and devices that are not depicted in FIG. 6 for clarity of description. In general, components of computing system 600 are communicatively coupled by electronic signal paths as shown in FIG. 6, which may be embodied as any type of wired or wireless capable of facilitating communication between respective devices and components. Signal path. EXAMPLES An illustrative example of a passive RFID lock disclosed herein is provided below. One embodiment of a passive RFID lock can include any one or more of any of the examples described below, as well as any combination. Example 1 is a system that includes a lock that is used in conjunction with a mobile device. The system includes a network, a locking device, a passive radio frequency identification ("RFID") tag, and a mobile device. The locking device is moveable between a locked position and an unlocked position. The passive RFID tag is attached to one of the housings of the locking device. The mobile device includes a reader and is configured to scan the passive RFID tag, automatically transmit one or more notifications, and update a cloud service. In Example 2, the subject matter of Example 1 is further configured to include a home automation device communicatively coupled to the mobile device and configured to perform one or more based on receiving a message from the mobile device action. In Example 3, the subject matter of Example 1 is further configured to automatically transmit the one or more notifications in response to recognizing the passive RFID tag by a software application of the mobile device. In Example 4, the subject matter of Example 3 is further configured such that the one or more notifications comprise a text message or an email. In Example 5, the subject matter of Example 3 is further configured such that the one or more notifications include a social network status update. In Example 6, the subject matter of Example 1 was further configured such that the cloud service tracked the scan time. In Example 7, the subject matter of Example 1 was further configured such that the cloud service tracked the trace information. In Example 8, the subject matter of Example 1 is further configured such that the cloud service issues one or more additional commands based on the lock scan. In Example 9, the subject matter of Example 8 is further configured such that the one or more additional commands include a command issued to a home automation controller. In Example 10, the subject matter of Example 1 was further configured such that the reader was a near field communication (NFC) reader. Example 11 is a system that includes a lock that is used in conjunction with a mobile device. The system includes a network, a locking device, a passive radio frequency identification ("RFID") tag, and a mobile device. The locking device is moveable between a locked position and an unlocked position. The passive RFID tag is attached to one of the housings of the locking device. The mobile device includes a reader and is configured to scan the passive RFID tag and issue one or more commands to a home automation controller. In Example 12, the subject matter of Example 11 is further configured to issue the one or more commands via a cloud service. In Example 13, the subject matter of Example 11 is further configured such that the one or more commands cause one or more appliances to perform one or more operations. In Example 14, the subject matter of Example 13 is further configured such that the one or more appliances are communicatively coupled to the home automation controller. In Example 15, the subject matter of Example 11 was further configured such that the reader was a near field communication (NFC) reader. Example 16 is a system that includes a lock that is used in conjunction with a mobile device. The system includes a network, a locking device, a passive radio frequency identification ("RFID") tag, and a mobile device. The locking device is moveable between a locked position and an unlocked position. The passive RFID tag is attached to one of the housings of the locking device. The mobile device includes a reader and is configured to scan the passive RFID tag and transmit a command to a cloud service. Responding to receiving a verification from the owner of the locking device via the cloud service to unlock the locking device. In Example 17, the subject matter of Example 16 is further configured such that the verification is authorized by one of the users of the mobile device. In Example 18, the subject matter of Example 16 is further configured such that the locking device is locked and transmits a notification to the owner in response to subsequent scanning of one of the passive RFID tags by the mobile device. In Example 19, the subject matter of Example 16 was further configured to receive the verification via a text message. In Example 20, the subject matter of Example 16 was further configured such that the reader was a near field communication (NFC) reader.

100‧‧‧系統組態100‧‧‧System configuration

102‧‧‧雲端伺服器/雲端服務/網路102‧‧‧Cloud Server/Cloud Service/Network

104‧‧‧家庭自動化控制器104‧‧‧Home Automation Controller

106‧‧‧使用者裝置/運算裝置106‧‧‧User device/computing device

108‧‧‧鎖108‧‧‧Lock

110‧‧‧標籤110‧‧‧ label

200‧‧‧鎖200‧‧‧ lock

202‧‧‧門202‧‧‧

204‧‧‧內部總成204‧‧‧Internal assembly

206‧‧‧電池固持器206‧‧‧Battery Holder

208‧‧‧扭轉件208‧‧‧Twist parts

210‧‧‧鎖閂210‧‧‧Latch

212‧‧‧鎖扣板212‧‧‧Lock plate

214‧‧‧使用者輸入214‧‧‧User input

216‧‧‧外部總成216‧‧‧External assembly

218‧‧‧機械鎖定總成218‧‧‧ mechanical locking assembly

220‧‧‧鑰匙220‧‧‧ key

300‧‧‧方法300‧‧‧ method

302‧‧‧方塊302‧‧‧ squares

304‧‧‧決策方塊304‧‧‧ Decision Block

306‧‧‧方塊306‧‧‧ squares

308‧‧‧方塊308‧‧‧ squares

400‧‧‧方法400‧‧‧ method

402‧‧‧方塊402‧‧‧ square

404‧‧‧決策方塊404‧‧‧ Decision Block

406‧‧‧方塊406‧‧‧ square

500‧‧‧方法500‧‧‧ method

502‧‧‧方塊502‧‧‧ square

504‧‧‧方塊504‧‧‧

506‧‧‧決策方塊506‧‧‧ Decision Block

508‧‧‧方塊508‧‧‧ square

510‧‧‧決策方塊510‧‧‧ Decision Block

512‧‧‧方塊512‧‧‧ squares

514‧‧‧方塊514‧‧‧ squares

516‧‧‧方塊516‧‧‧ squares

600‧‧‧運算環境600‧‧‧ computing environment

602‧‧‧處理器602‧‧‧ processor

604‧‧‧記憶體604‧‧‧ memory

606‧‧‧輸入/輸出(I/O)子系統606‧‧‧Input/Output (I/O) Subsystem

608‧‧‧使用者輸入裝置608‧‧‧User input device

610‧‧‧儲存媒體610‧‧‧Storage media

612‧‧‧軟體應用程式612‧‧‧Software application

614‧‧‧輸出裝置614‧‧‧ Output device

616‧‧‧感測裝置616‧‧‧Sensing device

618‧‧‧感測裝置618‧‧‧Sensing device

620‧‧‧感測裝置620‧‧‧Sensor

622‧‧‧感測器應用程式622‧‧‧Sensor app

624‧‧‧網路介面624‧‧‧Internet interface

626‧‧‧運算系統626‧‧‧ computing system

628‧‧‧應用程式628‧‧‧Application

實施方式參考附圖,在該等附圖中: 圖1係根據本發明之一實施例之用於操作鎖硬體之一例示性系統之一簡化方塊圖; 圖2係根據本發明之一實施例之一電子鎖及對應硬體之一側視圖,該電子鎖及對應硬體安裝於一門上且該門以虛線展示; 圖3係本發明之至少一項實施例之一例示性方法之一流程圖; 圖4係本發明之至少一項實施例之一例示性方法之一流程圖; 圖5係本發明之至少一項實施例之一例示性方法之一流程圖;及 圖6係結合圖1之鎖總成之至少一項實施例之一例示性運算環境之一簡化方塊圖。BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a simplified block diagram of an exemplary system for operating a lock hardware in accordance with an embodiment of the present invention; FIG. 2 is an embodiment of the present invention. One of the electronic locks and a side view of the corresponding hardware, the electronic lock and the corresponding hardware are mounted on a door and the door is shown in dashed lines; FIG. 3 is one of the exemplary methods of at least one embodiment of the present invention Figure 4 is a flow chart of one exemplary method of at least one embodiment of the present invention; Figure 5 is a flow chart of one exemplary method of at least one embodiment of the present invention; and Figure 6 is a combination One of the exemplary computing environments of one of the at least one embodiment of the lock assembly of FIG. 1 is a simplified block diagram.

Claims (20)

一種系統,其包括: 一鎖定裝置,其可在一鎖定位置與一解鎖位置之間移動; 一被動式無線射頻識別(「RFID」)標籤,其經貼附至該鎖定裝置之一外殼; 包括一讀取器之行動裝置,該行動裝置經組態以: 掃描該被動式RFID標籤; 自動傳輸一或多個通知;及 更新一雲端服務。A system comprising: a locking device movable between a locked position and an unlocked position; a passive radio frequency identification ("RFID") tag attached to one of the housings of the locking device; A mobile device of the reader configured to: scan the passive RFID tag; automatically transmit one or more notifications; and update a cloud service. 如請求項1之系統,其進一步包括一家庭自動控制裝置,其經通信耦合至該行動裝置且經組態以基於從該行動裝置接收之一訊息而執行一或多個動作。The system of claim 1, further comprising a home automation device communicatively coupled to the mobile device and configured to perform one or more actions based on receiving a message from the mobile device. 如請求項1之系統,其中回應於藉由該行動裝置之一軟體應用程式辨識該被動式RFID標籤而自動傳輸該一或多個通知。A system of claim 1, wherein the one or more notifications are automatically transmitted in response to recognizing the passive RFID tag by a software application of the mobile device. 如請求項3之系統,其中該一或多個通知包含一文字訊息及/或一電子郵件。The system of claim 3, wherein the one or more notifications comprise a text message and/or an email. 如請求項3之系統,其中該一或多個通知包含一社群網路狀態更新。A system as claimed in claim 3, wherein the one or more notifications comprise a social network status update. 如請求項1之系統,其中該雲端服務追蹤掃描時間。The system of claim 1, wherein the cloud service tracks the scan time. 如請求項1之系統,其中該雲端服務追蹤檢查蹤跡資訊。The system of claim 1, wherein the cloud service tracks the trace information. 如請求項1之系統,其中該雲端服務基於該RFID標籤之該掃描而發出一或多個額外命令。A system as claimed in claim 1, wherein the cloud service issues one or more additional commands based on the scan of the RFID tag. 如請求項8之系統,其中該一或多個額外命令包含發出至一家庭自動化控制器之一命令。The system of claim 8, wherein the one or more additional commands comprise a command issued to a home automation controller. 如請求項1之系統,其中該讀取器係一近場通信(NFC)讀取器。A system as claimed in claim 1, wherein the reader is a near field communication (NFC) reader. 一種系統,其包括: 一鎖定裝置,其可在一鎖定位置與一解鎖位置之間移動; 一被動式無線射頻識別(「RFID」)標籤,其經貼附至該鎖定裝置之一外殼; 包括一讀取器之行動裝置,該行動裝置經組態以: 掃描該被動式RFID標籤; 發出一或多個命令至一家庭自動化控制器。A system comprising: a locking device movable between a locked position and an unlocked position; a passive radio frequency identification ("RFID") tag attached to one of the housings of the locking device; A mobile device of the reader, the mobile device configured to: scan the passive RFID tag; issue one or more commands to a home automation controller. 如請求項11之系統,其中經由一雲端服務發出該一或多個命令。The system of claim 11, wherein the one or more commands are issued via a cloud service. 如請求項11之系統,其中該一或多個命令導致一或多個器具執行一或多個操作。A system of claim 11, wherein the one or more commands cause one or more appliances to perform one or more operations. 如請求項13之系統,其中該一或多個器具經通信耦合至該家庭自動化控制器。The system of claim 13, wherein the one or more appliances are communicatively coupled to the home automation controller. 如請求項11之系統,其中該讀取器係一近場通信(NFC)讀取器。The system of claim 11, wherein the reader is a near field communication (NFC) reader. 一種系統,其包括: 一鎖定裝置,其可在一鎖定位置與一解鎖位置之間移動; 一被動式無線射頻識別(「RFID」)標籤,其經貼附至該鎖定裝置之一外殼; 包括一讀取器之行動裝置,該行動裝置經組態以: 掃描該被動式RFID標籤;及 發射一命令至一雲端服務; 其中回應於經由該雲端服務從該鎖定裝置之一擁有者接收一驗證而解鎖該鎖定裝置。A system comprising: a locking device movable between a locked position and an unlocked position; a passive radio frequency identification ("RFID") tag attached to one of the housings of the locking device; a mobile device of the reader, the mobile device configured to: scan the passive RFID tag; and transmit a command to a cloud service; wherein the unlocking is performed in response to receiving a verification from the owner of the locking device via the cloud service The locking device. 如請求項16之系統,其中該驗證係該行動裝置之一使用者之一授權。The system of claim 16, wherein the verification is authorized by one of the users of the mobile device. 如請求項16之系統,其中該鎖定裝置被鎖定且回應於藉由該行動裝置進行之該被動式RFID標籤之一後續掃描而傳輸一通知給該擁有者。A system of claim 16, wherein the locking device is locked and transmits a notification to the owner in response to subsequent scanning of one of the passive RFID tags by the mobile device. 如請求項16之系統,其中經由文字訊息接收該驗證。The system of claim 16, wherein the verification is received via a text message. 如請求項16之系統,其中該讀取器係一近場通信(NFC)讀取器。The system of claim 16, wherein the reader is a near field communication (NFC) reader.
TW106121718A 2016-06-29 2017-06-29 Passive rfid door lock, electronic door lock system and operation method thereof TWI737755B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662356209P 2016-06-29 2016-06-29
US62/356,209 2016-06-29

Publications (2)

Publication Number Publication Date
TW201816668A true TW201816668A (en) 2018-05-01
TWI737755B TWI737755B (en) 2021-09-01

Family

ID=62949548

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106121718A TWI737755B (en) 2016-06-29 2017-06-29 Passive rfid door lock, electronic door lock system and operation method thereof

Country Status (1)

Country Link
TW (1) TWI737755B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI744642B (en) * 2019-05-22 2021-11-01 洪宜邦 Event management and control method and event management and control device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120280790A1 (en) * 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US9716530B2 (en) * 2013-01-07 2017-07-25 Samsung Electronics Co., Ltd. Home automation using near field communication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI744642B (en) * 2019-05-22 2021-11-01 洪宜邦 Event management and control method and event management and control device

Also Published As

Publication number Publication date
TWI737755B (en) 2021-09-01

Similar Documents

Publication Publication Date Title
US10679111B2 (en) Passive RFID door lock
US11386730B2 (en) Smart lock systems and methods
US10033972B2 (en) Electronic lock with remote monitoring
US10158968B2 (en) Communication method and system
US8947530B1 (en) Smart lock systems and methods
US9342936B2 (en) Smart lock systems and methods
US10672209B2 (en) Door lock control apparatus and method
EP2860707B1 (en) Door lock apparatus and method for controlling thereof
US10204467B2 (en) Smart lock systems and methods
KR20160047500A (en) Owner access point to control the unlocking of an entry
CN103635940A (en) Systems and methods for controlling a locking mechanism using a portable electronic device
US11049342B1 (en) Intelligent lock credential validation
JP2019523959A (en) Method and apparatus for configuring an access control device at an installation site
TWI737755B (en) Passive rfid door lock, electronic door lock system and operation method thereof
US20240071156A1 (en) Smart lock systems and methods
TWI745368B (en) Lockset with integrated wireless signals analysis feature and method
JP2008306534A (en) Apparatus control system, mobile terminal, and control device
TW201800652A (en) Door access control system with automatic unlocking function and unlocking method thereof that comprises a door lock controller and an electronic device carried by a user such that when the electronic device is approaching the door lock controller, the door lock controller, upon identifying the user, automatically unlock the door lock
TWM521661U (en) Electronic lock system
KR101663903B1 (en) Enclosure Box
US20220406164A1 (en) Systems and methods for keybox status determination
JP2018145638A (en) Electric lock system and electric lock device
EP3032502A1 (en) Authenticating a user for access to a physical space using an optical sensor
JP2016188503A (en) Electric lock system