WO2023227258A1 - Electronically controlled lock for a door and premises security monitoring system comprising such a lock - Google Patents
Electronically controlled lock for a door and premises security monitoring system comprising such a lock Download PDFInfo
- Publication number
- WO2023227258A1 WO2023227258A1 PCT/EP2023/050824 EP2023050824W WO2023227258A1 WO 2023227258 A1 WO2023227258 A1 WO 2023227258A1 EP 2023050824 W EP2023050824 W EP 2023050824W WO 2023227258 A1 WO2023227258 A1 WO 2023227258A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lock
- door
- transceiver
- processor
- electronically controlled
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 title claims description 60
- 230000005291 magnetic effect Effects 0.000 claims description 16
- 230000035939 shock Effects 0.000 claims description 13
- 230000008859 change Effects 0.000 claims description 8
- 230000008878 coupling Effects 0.000 claims description 4
- 238000010168 coupling process Methods 0.000 claims description 4
- 238000005859 coupling reaction Methods 0.000 claims description 4
- 238000000926 separation method Methods 0.000 claims description 2
- 230000001419 dependent effect Effects 0.000 claims 1
- 230000002093 peripheral effect Effects 0.000 description 27
- 238000004891 communication Methods 0.000 description 25
- 238000009434 installation Methods 0.000 description 19
- 230000005540 biological transmission Effects 0.000 description 18
- 230000006870 function Effects 0.000 description 14
- 230000033001 locomotion Effects 0.000 description 11
- 238000001514 detection method Methods 0.000 description 9
- 230000004913 activation Effects 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 8
- 239000000470 constituent Substances 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 238000009745 resin transfer moulding Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000011065 in-situ storage Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 230000000295 complement effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 2
- 235000014676 Phragmites communis Nutrition 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000005553 drilling Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 229920006351 engineering plastic Polymers 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 239000003302 ferromagnetic material Substances 0.000 description 1
- 238000005755 formation reaction Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000008672 reprogramming Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/08—Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/06—Mechanical actuation by tampering with fastening
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/149—Mechanical actuation by lifting or attempted removal of hand-portable articles with electric, magnetic, capacitive switch actuation
Definitions
- the present invention relates to an electronically controlled lock for use as an element of a premises security monitoring system, to premises security monitoring systems including such a lock, and to corresponding methods.
- House breaking, breaking and entering, burglary, theft from premises and criminal damage to premises such as homes and businesses are problems that have troubled human society for centuries, and possibly for millennia.
- burglar alarms have been around in some guise since the 18th century, while the first electric burglar alarm was apparently patented in 1853 by the Reverend Augustus Russell Pope and rang a bell if a door or window was opened.
- the Pope invention was quickly commercialised and used as the basis for a monitored alarm service in which signals from alarm installations were carried over telephone lines to staff working in a remote monitoring station.
- intruder alarm systems grades alarms from 1 to 4 (least secure to most secure), and in order to qualify as grade 2 or higher an intruder alarm system must be remotely monitored.
- the grade or category of an installed intruder alarm system is an indication of the ease with which the system can be circumvented, and the degree of security provided, which are significant for insurance cover.
- the grade of an alarm installation is dictated by the grade of the lowest graded component of the system.
- the same set up can of course be used by an occupant within the premises to let someone else into the premises without the occupant actually having to go to the relevant door - which is convenient for the elderly, the infirm, or to anyone who is otherwise occupied - perhaps in a bathroom, or in the middle of preparing a meal.
- remote control (whether the degree of remoteness is best measured in metres, kilometres or hundreds or even thousands of kilometres) relies on users being provided with a suitable user interface, for example a software application on a smart phone or the like, that shows images from the monitoring installation, provides an audio channel to enable conversation between the user and the person at the lock installation, and one or more action buttons to enable the lock to be activated (unlocked), an alarm raised, or possibly for the event to be handed off to another entity.
- a suitable user interface for example a software application on a smart phone or the like, that shows images from the monitoring installation, provides an audio channel to enable conversation between the user and the person at the lock installation, and one or more action buttons to enable the lock to be activated (unlocked), an alarm raised, or possibly for the event to be handed off to another entity.
- an electronically controlled lock for a door of premises comprising a processor and coupled to the processor: a lock RF transceiver; one or more magnetometers; and an accelerometer; wherein: the accelerometer is configured to operate as a shock sensor, the processor and the accelerometer together functioning as a shock detector to generate a tamper signal in the event that an attempt is made to pick or interfere with the lock; at least one of the one or more magnetometers being configured to detect the presence of one or more door magnets located outside the lock but within or attached to the door, the magnetometer generating a tamper signal as the result of an increased separation, between the magnetometer and the one or more door magnets, caused by the removal of the lock from the door; wherein the processor is configured to transmit a tamper signal, using the lock transceiver, in the event that an attempt to remove the lock from the door is detected or in the event that an attempt is made to pick or interfere with the lock.
- Such a lock may be certified according to EN 50131 - 2-8 (shock detectors) Grade 2, and hence be suitable for integration into security monitoring systems of at least EN 50131 Grade 2, and provide a high level of security.
- EN 50131 - 2-8 shock detectors
- the processor and the accelerometer together function as a shock detector to generate an alert signal in the event that an attempt is made to forcibly attack the door, and the processor is configured to transmit the alert signal, using the lock transceiver.
- the alert may indicate an intrusion, but under other circumstances the alert may indicate tamper - potentially depending upon the nature of the shock(s) detected, the regulatory regime, and the set-up or configuration of the accelerometer and processor. If an intrusion is detected, this should be signalled as such, whereas an attack which is insufficient to amount to an intrusion should preferably be flagged as a tamper event.
- the processor is configured to indicate in alerts and tamper signals the nature of the attack that gave rise to the transmission of the signal. For example, it is desirable to distinguish between signals that result from mechanical impact as a result of a forcible attack on the door or door frame from those occasioned by attempts to pick the lock, and those occasioned by attempts to prise the lock from the door. Such information may be useful in discriminating between genuine attacks and false alarms, i.e. in verifying that a security alert is one that can be passed to the police for them to take action.
- the processor is configured to indicate in the alert and tamper signals the sensor that gave rise to the transmission of the signal.
- This information may also be useful in discriminating between genuine attacks and false alarms, for example in discriminating between vibrations caused by an attack and vibrations caused by road or rail traffic or impacts from a kicked football.
- At least one of the one or more magnetometers is configured to sense a magnetic field produced by one or more frame magnets within or attached to a frame housing the door, the magnetometer generating a door status signal based on a quality of the sensed magnetic field.
- the lock can generate door status information that can be used to flag breaches of security.
- the processor is configured to use the lock RF transceiver to transmit a status update message based on received status signal in the event that the status signal indicates a change in door status. In this way the controller of the security monitoring system is informed of the status of the door to which the lock is attached without the need to provide an additional door contact switch.
- the processor is configured to use the lock RF transceiver to transmit an alert in the event that, with the lock in a locked state, a received status signal indicates a change of door status from closed to open.
- the processor of the lock can flag an evident security breach upon which the control unit of the security monitoring system can act immediately, for example activating appropriately located video cameras without waiting for instruction (e.g. from an ARC) or further confirmation from another sensor.
- an electronically controlled lock includes: i) a first part comprising a lock case including a bolt that is moveable between an extended position, in which in use it engages with a keep to secure the door to which the lock is mounted, and a retracted position in which it is free of the keep so that the door is no longer secured by the lock; ii) a second part configured for mounting to a surface of the door, the second part housing the lock transceiver, the one or more magnetometers, and the accelerometer; wherein the second part further comprises an electrically controlled actuator for moving the bolt under the control of the processor, a mechanical coupling being provided between the electrically controlled actuator and the bolt.
- Such a configuration has wide application, not least as a way of upgrading an existing lock.
- the second part may take the place of an existing lock cylinder of a purely mechanical lock, to give the lock smart lock functionality.
- Such a configuration may also enable the use of a compact first part, possibly reducing the need to produce a large mortice.
- Such a configuration may also readily be applied to non-wooden doors or doors whose construction makes them unsuitable for the fitment of mortice locks, as well as potentially being applicable to doors that use multi-point locking.
- the lock transceiver, the one or more magnetometers, and the accelerometer are all mounted on a common pcb within the second part.
- Such an arrangement may enable a more compact design, enabling a smaller housing to be used for the lock.
- the mechanical coupling passes through the pcb.
- the electronically controlled lock further comprises a mounting bracket for securing the second part to a door, the mounting bracket including an aperture being configured to function as a jig for use in positioning a door magnet to cooperate with the magnetometer that is configured to detect the presence of a door magnet, the mounting bracket including an aperture having a size and shape corresponding to an outline of the door magnet. In this way an installer is able reliably to form an aperture in the correct location for mounting for a magnet for use with the magnetometer, while enabling the magnet to be concealed within the door.
- An electronically controlled lock may comprise a lock case including a bolt that is moveable between an extended position, in which in use it engages with a keep to secure the door to which the lock is mounted, and a retracted position in which it is free of the keep so that the door is no longer secured by the lock; wherein the lock case also houses the lock transceiver, the one or more magnetometers, the accelerometer, and an electrically controlled actuator for moving the bolt under the control of the processor.
- the lock may be formed as a single self-contained unit, facilitating installation.
- the lock case is configured for use in a mortice formed within a door. Mounting the lock within a mortice in a door further helps to conceal the lock from would-be attackers, making successful attack more difficult.
- the electronically controlled lock according to any variant of the first aspect further comprises a loudspeaker operatively connected to the processor.
- the lock may function as a chime for a doorbell (e.g. a video doorbell), reducing component count and expediting assembly.
- the loudspeaker may also be used as an alarm sounder, and by concealing the loudspeaker in the lock a bad actor may find it more difficult to locate and disable the alarm sounder.
- An electronically controlled lock may be mounted to a door, the door including one or more door magnets located outside the lock but within or attached to the door.
- Such an assembly may conveniently be factory made, facilitating installation, particularly in new-build homes.
- Such a pre-installed lock and door assembly may be supplied with the door mounted in a frame that includes a keep for the lock, one or more frame magnets being provided within or attached to the frame.
- Such an assembly may conveniently be factory made, facilitating installation, particularly in new-build homes, encouraging adoption of systems according to embodiments of the invention.
- a premises security monitoring system including a system controller and an electronically controlled lock according to any variant of the first aspect, the system controller including a first RF transceiver configured to receive tamper and alert signals transmitted by the lock RF transceiver.
- the system controller includes a second RF transceiver for reporting to a remote monitoring entity alerts and tamper events corresponding to signals received from the lock.
- the system controller is the controller of a video doorbell.
- a video doorbell Such an arrangement provides a basis for a simple and cost-effective security monitoring system.
- Figure 1 shows schematically a home having a smart lock installation that includes video monitoring
- Figure 2 illustrates schematically the principal constituents of a smart lock according to embodiments of the invention
- FIG. 3 illustrates schematically some constructional details and arrangements of locks according to aspects of the invention
- Figure 4 illustrates schematically the principal constituents of a video doorbell according to embodiments of the invention
- FIG. 5 illustrates schematically various constituent parts of an installation and system according to an embodiment of the invention.
- Figure 6 illustrates schematically various constituent parts of another installation and system according to a further embodiment of the invention.
- FIG. 1 shows schematically a home (“premises”) having a smart lock installation that includes video monitoring of the approach to the smart lock.
- a video doorbell 100 is provided adjacent the main entrance door 102, in this case the front door, of the house 104.
- the front door 102 is fitted with a “smart” lock 106 that can be locked and unlocked by electrical control signals, received, for example from a personal communication device 108 of the owner of the house.
- the video doorbell 100 may cooperate with a backend service 110 that sends push notifications to a user’s personal communication device 108 when the doorbell is pressed (or optionally when someone approaches the doorbell 100 or other video monitoring device).
- the video doorbell may use Wi-Fi to connect to a Wi-Fi router 112 which has a broadband 114 connection to the Internet 115, the backend service 110 sending push notifications out to a public land mobile network (PLMN) 116 by means of which notifications are delivered to the user’s personal communication device 108.
- PLMN public land mobile network
- the same communication path may be used to stream live video (and sound) from the video doorbell 100 to the user.
- a reverse communication path is also supported to enable the user to speak to a person at the doorbell 100, and also to enable the user to activate (i.e. release) the lock 106 to enable the person at the door to open the door 102.
- the signals to activate (release) the lock may be passed to the lock 106 directly but are preferably (in this configuration) passed via the video doorbell 100 that in turn communicates with the smart lock 106.
- the smart lock 106 has been designed for compliance with Grade 2 of EN50131 by incorporating a shock sensor with a tamper detection function.
- FIG 2 illustrates schematically the principal constituents of a smart lock 106, such as that shown on Figure 1 , according to embodiments of the invention.
- the lock 106 is shown installed in a door 102, with a cooperating striker plate 242 into which is received at least a bolt 244.
- the lock 106 may be configured as a mortice lock, in which case the lock will typically include a mortice lockset or latch (not shown) in addition to the bolt 244. Provision of the lock 106 as a mortice lock is particularly attractive if the lock is to be pre-installed into a door (or if the door is to be manufactured with mortices provided for ready installation of the lock in situ) rather than retro-fitted to a pre-hung door as a replacement for an existing lock.
- the bolt 224 may be received in a cavity within the door, but with a surface-mounted lock the bolt may also be external of the door.
- the lock 106 is provided with an actuator 246, which may be a solenoid or a motor, which either drives the bolt into the locked or unlocked positions, or which engages or disengages a clutch that couples or decouples a knob or handle 248 on the exposed face of the door and by means of which the bolt may be withdrawn into the unlocked position enabling the door to be opened from the exposed (unprotected) side.
- an actuator 246 which may be a solenoid or a motor, which either drives the bolt into the locked or unlocked positions, or which engages or disengages a clutch that couples or decouples a knob or handle 248 on the exposed face of the door and by means of which the bolt may be withdrawn into the unlocked position enabling the door to be opened from the exposed (unprotected) side.
- the actuator will be a solenoid rather than a motor.
- the lock 106 may of course be provided with another handle or knob (not shown), on the protected side of the door 240, for operating the bolt 244 for opening
- the lock 106 includes a power supply 250 that includes a rechargeable battery 252, and a charging arrangement 254 to manage charging of the rechargeable battery 252.
- the charging arrangement may be coupled to a mains electricity supply, but for ease and simplicity it may be preferred to include an interface 256 (such as a micro USB port, a USB-C port or a “Lightning” socket) to accept a low voltage (e.g. 5V or 20V) supply (e.g. from a power bank or external charger) which, in the absence of a mains feed (or in the event of failure of the mains feed) may be used to recharge the rechargeable battery 252 in-situ, rather than needing the battery to be removed for recharging, so that the lock 106 can always be powered.
- a low voltage e.g. 5V or 20V
- the actuator 246 is coupled to and controlled by a processor 258, which has an associated memory 260 which stores program instructions (“software”) that when run on the processor 258 control the operation of the lock 106.
- the processor 258 may be a micro-controller.
- a transceiver 262 which is configured to receive control signals from, and transmit event information to, a controller of the security monitoring system (e.g. from the video doorbell 100 in the embodiment illustrated in Figure 1 ).
- a controller of the security monitoring system e.g. from the video doorbell 100 in the embodiment illustrated in Figure 1 .
- the transceiver 262 may be configured to operate using a suitable allocated frequency in the industrial, scientific, and medical (ISM) bands - such as (in Europe) 868MHz.
- ISM industrial, scientific, and medical
- the communications from and to the lock are encrypted.
- the lock 106 preferably also includes a chime or loudspeaker (more generally, a sound output device, for example an electromechanical chime or buzzer,) 263 which is coupled to the processor 258.
- This loudspeaker may be used instead of, or in addition to, a separate chime which sounds whenever the chime trigger device 214 of the video doorbell is activated - the processor 200 of the video doorbell 100 being configured to use the second transceiver 206 to transmit a chime activation signal labelled with a flag to which the lock processor 258 and/or the processor of a separate chime sounder device (not shown) responds by using an internal sound output device to chime in response to the activation of the chime trigger device 214.
- the lock 106 may be provided with a housing 259 through which the bolt 244 and any mortice lockset are free to protrude, the knob or handle 248 of course being external of the housing 259.
- the housing is made of an engineering plastics material or a non-ferromagnetic material so as not to interfere with the functioning of one or more magnetometers provided as part of the lock 106.
- the lock 106 further includes a magnetometer 264 that is configured to sense and monitor a first magnetic field provided by a first magnet 266 that is fixedly mounted with respect to the frame 268 or other abutment against which the door 240 closes.
- the same magnetometer 264, or an additional magnetometer is configured to sense and monitor a second magnetic field provided by a second magnet 270 that is attached to the door, preferably mounted within the door - that is, between the protected face and the unprotected face of the door, although it is also possible to attach (e.g. stick with adhesive or using a mechanical fixing such as a screw) a magnet 270 to the face of the door (the face on the inner side (e.g. indoor side) of the door).
- This second magnet 270 is external to the lock 106 and is provided so that the magnetometer configured to sense the magnetic field of the second magnet 270 can generate a tamper signal to indicate an attempt to remove the lock 106 from the door 240. Meanwhile, the magnetometer 264 configured to sense and monitor the first magnetic field provided by a first magnet 266 can provide a signal to indicate the status of the door, e.g. whether the door 240 is open or closed.
- the processor 258 may be configured to generate an alert signal, that is transmitted to the controller of the security monitoring system, for example the enhanced video doorbell according to some aspects of the invention, for onward reporting to a monitoring service or the owner/occupier of the house, in the event that opening of the door is detected without the lock having been unlocked and/or the alarm having been disarmed - since such a combination of circumstances indicates that the door 240 has been forced open.
- an alert signal that is transmitted to the controller of the security monitoring system, for example the enhanced video doorbell according to some aspects of the invention, for onward reporting to a monitoring service or the owner/occupier of the house, in the event that opening of the door is detected without the lock having been unlocked and/or the alarm having been disarmed - since such a combination of circumstances indicates that the door 240 has been forced open.
- the lock 106 further includes an accelerometer 275, which is also coupled to the processor 258, and which is configured to function as a shock sensor to provide the processor with signals to enable detection of attempts to “pick” the lock, drill out the lock cylinder, and other mechanical attacks on the lock, as well as providing signals in the event of attempts to batter down the door (or force open the lock) with a sledge hammer or battering ram for example.
- the processor 258 is configured to distinguish accelerometer signals generated as the result of a normal “I’m here!” knock at the door from signals generated as a result of much more forceful blows characteristic of attempts to force open or break down the door.
- the provision of the accelerometer 275 provides a potential basis for certifying the lock as a shock detector (for an alarm system of at least Grade 2 or Grade 3) according to EN 50131 -2-8 (also referred to herein as an “alarm peripheral”.
- the processor is also preferably configured to indicate in alerts and tamper signals the nature of the attack that gave rise to the transmission of the signal. For example, it is desirable to distinguish between signals that result from mechanical impact as a result of a forcible attack on the door or door frame from those occasioned by attempts to pick the lock, and those occasioned by attempts to prise the lock from the door (removal of the lock from its mounting surface). Such information may be useful in discriminating between genuine attacks (genuine intrusions), tampering, and false alarms, i.e. in verifying that a security alert is one that can be passed to the police for them to take action.
- the processor is configured to indicate in the signal the sensor that gave rise to the transmission of the signal, i.e. whether it was the accelerometer 275 or the magnetometer (which magnetometer if the lock contains more than one) - and, in the event that a single magnetometer is provided, the nature of the change in the observed magnetic environment, e.g. whether the magnetometer is detecting some change in the magnetic field from a door magnet 270 or from a frame magnet, and whether the change is a reduction in magnetic field strength, and increase in magnetic field strength or a change in polarity - both of which suggesting a possible attempt to fool the system by adding a rogue magnet to trick the magnetometer (“masking”).
- This information may also be useful in discriminating between genuine intrusion attacks, tampering, and false alarms, for example in discriminating between vibrations caused by an intrusion and vibrations caused by road or rail traffic or impacts from a kicked football.
- the invention also contemplates alternative arrangements in which the electronics of the smart lock are provided in a unit other than the lock case.
- a mortice lock in which the main mechanical parts of the lock are provided within a mortice in a door (preferably contained within a lock case within the door), a separate unit may be provided (preferably) on the protected (e.g., inner) face of the door to house the electronics of a smart lock, the separate unit being mechanically coupled to the mechanical parts of the lock within the door.
- Such an arrangement can be used to enable smart lock functionality to be “retrofitted” to a previously installed lock, for example by removing the existing lock cylinder and replacing it with a new cylinder which provides mechanical connection to the new separate unit by means of which the lock may be locked or unlocked remotely. If the lock assembly provides a latch arrangement this may also be coupled to the new separate unit to enable a motor or other actuator (e.g., a solenoid) to operate both the lock bolt and the latch, potentially enabling contactless opening of the door.
- a motor or other actuator e.g., a solenoid
- FIG. 3A shows a mortice lock 300 installed in a mortice (cavity) formed within a door 302, viewed from the protected, e.g., inner, side of the door.
- the lock includes a lock case 304, shown in phantom, within which are received the bolt 306 and a latch 308.
- the bolt 306 is shown here retracted, so that only the free end of the bolt can be seen in the forend 310 of the lock, in which condition the door 302 can be opened from the closed position.
- the lock 300 is secured within the mortice by screws 312, 312’ that pass through the forend 310 into the material of the door.
- the lock is lockable and unlockable by virtue of the keyed cylinder 314, here shown removed from its bore 315 in the lock towards the inner side (the protected side) of the door.
- the cylinder shown is a Euro Cylinder in which a key operates a pin and tumbler arrangement (other cylinder types are of course used and the invention is equally applicable to locks using such other cylinder types).
- a keyhole 316 is provided at each end of the cylinder, and by inserting a correctly coded key into a keyhole 316 it is possible to rotate a revolving cam 318 which has an integral tongue 320 which, when installed in the lock, is effective to move the bolt 306 in and out of the lock case 304, and thereby unlock and lock the door 302 to an associated doorframe (not shown).
- the free end of the bolt enters an aperture or “keep” in the doorframe to lock the door in the closed position.
- the cylinder 314 is fixed in position in the lock by means of a retention screw, not shown, which passes through an aperture 322 in the forend of the lock. It will be appreciated that the lock is shown without the usual coverplate that might normally cover the forend 310 of the lock.
- the latch 308 is opened and closed by a latch drive which engages with a square-section aperture 324 in the latch (or in a latch driver within the lock).
- the latch may be coupled to a handle or knob (one on each side of the door) by means of which the latch may be retracted. Often latches are spring loaded so that they reset to the position shown, with the latch tongue protruding from the lock when pressure on the handle or knob is relaxed.
- the latch is coupled to be driven by the cylinder so that extra rotation of the cylinder in one direction retracts the latch, and rotation in the opposite direction does the opposite - in which case no latch handle may be provided, or a latch handle only provided in the protected side of the door.
- Figure 3A two Euro cylinders are shown: to the left, a conventional cylinder 314 with a keyhole 316 in each end; to the right, a new cylinder 314’ in which, in place of the keyhole on the protected side of the door, an elongate tongue 326 protrudes.
- the tongue 326 will engage with the mechanism of an assembly which includes the mechanism and electronics of an electronic lock.
- This assembly which will be described with reference to Figures 3B and 3C, will be fitted in place of the escutcheon 328 that surrounds the bore 315 for the cylinder 314.
- FIG. 3B an assembly which includes the mechanism and electronics of an electronic lock is housed within a knob 330 which attaches to the door 302 by means of a fixing plate 332 which itself has been mounted to the door in place of the escutcheon 338.
- the fixing plate 332 is secured to the inner face of the door by means of a pair of fixing screws 334.
- the fixing plate includes engagement portions, here shown in the form of projections 336, which may be in the form of flanges, which mate and lock into engagement with corresponding formations within the knob 330.
- the fixing plate 332 and the knob may be kept locked together by one or more hidden grub screws each concealed in respective bores 338 through the (here) curved surface of a first part 340 of the knob 330.
- the bulk of the length of the knob forms a body 339 that extends over and receives the first (or inner) part 340.
- Figure 3B shows a set of one or more visual indicators 341 , for example in the form of RGB LEDs by means of which a status of the electronic lock and/or a mode or condition of the electronic lock may be indicated.
- Figure 3B shows one or more apertures 342 formed in the main surface of the fixing plate 332.
- Each aperture 342 provides a window through which the magnetic field of a magnet 270 can pass unimpeded.
- the magnet 270 may be surface-mounted to the door within the window provided by an aperture 342, or the fixing plate may be used as a template (or jig) to enable a recess or bore to be formed (e.g.
- a magnet may be embedded in the door and concealed beneath a wooden or plastics cap, possibly prior to securing the fixing plate to the door.
- one or more magnets 270 may be mounted to the door in this way, to cooperate with the magnetometer(s) 264 of the electronic lock, as described with reference to Figure 2.
- FIG. 3C shows schematically a longitudinal section through the assembly 330, the fixing plate 332, the lock case 304, the door 302 and the doorframe.
- the assembly comprises the knob 330 which is fitted over an inner part 340.
- the inner part 340 includes the engagement portions 350 which mate and lock into engagement with the engagement portions 336 of the fixing plate 332.
- the tongue 326 of the cylinder 314’ extends through an aperture in a pcb 251 (or between a pair of pcbs) that carries the bulk of the electronic components of the smart lock, including the processor 258, memory 260, RF transceiver 262, magnetometers 264, and the accelerometer 275.
- two magnetometers are used, one for tamper detection using a magnetic field from a door mounted magnet 270, and the other 264’ for sensing door open status (and hence potentially an intrusion) using a magnetic field from a frame-mounted magnet 266, although the same functionality may be provided using just a single magnetometer.
- the processor Connected to the processor, but optionally mounted off the pcb 251 , are the loudspeaker/sounder 263 and the indicators 341.
- the assembly includes a battery power supply including batteries 252, a charging arrangement 254, together with a charging socket 256 (preferably on the underside of the knob).
- the lock mechanism includes an electrically controlled actuator 246 (e.g., a motor or solenoid) and optional an associated mechanism 352 that are configured to apply a rotating torque between the inner part 340 of the knob and the tongue 326, to rotate that the cylinder 314’ in the lock - to withdraw the bolt 244 into the lock case 304 or to extend the bolt 244 from the lock case 304.
- a force transfer arrangement 354 may be provided between the cam tongue 320 and the bolt.
- the lock may be so configured that rotation (e.g., over rotation) of the cam 318 also operates the latch 308.
- Figure 3 shows arrangements suitable for a conventional door, those skilled in the art will appreciate that the same assembly and modified cylinder could equally well be used in conjunction with a door (or French Window, Patio Door, etc. or the like) having a Multi-Point Locking System (which typically have a minimum of 3 locking points that all lock simultaneously when the mechanism is engaged).
- a cylinder lock e.g. a Euro Cylinder Lock
- locking typically involves manual activation of a door handle to engage the various locking points with their counterparts before the lock will lock.
- this engagement phase may require the application of too much torque for sensible application of the described electronic lock addition (if for no other reason than due to short battery life), the locking and unlocking step distinct from the engagement/disengagement operations could potentially be handled using the system as just described.
- the smart lock is provided with a clutched handle or knob on each side of the door, the mechanism of the smart lock being configured to control the clutch arrangement to, in the unlocked condition, enable the bolt to be withdrawn, and in the locked position to decouple the handles/knobs from the bolt so that they are incapable of withdrawing the bolt to unlock the door.
- a larger body not in the form of a knob may be used to house the added mechanism - and such an arrangement may be configured to include a powered latch actuator.
- a video doorbell 100 includes a processor 400, which may be a microcontroller, with an associated memory 402 that stores program instructions (“software”) that when run on the processor 400 control the operation of the video doorbell 100.
- a pair of transceivers 404, 406, is provided.
- a first of the transceivers 404 supports Wi-Fi communication with a Wi-Fi access point (AP), such as Wi-Fi router 112 of Figure 1 , for the communication of video signals from video camera 408 and audio signals from microphone 410.
- the second transceiver 406 supports a lower bandwidth channel which supports the transmission of control signals to, and event notifications from, alarm peripherals such as smart lock 106, external video cameras, door/window contacts (that detect the state - open or closed, of windows or doors), etc.
- the low bandwidth channel or channels may be provided using a suitable allocated frequency or frequencies in the industrial, scientific, and medical (ISM) bands - such as (in Europe) 868MHz.
- ISM industrial, scientific, and medical
- communications on the low bandwidth channel(s) are encrypted.
- the primary reason for using a low bandwidth transmission channel is to enable the use of transceivers (in the alarm peripherals) having a low power consumption (and in particular lower power consumption than notoriously power-hungry Wi-Fi transceivers) so that the battery powered alarm peripherals can achieve the necessary 3-to-5-year minimum battery life.
- the transceivers 404 and 406 are coupled to an antenna arrangement 412 which typically comprises (multiple) separate antenna elements for the two transceivers 404 and 406.
- One or both of the transceivers 404, 406, may support other transmission bands/protocols, such as BlueTooth (RTM) or BLE for example.
- the video doorbell 100 also includes a chime trigger device 414, which may comprise a mechanical switch or “bell push”, and preferably one that provides tactile feedback upon activation.
- the chime trigger device 414 may be co-located with a lens of the video camera 408, but may equally well be provided separately so that the video camera lens does not need to move when the chime trigger device 414 is activated.
- the video doorbell 100 preferably also includes (or may be connected to) a keypad 416 for the entry of digits (such as passcodes or PINs).
- a keypad 416 for the entry of digits (such as passcodes or PINs).
- the keypad 416 is a mechanical device that provides tactile feedback upon activation.
- the video doorbell 100 also includes a motion sensing arrangement 417 which may be used to trigger the video camera for the recording of motion-triggered video capture and the flagging (notification) of movement - although the video camera may be arranged to be always live to provide continuous surveillance.
- the motion sensing arrangement may include one or more passive infrared sensors.
- the motion sensing arrangement may use radar and or ultrasound to determine the distance of an object (e.g., a person) from the video doorbell, and this may be combined with passive infrared presence detection and/or other kinds of presence detection.
- the video doorbell may have an associated app or online tool to enable a user to set activity zones, ranges, configure sensitivities, etc., so that notifications in respect of detected motion or presence are not for example transmitted in respect of movement detected in public spaces (e.g., by people walking on a pavement outside the premises, or vehicles passing by along a road outside the protected premises).
- the video doorbell 100 preferably also includes lighting 418 (in the form of one or more light sources), in particular infra-red lighting, but optionally also lighting to provide illumination with visible light.
- lighting 418 in the form of one or more light sources, in particular infra-red lighting, but optionally also lighting to provide illumination with visible light.
- the video doorbell 100 may also include a display 419 for the display of messages and userfeedback. Although it would be possible to include the function of the keypad 416 into the display 419, by using a touch-sensitive display, it is preferred to keep these functions separate and to use a separate mechanical keypad 416, both for reasons of durability and energy consumption.
- the video doorbell 100 also include a loudspeaker 420 for reproducing speech from a user at user device 108, for announcements from the processor 400, and to function as an alarm sounder or siren on the occasion of an alarm event - as will be explained later.
- the provision of at least one speaker (two or more may be provided) along with at least one microphone (two or more may be provided) enables two-way audio between a person at the video doorbell and another person, for example a designated user via a user device (e.g., smartphone with a video doorbell app or a security monitoring system app).
- the presence of one or more microphones 410 also enables the use of voiceprint identification as a form of access control - so that, for example an occupier of the premises, or a trusted visitor (such as a nurse, carer, cleaner, etc.), who has stored a voiceprint on the system can gain admittance to the house by speaking to the video doorbell which compares the given voice sample with known stored voice samples to identify the speaker. If the identified speaker is on an approved list of people, the video doorbell sends an instruction to a smart lock on the relevant access door to enable the identified speaker to open the door to gain admittance to the protected premises.
- the video doorbell 100 also include a near field communication (NFC) antenna 420 to enable near field communication with an NFC device such as a dongle, smart watch, NFC sticker, or suitable equipped mobile phone - for example to authenticate a user and possibly to unlock an associated smart lock 106 to gain admittance to the protected premises.
- NFC near field communication
- the video doorbell 100 is provided with an external housing or enclosure 421 to protect the components of the doorbell.
- the housing 421 is provided with tamper detection 413 that operates to generate a tamper alert if the housing is removed from the video doorbell 100.
- a tamper alert is preferably treated by the controller of the security monitoring system (the controller either being provided by the video doorbell itself or by a separate entity), irrespective of the armed state of the security monitoring system.
- Users (or the owner(s)) of the security monitoring system may be provided with an app by means of which the controller of the security monitoring system may be pre-warned of a planned event that would otherwise be treated as an alarm event, so that the controller of the security monitoring system can be configured in effect to ignore the planned event when it occurs. For example, it may be necessary to remove the housing 421 of the video doorbell to replace a defective battery 426.
- a user or service engineer can prevent the security monitoring system controller from treating the removal of the housing as a tamper event to be reported as an alarm event.
- the same principle applies equally to the lock 106 and its tamper detection.
- the video doorbell 100 is preferably provided with a mains power feed 422 coupled to a power supply 424 that includes a rechargeable battery 426 (as an auxiliary power supply for use in the event of mains failure) and a charging arrangement 228 to manage charging of the rechargeable battery 426.
- the video doorbell 100 also includes an interface 430 (such as a micro USB port, a USB-C port or a “Lightning” socket) to accept a low voltage (e.g. 5V or 20V) supply (e.g.
- FIG 5 illustrates schematically an embodiment of a home security monitoring (home alarm) system 500 built around a video doorbell 100 that functions as the controller of the system 500.
- the system 500 includes a smart lock 106 as described with reference to Figure 2 and/or Figure 3, so that the system user (e.g. the householder) is able remotely to unlock the door 102 to which the lock 106 is attached to admit a visitor having first vetted the visitor by means of the video camera of the video doorbell 100.
- the system 500 includes alarm peripherals such as a door contact 502, for example on the back door 504 of the house, that may be a magnet sensing switch (such as a reed relay) that detects whether the door 504 is open or closed and that transmits an alert that is received by the second transceiver 406 (e.g. 868MHz transceiver) of the video doorbell 100 and processed by the processor 400 to generate, if the system is armed, an alarm event signal that is addressed to a remote (e.g. cloud-based) alarm reporting service 110 and transmitted by the first (e.g. Wi-Fi) transceiver 404 (the speaker of the video doorbell may also immediately be activated as a siren or to provide some other sonic deterrent).
- the transmitted alarm event signal is received by the Wi-Fi access point (AP) 112 of the premises and passed via a broadband connection to the internet 115 and thus to the cloud-based alarm reporting service 110.
- AP Wi-Fi access point
- the identity of the security monitoring system (which may be that of the video doorbell 100) which is included in the alarm event signal is checked against a database of registered system identities to retrieve an address (e.g. a SIP address, a mobile phone number, email address) corresponding to the registered alarm system identity.
- the alarm reporting service 110 then sends a notification to the registered address so that a user is, for example, presented with a notification (e.g. a native notification) on their smartphone 108 or other personal electronic device, and/or an automated phone call providing details of the alarm event - e.g. the identity/type/location of the sensor (e.g. back door contact sensor) that has been triggered.
- a user receiving such a notification may be able to request the streaming of video or the transmission of images from cameras 506, 506’ installed in or at the premises (e.g. house) of the security monitoring system installation: for example a push notification may include one or more “action buttons” that upon activation by the user cause the user’s device 108 to transmit an instruction to the alarm reporting service 110 for the alarm reporting service 110 to send an instruction to the controller of the security monitoring system 500 (i.e. the processor of the video doorbell) to transmit activation signals to wake the cameras 506, 506” causing them to capture and send images and/or video.
- the controller of the security monitoring system 500 i.e.
- the processor of the video doorbell receives these video transmissions using the first (Wi-Fi) transceiver 404, and the same transceiver is used to onward transmit the images/video to the alarm reporting service 110 by means of the Access Point 112 and the Internet 115.
- the alarm reporting service 110 onward transmits the images/video to the user’s device 108.
- the alarm reporting service 110 is preferably configured to store (if the user has paid the necessary subscription fee) images/video captured in this way.
- Each of the video cameras 506, 506’ may be in effect an “off the shelf” video camera (as a means of keeping costs down) that includes just one transceiver, and that transceiver may support Wi-Fi but not a secondary, low bandwidth channel.
- the video doorbell in its guise as system controller of the security monitoring station must communicate with, and receive communications from, the cameras solely by means of Wi-Fi - that is using the first transceiver 404.
- the video cameras 506, 506’ support both Wi-Fi and a relevant second channel for communication with the video doorbell’s second transceiver 406 - and preferably this functionality is provided by the inclusion of a second transceiver in each of the cameras 506, 506’.
- the user’s device may also be programmed with a complementary app that enables the user to send instructions to the video doorbell (which in this embodiment functions as the controller of the security monitoring system) to cause activation of selected video cameras so that the user can “check in” on the home while away from home, and also to arm/disarm the alarm system.
- Images and video from the cameras 506, 506’ are preferably transmitted over Wi-Fi between the camera 506, 506’ and the video doorbell 100 - and hence these images and video will be received by the first transceiver 404 which is also used for onward transmission to the access point 112.
- the system may also be configured to send lower resolution images, and/or lower framerate video using the low bandwidth channel (e.g.
- the processor of the video doorbell being configured to onward transmit the first image/video to arrive and then subsequently to onward transmit the corresponding higher resolution/higher framerate image/video if and when that arrives.
- the wider bandwidth channel e.g. Wi-Fi
- notifications are also preferably provided to the alarm reporting service 110 (and onwards to the user device 108) in respect of alerts received from other alarm peripherals such as motion-triggered cameras 506, 506’, and a window contact sensor (which may also or instead function as a window shock sensor) 508 which is associated with a window 410.
- alarm peripherals such as motion-triggered cameras 506, 506’, and a window contact sensor (which may also or instead function as a window shock sensor) 508 which is associated with a window 410.
- a tamper alert received from the door lock as the result of, for example, an attempt to prise the lock 106 away from the door 102 or as the result of the lock’s magnetometer sensing the opening of the door when the lock has not been unlocked, or the detection of a tamper event (such as attempted lock picking or another attack - such as the detection of a drilling attack - on the lock) may be sensed and reported by the accelerometer 275 of the smart lock, and may be processed by the processor 400 of the video doorbell (in this embodiment) and thus be notified to the user via the alarm reporting service 110.
- Event notifications from the alarm peripherals are generally provided over a low bandwidth channel, for reception by the second transceiver 406 of the video doorbell, since most of the simpler peripherals (e.g. door contacts, motion sensors, shock sensors) do not require a high bandwidth channel (e.g. do not require something like Wi-Fi) but do need to be low cost and have very long battery life - so that they will generally each contain only a single transceiver, and that configured for communication with the second transceiver 406.
- the simpler peripherals e.g. door contacts, motion sensors, shock sensors
- alarm peripherals in the form of video cameras benefit from the provision of a large bandwidth channel, such as Wi-Fi, because timely transmission of good quality video images (in colour, with high resolution and an acceptably high frame rate) requires quite a high bandwidth, and hence video camera peripherals will almost always include a Wi-Fi transceiver and consequently will almost always be primarily mains powered (preferably with battery backup).
- a large bandwidth channel such as Wi-Fi
- Wi-Fi transceiver could be used for the transmission of event notification signals - to be received by the video doorbell using the first transceiver 404, it is preferred (if the budget will allow) to provide video cameras that can report events using a low bandwidth channel (for reception by the second transceiver 406) and that preferably include an additional transceiver to enable this (although of course a single, multifunction transceiver could be used instead).
- video camera peripherals with the capability for both narrowband and broadband communication we make it easier and more convenient to upgrade a system such as that of Figure 5 to the enhanced system of Figure 6, as will be described below.
- the capability of the video doorbell to detect presence (for example using a PIR sensor and/or radar, or using the camera) enables the video doorbell itself to function as an alarm peripheral of the system. In this way, when the system is armed, the video doorbell may communicate an alert just as it does when another alarm peripheral is triggered. While this may only be appropriate under certain circumstances (notably circumstances dictated by the likelihood of false alarms caused by “safe” actors), it is a potentially valuable option.
- the processor 400 of the video doorbell 100 in its guise as controller of the security monitoring system is also configured to check the status of the peripherals, including the quality of the communication channel, peripheral battery status, etc.
- the video doorbell with the security monitoring system controller functionality will, in addition to being retrofitted to existing homes, also be installed in new-build homes, preferably along with the smart lock as described with reference to Figures 2 or 3, together with at least one alarm peripheral, preferably in the form of a motion sensing video camera, like 506, 506’, and preferably another alarm peripheral in the form of a door contact to sense the state (open or closed) of the back door (or other secondary access door of the premises).
- a system could be installed for relatively little cost, and the lock 106 and its door magnet 270 could, for example be factory installed - or at least the door could be factory prepared for on-site installation of the lock 106 and the door magnet 270.
- Figure 6 corresponds generally to Figure 5, as it is based on the assumption that a system such as that illustrated in Figure 5 has been upgraded to include the benefits of professional monitoring by means of a remote alarm receiving centre 602 - although it is contemplated that security monitoring systems such as that shown in Figure 6 may be installed ab-initio.
- the security monitoring system 600 differs from the system 500 of Figure 5 in that it includes a standalone alarm control unit 604 which is configured to control the security monitoring system 600, rather than relying on the video doorbell to act as controller.
- the video doorbell 606 of the system 600 may be, and preferably is, the video doorbell 100 that controlled the system 500, but with its processor reconfigured (e.g. through suitable reprogramming or system updates) to operate (at least in part) as a peripheral reporting to the alarm control unit 604 rather than continuing to act as the controller of the system 500.
- the present disclosure thus contemplates, as one option, an initial installation that comprises a video doorbell as previously described, operating as the controller of a security monitoring system that preferably includes a lock, such as the lock previously described with reference to Figures 2 or 3, and at least one other installed alarm peripheral comprising either a door/window contact to detect the status of a door or a window, or a separate motion triggered video camera, the alarm peripheral including a transceiver for communication with the first transceiver of the video doorbell.
- a security monitoring system that preferably includes a lock, such as the lock previously described with reference to Figures 2 or 3, and at least one other installed alarm peripheral comprising either a door/window contact to detect the status of a door or a window, or a separate motion triggered video camera, the alarm peripheral including a transceiver for communication with the first transceiver of the video doorbell.
- the present disclosure further contemplates a method comprising upgrading such an initial installation by introducing a standalone alarm control unit 604 which is configured to control the security monitoring system 600 and reconfiguring the video doorbell so that its processor is reconfigured to operate (at least in part) as a peripheral reporting to the alarm control unit 604 rather than continuing to act as the controller of the system 500.
- the video doorbell may act as a control interface of the system, so that a user (e.g. an occupier) can send from it arm/disarm and lock/unlock commands which are received and acted upon by the standalone alarm control unit 604.
- the alarm control unit 604 includes, like the video doorbell described with reference to Figure 4, a processor 610, which may be a microcontroller, having an associated memory 612 that stores program instructions (“software”) that when run on the processor 610 control the operation of the alarm control unit 604 and of the security monitoring system 600.
- a processor 610 which may be a microcontroller, having an associated memory 612 that stores program instructions (“software”) that when run on the processor 610 control the operation of the alarm control unit 604 and of the security monitoring system 600.
- At least a pair of transceivers 614, 616, is provided.
- a first of the transceivers 614 supports Wi-Fi communication, the alarm control unit being configured to operate as an access point of a WiFi network (having a first SSID which is dedicated to the security monitoring system) which may operate in parallel with another Wi-Fi network (having a second SSID) which may support “household Wi-Fi needs” such as supporting video streaming services (e.g.
- the alarm control unit 604 is configured to receive video signals from video cameras 506, 506’ using the first of the transceivers 614.
- the second transceiver 516 supports a lower bandwidth channel which supports the transmission of control signals to, and event notifications from, alarm peripherals such as the video doorbell 606, smart lock 106, video cameras 506, 506’ (if they contain the relevant functionality, otherwise event notifications, etc. are received via Wi-Fi) door/window contacts such as 502 and 508, etc.
- the low bandwidth channel or channels may be provided using a suitable allocated frequency in the industrial, scientific, and medical (ISM) bands - such as (in Europe) 868MHz.
- communications on the low bandwidth channel(s) are encrypted.
- the primary reason for using a low bandwidth transmission channel is to enable the use of transceivers (in the alarm peripherals) having a low power consumption (and in particular lower power consumption than notoriously power-hungry Wi-Fi transceivers) so that the battery powered alarm peripherals can achieve the necessary 3 to 5 year minimum battery life.
- the transceivers 614 and 616 are coupled to an appropriate antenna arrangement (not shown) which typically comprises (multiple) separate antenna elements for the two transceivers 614 and 616.
- One or both of the transceivers 614, 616 may support other transmission bands/protocols, such a BlueTooth (RTM) or BLE, etc..
- At least one transceiver is provided that is configured or is configurable to communicate using 4G or 5G (or using any other suitable PLMN data protocol) for communicating with the ARC 502, for example in the event of loss of power at the premises or the loss of wired connection to the Internet 115 - e.g. as the result of malicious action by a villain.
- 4G or 5G or using any other suitable PLMN data protocol
- the alarm control unit 604 is preferably configured to operate in at least an “armed away” mode, in which the security of the perimeter of the premises is monitored by means of door and window sensors such as door sensor 502, smart lock 106, and window sensors 508, and in which at least one presence sensor monitors the interior of the premises.
- the internal presence sensor may be a passive infra-red sensor which may or may not be associated with a video camera.
- internal presence may be detected using so-called Wi-Fi sensing, with the alarm control unit running a Wi-Fi sensing algorithm and the video doorbell and/or some other static Wi-Fi node (or access point) acting as an illuminator for the Wi-Fi sensing.
- the alarm control unit 604 is preferably also configured to operate in a disarmed mode in which internal presence is not monitored and in which alert signals received from door and window sensors are largely ignored by the alarm control unit 604. But the alarm control unit 604 is preferably configured to respond to tamper signals from, for example the lock 106, or other alarm peripherals, even in the disarmed mode - because villains and other bad actors may take advantage of the disarmed state to attempt to sabotage or disable peripherals and other components of the system 600.
- the alarm control unit 604 is preferably also configured to operate in at least one “armed at home” mode, in which internal presence is generally not monitored (or at least alerts received in respect of detected presence are ignored by the alarm control unit 604) but in which security of the perimeter or part of the perimeter is monitored, so that event signals in respect of detected door openings and detected window openings are alerted and possibly also reported as alarm events (optionally after giving time for a user on site to flag the detected event as a false alarm, for example by entering a security code at a user interface, or presenting a dongle, token, or mobile phone, at for example an NFC interface).
- the alarm control unit 604 is operatively coupled to a remote Alarm Receiving Centre (ARC) 602 preferably both by a wired connection (e.g., broadband) and one or more wireless (e.g. SigFox (RTM), PLMN using e.g. GPRS, LTE, 4G, or 5G) connection.
- ARC Remote Alarm Receiving Centre
- RTM SigFox
- PLMN e.g. GPRS, LTE, 4G, or 5G
- Notifications received by the alarm control unit 604 and that fit the profile of potential “alarm events” are reported to the ARC 602 along with the identity of the alarm installation 600.
- images/video may also be sent to the ARC.
- human operators at the ARC will review the event notified, and will attempt to verify the event as an actionable alarm event, based for example on the content of the images/videos, sounds received from microphones at the premises, interactions with a user on site (for example over a user interface at the monitored premises). If a notified event is verified as an actionable event (e.g., a break in, burglary, fire, etc., or a medical emergency), an alert is raised with the local police and/or other emergency response personnel/service (e.g., the fire brigade, paramedics, etc.).
- the ARC may additionally contact a registered user or other human contact (relative, support person, carer, etc.) by sending a push (or other) notification to a user device 108, for example using a technique as described previously.
- the video doorbell 606 communicates events to, and receives control signals from, the alarm control unit 604 preferably using a low bandwidth channel via the second transceiver 616.
- the wider bandwidth of a Wi-Fi channel, provided by the first transceiver, is preferably used for transmission of images/video from the video doorbell to the control unit 604, the control unit onward transmitting the images/videos to the ARC 602 and optionally to a user device such as 108 via a backend service 110 that sends push notifications to a user’s personal communication device 108 when the doorbell is pressed (or optionally when someone approaches the doorbell 100).
- control unit 604 may use its broadband 114 connection to the Internet 115, the backend service 110 sending push notifications out to a public land mobile network (PLMN) 116 by means of which notifications are delivered to the user’s personal communication device 108.
- PLMN public land mobile network
- the same communication path may be used to stream live video (and sound) from the video doorbell 100 to the user.
- a reverse communication path is also supported to enable the user to speak to a person at the doorbell 100, and also to enable the user to activate (i.e. release) the lock 106 to enable the person at the door to open the door 102.
- the signals to activate (release) the lock are passed to the lock 106 via the control unit 604 that communicates with the lock 106.
- the video camera, processor, and software of the video doorbell are preferably together configured to capture and stream (on demand, or as needed) full HD (e.g. 1080p) video.
- the controller of the system is preferably configured to respond to the entering of a “duress code” at the keypad of the video doorbell by alerting either the ARC 602, in the case that the controller is the control unit 504, or by alerting designated individuals by calls (e.g. SIP calls) or notifications, preferably in each case supplying images or video captured at the time the duress code was entered (and perhaps from 30 seconds or more before the duress code was entered).
- a duress code is a code (e.g. a PIN) which can be used to disarm the security monitoring system, or to gain admittance to the premises, or both, but which is additional to a “normal” access code.
- the controller of the system is preferably configured to enable access to the protected premises (e.g. by unlocking the lock 106 and either disarming the system or at least temporarily ignoring a door open signal in respect of the relevant access door) based on FacelD - i.e. recognising the face of a visitor as corresponding to the face of a stored identity (the controller storing, or having access to a store of, facial recognition data for one or more known identities to whom access is to be provided).
- the controller of the system is preferably configured to enable access to the protected premises (e.g. by unlocking the lock 106 and either disarming the system or at least temporarily ignoring a door open signal in respect of the relevant access door) based on recognising a QR code, e.g. a dynamic QR code, that is presented to the camera of the video doorbell - for example by a visitor (or occupant) displaying a QR code on the display of the phone or other portable device (such as a smart watch).
- a QR code e.g. a dynamic QR code
- any QR code generated by or in association with the system has a limited lifetime of 24 hours or less (shorter lifetimes, e.g. 12 hours, 6 hours, 4 hours, may also be used beneficially), to improve system security.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
An electronically controlled lock for a door of premises, the lock comprising a processor and coupled to the processor: a lock RF transceiver; one or more magnetometers.
Description
DESCRIPTION
ELECTRONICALLY CONTROLLED LOCK FOR A DOOR AND PREMISES SECURITY
MONITORING SYSTEM COMPRISING SUCH A LOCK
Technical field
The present invention relates to an electronically controlled lock for use as an element of a premises security monitoring system, to premises security monitoring systems including such a lock, and to corresponding methods.
Background
House breaking, breaking and entering, burglary, theft from premises and criminal damage to premises such as homes and businesses are problems that have troubled human society for centuries, and possibly for millennia. Perhaps surprisingly, burglar alarms have been around in some guise since the 18th century, while the first electric burglar alarm was apparently patented in 1853 by the Reverend Augustus Russell Pope and rang a bell if a door or window was opened. Perhaps more surprisingly, the Pope invention was quickly commercialised and used as the basis for a monitored alarm service in which signals from alarm installations were carried over telephone lines to staff working in a remote monitoring station.
Nowadays, security monitoring systems are very common and come in many guises, but the most secure systems still rely on remote monitoring. For example, in Europe, technical standard, EN 50131 , for intruder alarm systems grades alarms from 1 to 4 (least secure to most secure), and in order to qualify as grade 2 or higher an intruder alarm system must be remotely monitored. The grade or category of an installed intruder alarm system is an indication of the ease with which the system can be circumvented, and the degree of security provided, which are significant for insurance cover. The grade of an alarm installation is dictated by the grade of the lowest graded component of the system.
Various kinds of electronically controlled lock have been available for many years, but in recent years so-called smart locks controllable by an associated user interface, such as an app on a smartphone, have become available for doors of residential premises. A user can control the lock wirelessly, for example using a smartphone, to unlock the lock of a door as the user approaches the door. But by combining such a lock with some form of video monitoring of the relevant door it is possible for a user to be confident to open the lock remotely, to provide
someone else with access to the premises even if the premises are unoccupied. The same set up can of course be used by an occupant within the premises to let someone else into the premises without the occupant actually having to go to the relevant door - which is convenient for the elderly, the infirm, or to anyone who is otherwise occupied - perhaps in a bathroom, or in the middle of preparing a meal. Often such remote control (whether the degree of remoteness is best measured in metres, kilometres or hundreds or even thousands of kilometres) relies on users being provided with a suitable user interface, for example a software application on a smart phone or the like, that shows images from the monitoring installation, provides an audio channel to enable conversation between the user and the person at the lock installation, and one or more action buttons to enable the lock to be activated (unlocked), an alarm raised, or possibly for the event to be handed off to another entity.
Given that many premises security monitoring systems include some form of video monitoring of the main access door of the premises, and given that providing a smart lock the main access door of the premises provides great user convenience when combined with video monitoring, it might be thought natural to integrate a smart lock into a premises security monitoring system. But the problem is that most smart locks do not satisfy the requirements of EN50131 , or at best only satisfy the requirements of Grade 1 - meaning that they cannot sensibly be incorporated into a system that otherwise meets the requirements of Grade 2 or above.
There therefore exists a need for a smart lock that could satisfy the requirements of EN 50131 Grade 2.
Summary
According to a first aspect there is provided an electronically controlled lock for a door of premises, the lock comprising a processor and coupled to the processor: a lock RF transceiver; one or more magnetometers; and an accelerometer; wherein: the accelerometer is configured to operate as a shock sensor, the processor and the accelerometer together functioning as a shock detector to generate a tamper signal in the event that an attempt is made to pick or interfere with the lock; at least one of the one or more magnetometers being configured to detect the presence of one or more door magnets located outside the lock but within or attached to the door, the magnetometer generating a tamper signal as the result of an increased separation, between the magnetometer and the one or more door magnets, caused by the removal of the lock from the door; wherein the processor is configured to transmit a
tamper signal, using the lock transceiver, in the event that an attempt to remove the lock from the door is detected or in the event that an attempt is made to pick or interfere with the lock.
Such a lock may be certified according to EN 50131 - 2-8 (shock detectors) Grade 2, and hence be suitable for integration into security monitoring systems of at least EN 50131 Grade 2, and provide a high level of security.
Preferably the processor and the accelerometer together function as a shock detector to generate an alert signal in the event that an attempt is made to forcibly attack the door, and the processor is configured to transmit the alert signal, using the lock transceiver. Under certain circumstances the alert may indicate an intrusion, but under other circumstances the alert may indicate tamper - potentially depending upon the nature of the shock(s) detected, the regulatory regime, and the set-up or configuration of the accelerometer and processor. If an intrusion is detected, this should be signalled as such, whereas an attack which is insufficient to amount to an intrusion should preferably be flagged as a tamper event.
Preferably the processor is configured to indicate in alerts and tamper signals the nature of the attack that gave rise to the transmission of the signal. For example, it is desirable to distinguish between signals that result from mechanical impact as a result of a forcible attack on the door or door frame from those occasioned by attempts to pick the lock, and those occasioned by attempts to prise the lock from the door. Such information may be useful in discriminating between genuine attacks and false alarms, i.e. in verifying that a security alert is one that can be passed to the police for them to take action.
Preferably the processor is configured to indicate in the alert and tamper signals the sensor that gave rise to the transmission of the signal. This information may also be useful in discriminating between genuine attacks and false alarms, for example in discriminating between vibrations caused by an attack and vibrations caused by road or rail traffic or impacts from a kicked football.
Preferably, at least one of the one or more magnetometers is configured to sense a magnetic field produced by one or more frame magnets within or attached to a frame housing the door, the magnetometer generating a door status signal based on a quality of the sensed magnetic field. In this way the lock can generate door status information that can be used to flag breaches of security. Such an arrangement may also remove the need for a separate door contact detector, with consequent potential savings in installation and commissioning time.
Preferably the processor is configured to use the lock RF transceiver to transmit a status update message based on received status signal in the event that the status signal indicates a change in door status. In this way the controller of the security monitoring system is informed of the status of the door to which the lock is attached without the need to provide an additional door contact switch.
Preferably the processor is configured to use the lock RF transceiver to transmit an alert in the event that, with the lock in a locked state, a received status signal indicates a change of door status from closed to open. In this way, the processor of the lock can flag an evident security breach upon which the control unit of the security monitoring system can act immediately, for example activating appropriately located video cameras without waiting for instruction (e.g. from an ARC) or further confirmation from another sensor.
Optionally, an electronically controlled lock according to any variant of the first aspect includes: i) a first part comprising a lock case including a bolt that is moveable between an extended position, in which in use it engages with a keep to secure the door to which the lock is mounted, and a retracted position in which it is free of the keep so that the door is no longer secured by the lock; ii) a second part configured for mounting to a surface of the door, the second part housing the lock transceiver, the one or more magnetometers, and the accelerometer; wherein the second part further comprises an electrically controlled actuator for moving the bolt under the control of the processor, a mechanical coupling being provided between the electrically controlled actuator and the bolt. Such a configuration has wide application, not least as a way of upgrading an existing lock. The second part may take the place of an existing lock cylinder of a purely mechanical lock, to give the lock smart lock functionality. Such a configuration may also enable the use of a compact first part, possibly reducing the need to produce a large mortice. Such a configuration may also readily be applied to non-wooden doors or doors whose construction makes them unsuitable for the fitment of mortice locks, as well as potentially being applicable to doors that use multi-point locking.
Optionally, the lock transceiver, the one or more magnetometers, and the accelerometer are all mounted on a common pcb within the second part. Such an arrangement may enable a more compact design, enabling a smaller housing to be used for the lock. Optionally the mechanical coupling passes through the pcb. Such an arrangement may further facilitate more compact design.
Optionally, the electronically controlled lock further comprises a mounting bracket for securing the second part to a door, the mounting bracket including an aperture being configured to function as a jig for use in positioning a door magnet to cooperate with the magnetometer that is configured to detect the presence of a door magnet, the mounting bracket including an aperture having a size and shape corresponding to an outline of the door magnet. In this way an installer is able reliably to form an aperture in the correct location for mounting for a magnet for use with the magnetometer, while enabling the magnet to be concealed within the door.
An electronically controlled lock according to any variant of the first aspect may comprise a lock case including a bolt that is moveable between an extended position, in which in use it engages with a keep to secure the door to which the lock is mounted, and a retracted position in which it is free of the keep so that the door is no longer secured by the lock; wherein the lock case also houses the lock transceiver, the one or more magnetometers, the accelerometer, and an electrically controlled actuator for moving the bolt under the control of the processor. In this way the lock may be formed as a single self-contained unit, facilitating installation.
Optionally, the lock case is configured for use in a mortice formed within a door. Mounting the lock within a mortice in a door further helps to conceal the lock from would-be attackers, making successful attack more difficult.
Preferably the electronically controlled lock according to any variant of the first aspect further comprises a loudspeaker operatively connected to the processor. In this way the lock may function as a chime for a doorbell (e.g. a video doorbell), reducing component count and expediting assembly. The loudspeaker may also be used as an alarm sounder, and by concealing the loudspeaker in the lock a bad actor may find it more difficult to locate and disable the alarm sounder.
An electronically controlled lock according to any variant of the first aspect may be mounted to a door, the door including one or more door magnets located outside the lock but within or attached to the door. Such an assembly may conveniently be factory made, facilitating installation, particularly in new-build homes. Such a pre-installed lock and door assembly may be supplied with the door mounted in a frame that includes a keep for the lock, one or more frame magnets being provided within or attached to the frame. Such an assembly may conveniently be factory made, facilitating installation, particularly in new-build homes, encouraging adoption of systems according to embodiments of the invention.
According to a second aspect there is provided a premises security monitoring system including a system controller and an electronically controlled lock according to any variant of the first aspect, the system controller including a first RF transceiver configured to receive tamper and alert signals transmitted by the lock RF transceiver.
Preferably the system controller includes a second RF transceiver for reporting to a remote monitoring entity alerts and tamper events corresponding to signals received from the lock.
Optionally, the system controller is the controller of a video doorbell. Such an arrangement provides a basis for a simple and cost-effective security monitoring system.
Brief description of Figures
Embodiments of the invention will now be described, by way of example only, with reference to the accompanying Figures, in which:
Figure 1 shows schematically a home having a smart lock installation that includes video monitoring;
Figure 2 illustrates schematically the principal constituents of a smart lock according to embodiments of the invention;
Figure 3 - illustrates schematically some constructional details and arrangements of locks according to aspects of the invention;
Figure 4 illustrates schematically the principal constituents of a video doorbell according to embodiments of the invention;
Figure 5 illustrates schematically various constituent parts of an installation and system according to an embodiment of the invention; and
Figure 6 illustrates schematically various constituent parts of another installation and system according to a further embodiment of the invention.
Specific description
Figure 1 shows schematically a home (“premises”) having a smart lock installation that includes video monitoring of the approach to the smart lock. In this case a video doorbell 100 is provided adjacent the main entrance door 102, in this case the front door, of the house 104. The front door 102 is fitted with a “smart” lock 106 that can be locked and unlocked by electrical control signals, received, for example from a personal communication device 108 of the owner of the house. For example, the video doorbell 100 may cooperate with a backend service 110 that sends push notifications to a user’s personal communication device 108 when the doorbell is pressed (or optionally when someone approaches the doorbell 100 or other video monitoring device). In support of such communications the video doorbell may use Wi-Fi to connect to a Wi-Fi router 112 which has a broadband 114 connection to the Internet 115, the backend service 110 sending push notifications out to a public land mobile network (PLMN) 116 by means of which notifications are delivered to the user’s personal communication device 108. The same communication path may be used to stream live video (and sound) from the video doorbell 100 to the user. A reverse communication path is also supported to enable the user to speak to a person at the doorbell 100, and also to enable the user to activate (i.e. release) the lock 106 to enable the person at the door to open the door 102. The signals to activate (release) the lock may be passed to the lock 106 directly but are preferably (in this configuration) passed via the video doorbell 100 that in turn communicates with the smart lock 106. The smart lock 106 has been designed for compliance with Grade 2 of EN50131 by incorporating a shock sensor with a tamper detection function.
Figure 2 illustrates schematically the principal constituents of a smart lock 106, such as that shown on Figure 1 , according to embodiments of the invention. The lock 106 is shown installed in a door 102, with a cooperating striker plate 242 into which is received at least a bolt 244. The lock 106 may be configured as a mortice lock, in which case the lock will typically include a mortice lockset or latch (not shown) in addition to the bolt 244. Provision of the lock 106 as a mortice lock is particularly attractive if the lock is to be pre-installed into a door (or if the door is to be manufactured with mortices provided for ready installation of the lock in situ) rather than retro-fitted to a pre-hung door as a replacement for an existing lock. But commonly there is a desire, especially when replacing a surface-mounted lock, to surface-mount the lock 106 (on the protected, typically inner, side of the door 240) because installation is typically much easier and quicker if one doesn’t need to create a cavity (mortice) within the door to accept the new lock. In either case, the bolt 224 may be received in a cavity within the door, but with a surface-mounted lock the bolt may also be external of the door. The lock 106 is provided with an actuator 246, which may be a solenoid or a motor, which either drives the bolt into the locked or unlocked positions, or which engages or disengages a clutch that couples or
decouples a knob or handle 248 on the exposed face of the door and by means of which the bolt may be withdrawn into the unlocked position enabling the door to be opened from the exposed (unprotected) side. Typically, if the lock 106 is provided with a clutched handle the actuator will be a solenoid rather than a motor. The lock 106 may of course be provided with another handle or knob (not shown), on the protected side of the door 240, for operating the bolt 244 for opening and locking the door 240 from the protected (generally inner) side of the door 240.
The lock 106 includes a power supply 250 that includes a rechargeable battery 252, and a charging arrangement 254 to manage charging of the rechargeable battery 252. The charging arrangement may be coupled to a mains electricity supply, but for ease and simplicity it may be preferred to include an interface 256 (such as a micro USB port, a USB-C port or a “Lightning” socket) to accept a low voltage (e.g. 5V or 20V) supply (e.g. from a power bank or external charger) which, in the absence of a mains feed (or in the event of failure of the mains feed) may be used to recharge the rechargeable battery 252 in-situ, rather than needing the battery to be removed for recharging, so that the lock 106 can always be powered.
The actuator 246 is coupled to and controlled by a processor 258, which has an associated memory 260 which stores program instructions (“software”) that when run on the processor 258 control the operation of the lock 106. The processor 258 may be a micro-controller. Also coupled to, and controlled by, the processor 258 is a transceiver 262 which is configured to receive control signals from, and transmit event information to, a controller of the security monitoring system (e.g. from the video doorbell 100 in the embodiment illustrated in Figure 1 ). These may be relatively low bandwidth transmissions (for example in comparison to video transmissions from the video doorbell 100), so a low bandwidth channel is suitable - meaning that a low power consumption transceiver may be used, thereby facilitating an acceptably long battery life. For example, the transceiver 262 may be configured to operate using a suitable allocated frequency in the industrial, scientific, and medical (ISM) bands - such as (in Europe) 868MHz. Preferably, the communications from and to the lock are encrypted.
The lock 106 preferably also includes a chime or loudspeaker (more generally, a sound output device, for example an electromechanical chime or buzzer,) 263 which is coupled to the processor 258. This loudspeaker may be used instead of, or in addition to, a separate chime which sounds whenever the chime trigger device 214 of the video doorbell is activated - the processor 200 of the video doorbell 100 being configured to use the second transceiver 206 to transmit a chime activation signal labelled with a flag to which the lock processor 258 and/or
the processor of a separate chime sounder device (not shown) responds by using an internal sound output device to chime in response to the activation of the chime trigger device 214.
The lock 106 may be provided with a housing 259 through which the bolt 244 and any mortice lockset are free to protrude, the knob or handle 248 of course being external of the housing 259. Preferably the housing is made of an engineering plastics material or a non-ferromagnetic material so as not to interfere with the functioning of one or more magnetometers provided as part of the lock 106.
The lock 106 further includes a magnetometer 264 that is configured to sense and monitor a first magnetic field provided by a first magnet 266 that is fixedly mounted with respect to the frame 268 or other abutment against which the door 240 closes. The same magnetometer 264, or an additional magnetometer (not shown), is configured to sense and monitor a second magnetic field provided by a second magnet 270 that is attached to the door, preferably mounted within the door - that is, between the protected face and the unprotected face of the door, although it is also possible to attach (e.g. stick with adhesive or using a mechanical fixing such as a screw) a magnet 270 to the face of the door (the face on the inner side (e.g. indoor side) of the door). This second magnet 270 is external to the lock 106 and is provided so that the magnetometer configured to sense the magnetic field of the second magnet 270 can generate a tamper signal to indicate an attempt to remove the lock 106 from the door 240. Meanwhile, the magnetometer 264 configured to sense and monitor the first magnetic field provided by a first magnet 266 can provide a signal to indicate the status of the door, e.g. whether the door 240 is open or closed. The processor 258 may be configured to generate an alert signal, that is transmitted to the controller of the security monitoring system, for example the enhanced video doorbell according to some aspects of the invention, for onward reporting to a monitoring service or the owner/occupier of the house, in the event that opening of the door is detected without the lock having been unlocked and/or the alarm having been disarmed - since such a combination of circumstances indicates that the door 240 has been forced open.
The lock 106 further includes an accelerometer 275, which is also coupled to the processor 258, and which is configured to function as a shock sensor to provide the processor with signals to enable detection of attempts to “pick” the lock, drill out the lock cylinder, and other mechanical attacks on the lock, as well as providing signals in the event of attempts to batter down the door (or force open the lock) with a sledge hammer or battering ram for example. Preferably the processor 258 is configured to distinguish accelerometer signals generated as the result of a normal “I’m here!” knock at the door from signals generated as a result of much
more forceful blows characteristic of attempts to force open or break down the door. The provision of the accelerometer 275 provides a potential basis for certifying the lock as a shock detector (for an alarm system of at least Grade 2 or Grade 3) according to EN 50131 -2-8 (also referred to herein as an “alarm peripheral”.
The processor is also preferably configured to indicate in alerts and tamper signals the nature of the attack that gave rise to the transmission of the signal. For example, it is desirable to distinguish between signals that result from mechanical impact as a result of a forcible attack on the door or door frame from those occasioned by attempts to pick the lock, and those occasioned by attempts to prise the lock from the door (removal of the lock from its mounting surface). Such information may be useful in discriminating between genuine attacks (genuine intrusions), tampering, and false alarms, i.e. in verifying that a security alert is one that can be passed to the police for them to take action.
Preferably the processor is configured to indicate in the signal the sensor that gave rise to the transmission of the signal, i.e. whether it was the accelerometer 275 or the magnetometer (which magnetometer if the lock contains more than one) - and, in the event that a single magnetometer is provided, the nature of the change in the observed magnetic environment, e.g. whether the magnetometer is detecting some change in the magnetic field from a door magnet 270 or from a frame magnet, and whether the change is a reduction in magnetic field strength, and increase in magnetic field strength or a change in polarity - both of which suggesting a possible attempt to fool the system by adding a rogue magnet to trick the magnetometer (“masking”). This information may also be useful in discriminating between genuine intrusion attacks, tampering, and false alarms, for example in discriminating between vibrations caused by an intrusion and vibrations caused by road or rail traffic or impacts from a kicked football.
While the preceding description was in the context of the electronics of the lock being provided within a lock case together with the main mechanical elements of the lock, the invention also contemplates alternative arrangements in which the electronics of the smart lock are provided in a unit other than the lock case. For example, with a mortice lock in which the main mechanical parts of the lock are provided within a mortice in a door (preferably contained within a lock case within the door), a separate unit may be provided (preferably) on the protected (e.g., inner) face of the door to house the electronics of a smart lock, the separate unit being mechanically coupled to the mechanical parts of the lock within the door. Such an arrangement can be used to enable smart lock functionality to be “retrofitted” to a previously installed lock,
for example by removing the existing lock cylinder and replacing it with a new cylinder which provides mechanical connection to the new separate unit by means of which the lock may be locked or unlocked remotely. If the lock assembly provides a latch arrangement this may also be coupled to the new separate unit to enable a motor or other actuator (e.g., a solenoid) to operate both the lock bolt and the latch, potentially enabling contactless opening of the door. This approach is perhaps best understood with reference to Figure 3.
Figure 3A shows a mortice lock 300 installed in a mortice (cavity) formed within a door 302, viewed from the protected, e.g., inner, side of the door. The lock includes a lock case 304, shown in phantom, within which are received the bolt 306 and a latch 308. The bolt 306 is shown here retracted, so that only the free end of the bolt can be seen in the forend 310 of the lock, in which condition the door 302 can be opened from the closed position. The lock 300 is secured within the mortice by screws 312, 312’ that pass through the forend 310 into the material of the door. The lock is lockable and unlockable by virtue of the keyed cylinder 314, here shown removed from its bore 315 in the lock towards the inner side (the protected side) of the door. The cylinder shown is a Euro Cylinder in which a key operates a pin and tumbler arrangement (other cylinder types are of course used and the invention is equally applicable to locks using such other cylinder types). A keyhole 316 is provided at each end of the cylinder, and by inserting a correctly coded key into a keyhole 316 it is possible to rotate a revolving cam 318 which has an integral tongue 320 which, when installed in the lock, is effective to move the bolt 306 in and out of the lock case 304, and thereby unlock and lock the door 302 to an associated doorframe (not shown). The free end of the bolt enters an aperture or “keep” in the doorframe to lock the door in the closed position.
The cylinder 314 is fixed in position in the lock by means of a retention screw, not shown, which passes through an aperture 322 in the forend of the lock. It will be appreciated that the lock is shown without the usual coverplate that might normally cover the forend 310 of the lock. The latch 308 is opened and closed by a latch drive which engages with a square-section aperture 324 in the latch (or in a latch driver within the lock). The latch may be coupled to a handle or knob (one on each side of the door) by means of which the latch may be retracted. Often latches are spring loaded so that they reset to the position shown, with the latch tongue protruding from the lock when pressure on the handle or knob is relaxed. Sometimes the latch is coupled to be driven by the cylinder so that extra rotation of the cylinder in one direction retracts the latch, and rotation in the opposite direction does the opposite - in which case no latch handle may be provided, or a latch handle only provided in the protected side of the door.
In Figure 3A two Euro cylinders are shown: to the left, a conventional cylinder 314 with a keyhole 316 in each end; to the right, a new cylinder 314’ in which, in place of the keyhole on the protected side of the door, an elongate tongue 326 protrudes. The tongue 326 will engage with the mechanism of an assembly which includes the mechanism and electronics of an electronic lock. This assembly, which will be described with reference to Figures 3B and 3C, will be fitted in place of the escutcheon 328 that surrounds the bore 315 for the cylinder 314.
In Figure 3B an assembly which includes the mechanism and electronics of an electronic lock is housed within a knob 330 which attaches to the door 302 by means of a fixing plate 332 which itself has been mounted to the door in place of the escutcheon 338. The fixing plate 332 is secured to the inner face of the door by means of a pair of fixing screws 334. The fixing plate includes engagement portions, here shown in the form of projections 336, which may be in the form of flanges, which mate and lock into engagement with corresponding formations within the knob 330. The fixing plate 332 and the knob may be kept locked together by one or more hidden grub screws each concealed in respective bores 338 through the (here) curved surface of a first part 340 of the knob 330. The bulk of the length of the knob forms a body 339 that extends over and receives the first (or inner) part 340.
Also indicated in Figure 3B are a set of one or more visual indicators 341 , for example in the form of RGB LEDs by means of which a status of the electronic lock and/or a mode or condition of the electronic lock may be indicated. Finally, Figure 3B shows one or more apertures 342 formed in the main surface of the fixing plate 332. Each aperture 342 provides a window through which the magnetic field of a magnet 270 can pass unimpeded. The magnet 270 may be surface-mounted to the door within the window provided by an aperture 342, or the fixing plate may be used as a template (or jig) to enable a recess or bore to be formed (e.g. drilled, machined or carved) in the structure of the door, so that a magnet can be inserted into the body of the door. If the recess or bore is deep enough, a magnet may be embedded in the door and concealed beneath a wooden or plastics cap, possibly prior to securing the fixing plate to the door. As noted, one or more magnets 270 may be mounted to the door in this way, to cooperate with the magnetometer(s) 264 of the electronic lock, as described with reference to Figure 2. It will be understood that the position of the aperture(s) 342 with respect to the engagement portions 336, and the position of the complementary features of the assembly with respect to the accelerometer used to detect the magnetic field of magnet 270, are so chosen that when the assembly is mounted to the door the magnetometer 264 and the magnet 270 (positioned with the aid of the fixing plate used as a jig) are aligned for optimum sensitivity.
Figure 3C shows schematically a longitudinal section through the assembly 330, the fixing plate 332, the lock case 304, the door 302 and the doorframe. The assembly comprises the knob 330 which is fitted over an inner part 340. The inner part 340 includes the engagement portions 350 which mate and lock into engagement with the engagement portions 336 of the fixing plate 332. As shown, about half the length of the knob overlaps the inner part 340, with the inner part providing an enclosure or case for the electronics of the smart lock, although it will be appreciated that many possible configurations are possible. The tongue 326 of the cylinder 314’ extends through an aperture in a pcb 251 (or between a pair of pcbs) that carries the bulk of the electronic components of the smart lock, including the processor 258, memory 260, RF transceiver 262, magnetometers 264, and the accelerometer 275. As illustrated here, two magnetometers are used, one for tamper detection using a magnetic field from a door mounted magnet 270, and the other 264’ for sensing door open status (and hence potentially an intrusion) using a magnetic field from a frame-mounted magnet 266, although the same functionality may be provided using just a single magnetometer. Connected to the processor, but optionally mounted off the pcb 251 , are the loudspeaker/sounder 263 and the indicators 341.
The assembly includes a battery power supply including batteries 252, a charging arrangement 254, together with a charging socket 256 (preferably on the underside of the knob).
In the example shown in Figure 3C the lock mechanism includes an electrically controlled actuator 246 (e.g., a motor or solenoid) and optional an associated mechanism 352 that are configured to apply a rotating torque between the inner part 340 of the knob and the tongue 326, to rotate that the cylinder 314’ in the lock - to withdraw the bolt 244 into the lock case 304 or to extend the bolt 244 from the lock case 304. A force transfer arrangement 354 may be provided between the cam tongue 320 and the bolt. Similarly, the lock may be so configured that rotation (e.g., over rotation) of the cam 318 also operates the latch 308.
Although Figure 3 shows arrangements suitable for a conventional door, those skilled in the art will appreciate that the same assembly and modified cylinder could equally well be used in conjunction with a door (or French Window, Patio Door, etc. or the like) having a Multi-Point Locking System (which typically have a minimum of 3 locking points that all lock simultaneously when the mechanism is engaged). These typically work in conjunction with a cylinder lock (e.g. a Euro Cylinder Lock), although locking typically involves manual activation of a door handle to engage the various locking points with their counterparts before the lock will lock. Although this engagement phase may require the application of too much torque for sensible application
of the described electronic lock addition (if for no other reason than due to short battery life), the locking and unlocking step distinct from the engagement/disengagement operations could potentially be handled using the system as just described.
In an alternative arrangement the smart lock is provided with a clutched handle or knob on each side of the door, the mechanism of the smart lock being configured to control the clutch arrangement to, in the unlocked condition, enable the bolt to be withdrawn, and in the locked position to decouple the handles/knobs from the bolt so that they are incapable of withdrawing the bolt to unlock the door. It is also self-evident that rather than providing the additional assembly in the form of a knob, a larger body not in the form of a knob (although potentially including a knob to facilitate the pulling open of the door) may be used to house the added mechanism - and such an arrangement may be configured to include a powered latch actuator.
As previously mentioned, the smart lock 106 has been designed for use as part of a security monitoring system. In one example, such a system may be controlled by a controller of a video doorbell such as that shown as 100 in Figure 1 . Figure 4 illustrates schematically the principal constituents of an example of such a video doorbell 100, according to embodiments of the invention. A video doorbell 100 includes a processor 400, which may be a microcontroller, with an associated memory 402 that stores program instructions (“software”) that when run on the processor 400 control the operation of the video doorbell 100. A pair of transceivers 404, 406, is provided. A first of the transceivers 404 supports Wi-Fi communication with a Wi-Fi access point (AP), such as Wi-Fi router 112 of Figure 1 , for the communication of video signals from video camera 408 and audio signals from microphone 410. The second transceiver 406 supports a lower bandwidth channel which supports the transmission of control signals to, and event notifications from, alarm peripherals such as smart lock 106, external video cameras, door/window contacts (that detect the state - open or closed, of windows or doors), etc. Typically the low bandwidth channel or channels may be provided using a suitable allocated frequency or frequencies in the industrial, scientific, and medical (ISM) bands - such as (in Europe) 868MHz. Preferably, communications on the low bandwidth channel(s) are encrypted. The primary reason for using a low bandwidth transmission channel is to enable the use of transceivers (in the alarm peripherals) having a low power consumption (and in particular lower power consumption than notoriously power-hungry Wi-Fi transceivers) so that the battery powered alarm peripherals can achieve the necessary 3-to-5-year minimum battery life. The transceivers 404 and 406 are coupled to an antenna arrangement 412 which typically comprises (multiple) separate antenna elements for the two transceivers 404 and 406. One or
both of the transceivers 404, 406, may support other transmission bands/protocols, such as BlueTooth (RTM) or BLE for example.
The video doorbell 100 also includes a chime trigger device 414, which may comprise a mechanical switch or “bell push”, and preferably one that provides tactile feedback upon activation. In known manner, the chime trigger device 414 may be co-located with a lens of the video camera 408, but may equally well be provided separately so that the video camera lens does not need to move when the chime trigger device 414 is activated.
The video doorbell 100 preferably also includes (or may be connected to) a keypad 416 for the entry of digits (such as passcodes or PINs). Preferably the keypad 416 is a mechanical device that provides tactile feedback upon activation.
The video doorbell 100 also includes a motion sensing arrangement 417 which may be used to trigger the video camera for the recording of motion-triggered video capture and the flagging (notification) of movement - although the video camera may be arranged to be always live to provide continuous surveillance. The motion sensing arrangement may include one or more passive infrared sensors. The motion sensing arrangement may use radar and or ultrasound to determine the distance of an object (e.g., a person) from the video doorbell, and this may be combined with passive infrared presence detection and/or other kinds of presence detection. The video doorbell may have an associated app or online tool to enable a user to set activity zones, ranges, configure sensitivities, etc., so that notifications in respect of detected motion or presence are not for example transmitted in respect of movement detected in public spaces (e.g., by people walking on a pavement outside the premises, or vehicles passing by along a road outside the protected premises).
The video doorbell 100 preferably also includes lighting 418 (in the form of one or more light sources), in particular infra-red lighting, but optionally also lighting to provide illumination with visible light.
The video doorbell 100 may also include a display 419 for the display of messages and userfeedback. Although it would be possible to include the function of the keypad 416 into the display 419, by using a touch-sensitive display, it is preferred to keep these functions separate and to use a separate mechanical keypad 416, both for reasons of durability and energy consumption.
The video doorbell 100 also include a loudspeaker 420 for reproducing speech from a user at user device 108, for announcements from the processor 400, and to function as an alarm sounder or siren on the occasion of an alarm event - as will be explained later. The provision of at least one speaker (two or more may be provided) along with at least one microphone (two or more may be provided) enables two-way audio between a person at the video doorbell and another person, for example a designated user via a user device (e.g., smartphone with a video doorbell app or a security monitoring system app). The presence of one or more microphones 410 also enables the use of voiceprint identification as a form of access control - so that, for example an occupier of the premises, or a trusted visitor (such as a nurse, carer, cleaner, etc.), who has stored a voiceprint on the system can gain admittance to the house by speaking to the video doorbell which compares the given voice sample with known stored voice samples to identify the speaker. If the identified speaker is on an approved list of people, the video doorbell sends an instruction to a smart lock on the relevant access door to enable the identified speaker to open the door to gain admittance to the protected premises.
Preferably, the video doorbell 100 also include a near field communication (NFC) antenna 420 to enable near field communication with an NFC device such as a dongle, smart watch, NFC sticker, or suitable equipped mobile phone - for example to authenticate a user and possibly to unlock an associated smart lock 106 to gain admittance to the protected premises.
The video doorbell 100 is provided with an external housing or enclosure 421 to protect the components of the doorbell. Preferably the housing 421 is provided with tamper detection 413 that operates to generate a tamper alert if the housing is removed from the video doorbell 100. Such a tamper alert is preferably treated by the controller of the security monitoring system (the controller either being provided by the video doorbell itself or by a separate entity), irrespective of the armed state of the security monitoring system. Users (or the owner(s)) of the security monitoring system may be provided with an app by means of which the controller of the security monitoring system may be pre-warned of a planned event that would otherwise be treated as an alarm event, so that the controller of the security monitoring system can be configured in effect to ignore the planned event when it occurs. For example, it may be necessary to remove the housing 421 of the video doorbell to replace a defective battery 426. By using the app, a user or service engineer can prevent the security monitoring system controller from treating the removal of the housing as a tamper event to be reported as an alarm event. The same principle applies equally to the lock 106 and its tamper detection.
The video doorbell 100 is preferably provided with a mains power feed 422 coupled to a power supply 424 that includes a rechargeable battery 426 (as an auxiliary power supply for use in the event of mains failure) and a charging arrangement 228 to manage charging of the rechargeable battery 426. Preferably, as shown, the video doorbell 100 also includes an interface 430 (such as a micro USB port, a USB-C port or a “Lightning” socket) to accept a low voltage (e.g. 5V or 20V) supply (e.g. from a power bank or external charger) which, in the absence of a mains feed (or in the event of failure of the mains feed) may be used to recharge the rechargeable battery 426 in-situ, rather than needing the battery to be removed for recharging, so that the video doorbell can always be powered - which is an important consideration when the video doorbell also functions as the controller of a security monitoring system.
We will now consider the video doorbell’s function as a controller of a security monitoring system in the context of Figure 5.
Figure 5 illustrates schematically an embodiment of a home security monitoring (home alarm) system 500 built around a video doorbell 100 that functions as the controller of the system 500. In the illustrated example the system 500 includes a smart lock 106 as described with reference to Figure 2 and/or Figure 3, so that the system user (e.g. the householder) is able remotely to unlock the door 102 to which the lock 106 is attached to admit a visitor having first vetted the visitor by means of the video camera of the video doorbell 100.
The system 500 includes alarm peripherals such as a door contact 502, for example on the back door 504 of the house, that may be a magnet sensing switch (such as a reed relay) that detects whether the door 504 is open or closed and that transmits an alert that is received by the second transceiver 406 (e.g. 868MHz transceiver) of the video doorbell 100 and processed by the processor 400 to generate, if the system is armed, an alarm event signal that is addressed to a remote (e.g. cloud-based) alarm reporting service 110 and transmitted by the first (e.g. Wi-Fi) transceiver 404 (the speaker of the video doorbell may also immediately be activated as a siren or to provide some other sonic deterrent). The transmitted alarm event signal is received by the Wi-Fi access point (AP) 112 of the premises and passed via a broadband connection to the internet 115 and thus to the cloud-based alarm reporting service 110.
At the cloud-based alarm reporting service 110 the identity of the security monitoring system (which may be that of the video doorbell 100) which is included in the alarm event signal is checked against a database of registered system identities to retrieve an address (e.g. a SIP
address, a mobile phone number, email address) corresponding to the registered alarm system identity. The alarm reporting service 110 then sends a notification to the registered address so that a user is, for example, presented with a notification (e.g. a native notification) on their smartphone 108 or other personal electronic device, and/or an automated phone call providing details of the alarm event - e.g. the identity/type/location of the sensor (e.g. back door contact sensor) that has been triggered. A user receiving such a notification may be able to request the streaming of video or the transmission of images from cameras 506, 506’ installed in or at the premises (e.g. house) of the security monitoring system installation: for example a push notification may include one or more “action buttons” that upon activation by the user cause the user’s device 108 to transmit an instruction to the alarm reporting service 110 for the alarm reporting service 110 to send an instruction to the controller of the security monitoring system 500 (i.e. the processor of the video doorbell) to transmit activation signals to wake the cameras 506, 506” causing them to capture and send images and/or video. The controller of the security monitoring system 500 (i.e. the processor of the video doorbell) receives these video transmissions using the first (Wi-Fi) transceiver 404, and the same transceiver is used to onward transmit the images/video to the alarm reporting service 110 by means of the Access Point 112 and the Internet 115. In turn, the alarm reporting service 110 onward transmits the images/video to the user’s device 108. The alarm reporting service 110 is preferably configured to store (if the user has paid the necessary subscription fee) images/video captured in this way.
Each of the video cameras 506, 506’ may be in effect an “off the shelf” video camera (as a means of keeping costs down) that includes just one transceiver, and that transceiver may support Wi-Fi but not a secondary, low bandwidth channel. In such a case, the video doorbell in its guise as system controller of the security monitoring station must communicate with, and receive communications from, the cameras solely by means of Wi-Fi - that is using the first transceiver 404. Preferably, however, the video cameras 506, 506’, support both Wi-Fi and a relevant second channel for communication with the video doorbell’s second transceiver 406 - and preferably this functionality is provided by the inclusion of a second transceiver in each of the cameras 506, 506’.
The user’s device may also be programmed with a complementary app that enables the user to send instructions to the video doorbell (which in this embodiment functions as the controller of the security monitoring system) to cause activation of selected video cameras so that the user can “check in” on the home while away from home, and also to arm/disarm the alarm system. Images and video from the cameras 506, 506’, are preferably transmitted over Wi-Fi between the camera 506, 506’ and the video doorbell 100 - and hence these images and video
will be received by the first transceiver 404 which is also used for onward transmission to the access point 112. But optionally, in some embodiments, the system may also be configured to send lower resolution images, and/or lower framerate video using the low bandwidth channel (e.g. 868MHz) which is received by the second transceiver, for use as a backup in the event that the wider bandwidth channel (e.g. Wi-Fi) is disrupted, the processor of the video doorbell being configured to onward transmit the first image/video to arrive and then subsequently to onward transmit the corresponding higher resolution/higher framerate image/video if and when that arrives.
Likewise, notifications are also preferably provided to the alarm reporting service 110 (and onwards to the user device 108) in respect of alerts received from other alarm peripherals such as motion-triggered cameras 506, 506’, and a window contact sensor (which may also or instead function as a window shock sensor) 508 which is associated with a window 410. Similarly, a tamper alert received from the door lock as the result of, for example, an attempt to prise the lock 106 away from the door 102 or as the result of the lock’s magnetometer sensing the opening of the door when the lock has not been unlocked, or the detection of a tamper event (such as attempted lock picking or another attack - such as the detection of a drilling attack - on the lock) may be sensed and reported by the accelerometer 275 of the smart lock, and may be processed by the processor 400 of the video doorbell (in this embodiment) and thus be notified to the user via the alarm reporting service 110. Event notifications from the alarm peripherals are generally provided over a low bandwidth channel, for reception by the second transceiver 406 of the video doorbell, since most of the simpler peripherals (e.g. door contacts, motion sensors, shock sensors) do not require a high bandwidth channel (e.g. do not require something like Wi-Fi) but do need to be low cost and have very long battery life - so that they will generally each contain only a single transceiver, and that configured for communication with the second transceiver 406. As already mentioned, alarm peripherals in the form of video cameras benefit from the provision of a large bandwidth channel, such as Wi-Fi, because timely transmission of good quality video images (in colour, with high resolution and an acceptably high frame rate) requires quite a high bandwidth, and hence video camera peripherals will almost always include a Wi-Fi transceiver and consequently will almost always be primarily mains powered (preferably with battery backup). While the Wi-Fi transceiver could be used for the transmission of event notification signals - to be received by the video doorbell using the first transceiver 404, it is preferred (if the budget will allow) to provide video cameras that can report events using a low bandwidth channel (for reception by the second transceiver 406) and that preferably include an additional transceiver to enable this (although of course a single, multifunction transceiver could be used instead). By providing the video camera
peripherals with the capability for both narrowband and broadband communication we make it easier and more convenient to upgrade a system such as that of Figure 5 to the enhanced system of Figure 6, as will be described below.
The capability of the video doorbell to detect presence (for example using a PIR sensor and/or radar, or using the camera) enables the video doorbell itself to function as an alarm peripheral of the system. In this way, when the system is armed, the video doorbell may communicate an alert just as it does when another alarm peripheral is triggered. While this may only be appropriate under certain circumstances (notably circumstances dictated by the likelihood of false alarms caused by “safe” actors), it is a potentially valuable option.
The processor 400 of the video doorbell 100 in its guise as controller of the security monitoring system is also configured to check the status of the peripherals, including the quality of the communication channel, peripheral battery status, etc.
It is contemplated that the video doorbell with the security monitoring system controller functionality will, in addition to being retrofitted to existing homes, also be installed in new-build homes, preferably along with the smart lock as described with reference to Figures 2 or 3, together with at least one alarm peripheral, preferably in the form of a motion sensing video camera, like 506, 506’, and preferably another alarm peripheral in the form of a door contact to sense the state (open or closed) of the back door (or other secondary access door of the premises). Such a system could be installed for relatively little cost, and the lock 106 and its door magnet 270 could, for example be factory installed - or at least the door could be factory prepared for on-site installation of the lock 106 and the door magnet 270. The first occupier of the home would then benefit from the enhanced security that comes from a professionally installed alarm, albeit one with a subset of all the possible features of such a system - and in particular lacking a professional monitoring service. The design and configuration of the video doorbell, and of the alarm peripherals - including the smart lock 106, are such that once a security monitoring system based on their use, such as that illustrated schematically in Figure 5, has been installed, upgrading the system to include professional monitoring by means of a remote alarm receiving centre (ARC) can be achieved rather easily. Of course, such an upgrade may also be attractive to an occupier who has already installed a system such as that shown in Figure 5. We will now consider such an upgrade with reference to Figure 6.
Figure 6 corresponds generally to Figure 5, as it is based on the assumption that a system such as that illustrated in Figure 5 has been upgraded to include the benefits of professional
monitoring by means of a remote alarm receiving centre 602 - although it is contemplated that security monitoring systems such as that shown in Figure 6 may be installed ab-initio. The security monitoring system 600 differs from the system 500 of Figure 5 in that it includes a standalone alarm control unit 604 which is configured to control the security monitoring system 600, rather than relying on the video doorbell to act as controller. The video doorbell 606 of the system 600 may be, and preferably is, the video doorbell 100 that controlled the system 500, but with its processor reconfigured (e.g. through suitable reprogramming or system updates) to operate (at least in part) as a peripheral reporting to the alarm control unit 604 rather than continuing to act as the controller of the system 500.
The present disclosure thus contemplates, as one option, an initial installation that comprises a video doorbell as previously described, operating as the controller of a security monitoring system that preferably includes a lock, such as the lock previously described with reference to Figures 2 or 3, and at least one other installed alarm peripheral comprising either a door/window contact to detect the status of a door or a window, or a separate motion triggered video camera, the alarm peripheral including a transceiver for communication with the first transceiver of the video doorbell. And the present disclosure further contemplates a method comprising upgrading such an initial installation by introducing a standalone alarm control unit 604 which is configured to control the security monitoring system 600 and reconfiguring the video doorbell so that its processor is reconfigured to operate (at least in part) as a peripheral reporting to the alarm control unit 604 rather than continuing to act as the controller of the system 500. Once the system is upgraded, the video doorbell may act as a control interface of the system, so that a user (e.g. an occupier) can send from it arm/disarm and lock/unlock commands which are received and acted upon by the standalone alarm control unit 604.
The alarm control unit 604 includes, like the video doorbell described with reference to Figure 4, a processor 610, which may be a microcontroller, having an associated memory 612 that stores program instructions (“software”) that when run on the processor 610 control the operation of the alarm control unit 604 and of the security monitoring system 600. At least a pair of transceivers 614, 616, is provided. A first of the transceivers 614 supports Wi-Fi communication, the alarm control unit being configured to operate as an access point of a WiFi network (having a first SSID which is dedicated to the security monitoring system) which may operate in parallel with another Wi-Fi network (having a second SSID) which may support “household Wi-Fi needs” such as supporting video streaming services (e.g. Netflix, Amazon Prime, RTMs), home-working, etc.. The alarm control unit 604 is configured to receive video signals from video cameras 506, 506’ using the first of the transceivers 614. The second
transceiver 516 supports a lower bandwidth channel which supports the transmission of control signals to, and event notifications from, alarm peripherals such as the video doorbell 606, smart lock 106, video cameras 506, 506’ (if they contain the relevant functionality, otherwise event notifications, etc. are received via Wi-Fi) door/window contacts such as 502 and 508, etc. Typically the low bandwidth channel or channels may be provided using a suitable allocated frequency in the industrial, scientific, and medical (ISM) bands - such as (in Europe) 868MHz. Preferably, communications on the low bandwidth channel(s) are encrypted. The primary reason for using a low bandwidth transmission channel is to enable the use of transceivers (in the alarm peripherals) having a low power consumption (and in particular lower power consumption than notoriously power-hungry Wi-Fi transceivers) so that the battery powered alarm peripherals can achieve the necessary 3 to 5 year minimum battery life. The transceivers 614 and 616 are coupled to an appropriate antenna arrangement (not shown) which typically comprises (multiple) separate antenna elements for the two transceivers 614 and 616. One or both of the transceivers 614, 616, may support other transmission bands/protocols, such a BlueTooth (RTM) or BLE, etc.. Preferably at least one transceiver is provided that is configured or is configurable to communicate using 4G or 5G (or using any other suitable PLMN data protocol) for communicating with the ARC 502, for example in the event of loss of power at the premises or the loss of wired connection to the Internet 115 - e.g. as the result of malicious action by a villain.
The alarm control unit 604 is preferably configured to operate in at least an “armed away” mode, in which the security of the perimeter of the premises is monitored by means of door and window sensors such as door sensor 502, smart lock 106, and window sensors 508, and in which at least one presence sensor monitors the interior of the premises. For example, the internal presence sensor may be a passive infra-red sensor which may or may not be associated with a video camera. Additionally or alternatively, internal presence may be detected using so-called Wi-Fi sensing, with the alarm control unit running a Wi-Fi sensing algorithm and the video doorbell and/or some other static Wi-Fi node (or access point) acting as an illuminator for the Wi-Fi sensing. The alarm control unit 604 is preferably also configured to operate in a disarmed mode in which internal presence is not monitored and in which alert signals received from door and window sensors are largely ignored by the alarm control unit 604. But the alarm control unit 604 is preferably configured to respond to tamper signals from, for example the lock 106, or other alarm peripherals, even in the disarmed mode - because villains and other bad actors may take advantage of the disarmed state to attempt to sabotage or disable peripherals and other components of the system 600. The alarm control unit 604 is preferably also configured to operate in at least one “armed at home” mode, in which internal
presence is generally not monitored (or at least alerts received in respect of detected presence are ignored by the alarm control unit 604) but in which security of the perimeter or part of the perimeter is monitored, so that event signals in respect of detected door openings and detected window openings are alerted and possibly also reported as alarm events (optionally after giving time for a user on site to flag the detected event as a false alarm, for example by entering a security code at a user interface, or presenting a dongle, token, or mobile phone, at for example an NFC interface).
The alarm control unit 604 is operatively coupled to a remote Alarm Receiving Centre (ARC) 602 preferably both by a wired connection (e.g., broadband) and one or more wireless (e.g. SigFox (RTM), PLMN using e.g. GPRS, LTE, 4G, or 5G) connection. Notifications received by the alarm control unit 604 and that fit the profile of potential “alarm events” (based on one or more of the identity of the sensor providing the notification, the nature of the notification, the arm state of the alarm system 600, the time of day, day of week, etc.) are reported to the ARC 602 along with the identity of the alarm installation 600. If the notification is associated with images or video, for example because the sensor triggered was a camera or was associated with a camera, then images/video may also be sent to the ARC. Typically human operators at the ARC will review the event notified, and will attempt to verify the event as an actionable alarm event, based for example on the content of the images/videos, sounds received from microphones at the premises, interactions with a user on site (for example over a user interface at the monitored premises). If a notified event is verified as an actionable event (e.g., a break in, burglary, fire, etc., or a medical emergency), an alert is raised with the local police and/or other emergency response personnel/service (e.g., the fire brigade, paramedics, etc.). The ARC may additionally contact a registered user or other human contact (relative, support person, carer, etc.) by sending a push (or other) notification to a user device 108, for example using a technique as described previously.
In a system as illustrated in Figure 6, the video doorbell 606 communicates events to, and receives control signals from, the alarm control unit 604 preferably using a low bandwidth channel via the second transceiver 616. The wider bandwidth of a Wi-Fi channel, provided by the first transceiver, is preferably used for transmission of images/video from the video doorbell to the control unit 604, the control unit onward transmitting the images/videos to the ARC 602 and optionally to a user device such as 108 via a backend service 110 that sends push notifications to a user’s personal communication device 108 when the doorbell is pressed (or optionally when someone approaches the doorbell 100). In support of such communications the control unit 604 may use its broadband 114 connection to the Internet 115, the backend
service 110 sending push notifications out to a public land mobile network (PLMN) 116 by means of which notifications are delivered to the user’s personal communication device 108. The same communication path may be used to stream live video (and sound) from the video doorbell 100 to the user. A reverse communication path is also supported to enable the user to speak to a person at the doorbell 100, and also to enable the user to activate (i.e. release) the lock 106 to enable the person at the door to open the door 102. The signals to activate (release) the lock are passed to the lock 106 via the control unit 604 that communicates with the lock 106.
The video camera, processor, and software of the video doorbell are preferably together configured to capture and stream (on demand, or as needed) full HD (e.g. 1080p) video.
The controller of the system, whether provided by the video doorbell 100 or by the alarm control unit 604, is preferably configured to respond to the entering of a “duress code” at the keypad of the video doorbell by alerting either the ARC 602, in the case that the controller is the control unit 504, or by alerting designated individuals by calls (e.g. SIP calls) or notifications, preferably in each case supplying images or video captured at the time the duress code was entered (and perhaps from 30 seconds or more before the duress code was entered). A duress code is a code (e.g. a PIN) which can be used to disarm the security monitoring system, or to gain admittance to the premises, or both, but which is additional to a “normal” access code. The idea is that under normal circumstances a normal code will be used, and the use of such a code gives rise to no special notification. But in the event that a user is threatened (for example by an abusive partner or ex-partner, a thief or some other kind of villain) and forced to enter the protected premises, the user enters the duress code rather than the normal code, thereby signalling the existence of a duress condition. Upon receiving a duress notification, operatives in the ARC can contact the police or other security personnel to enable an intervention. Similarly, if the duress notification is received by a friend, neighbour or relative (e.g. in the case that the video doorbell is acting as the controller of the security monitoring system), that person may intervene or involve the police for them to intervene.
The controller of the system, whether provided by the video doorbell 100 or by the alarm control unit 604, is preferably configured to enable access to the protected premises (e.g. by unlocking the lock 106 and either disarming the system or at least temporarily ignoring a door open signal in respect of the relevant access door) based on FacelD - i.e. recognising the face of a visitor as corresponding to the face of a stored identity ( the controller storing, or having access to a
store of, facial recognition data for one or more known identities to whom access is to be provided).
The controller of the system, whether provided by the video doorbell 100 or by the alarm control unit 604, is preferably configured to enable access to the protected premises (e.g. by unlocking the lock 106 and either disarming the system or at least temporarily ignoring a door open signal in respect of the relevant access door) based on recognising a QR code, e.g. a dynamic QR code, that is presented to the camera of the video doorbell - for example by a visitor (or occupant) displaying a QR code on the display of the phone or other portable device (such as a smart watch). Preferably any QR code generated by or in association with the system (e.g., by a relevant back end system or by a user’s video doorbell or system app) has a limited lifetime of 24 hours or less (shorter lifetimes, e.g. 12 hours, 6 hours, 4 hours, may also be used beneficially), to improve system security.
Claims
1 . An electronically controlled lock for a door of premises, the lock comprising a processor and coupled to the processor: a lock RF transceiver; one or more magnetometers; and an accelerometer; wherein: the accelerometer is configured to operate as a shock sensor, the processor and the accelerometer together functioning as a shock detector to generate a tamper signal in the event that an attempt is made to pick or interfere with the lock; at least one of the one or more magnetometers being configured to detect the presence of one or more door magnets located outside the lock but within or attached to the door, the magnetometer generating a tamper signal as the result of an increased separation, between the magnetometer and the one or more door magnets, caused by the removal of the lock from the door; wherein the processor is configured to transmit a tamper signal, using the lock transceiver, in the event that an attempt to remove the lock from the door is detected or in the event that an attempt is made to pick or interfere with the lock.
2. An electronically controlled lock as claimed in claim 1 , wherein the processor and the accelerometer together function as a shock detector to generate an alert signal in the event that an attempt is made to forcibly attack the door, and the processor is configured to transmit the alert signal, using the lock transceiver.
3. An electronically controlled lock as claimed in claim 1 or claim 2, wherein at least one of the one or more magnetometers is configured to sense a magnetic field produced by one or more frame magnets within or attached to a frame housing the door, the magnetometer generating a door status signal based on a quality of the sensed magnetic field.
4. An electronically controlled lock as claimed in claim 3, wherein the processor is configured to use the lock RF transceiver to transmit a status update message based on received status signal in the event that the status signal indicates a change in door status.
5. An electronically controlled lock as claimed in claim 4, wherein the processor is configured to use the lock RF transceiver to transmit an alert in the event that, with the lock in a locked state, a received status signal indicates a change of door status from closed to open.
6. An electronically controlled lock as claimed in any one of the preceding claims, the lock including: i) a first part comprising a lock case including a bolt that is moveable between an extended position, in which in use it engages with a keep to secure the door to which the lock is mounted, and a retracted position in which it is free of the keep so that the door is no longer secured by the lock; ii) a second part configured for mounting to a surface of the door, the second part housing the lock transceiver, the one or more magnetometers, and the accelerometer; wherein the second part further comprises an electrically controlled actuator for moving the bolt under the control of the processor, a mechanical coupling being provided between the electrically controlled actuator and the bolt.
7. An electronically controlled lock as claimed in claim 6, wherein the lock transceiver, the one or more magnetometers, and the accelerometer are all mounted on a common pcb within the second part.
8. An electronically controlled lock as claimed in claim 7, wherein the mechanical coupling passes through the pcb.
9. An electronically controlled lock as claimed in claim 6 or claim 7, further comprising a mounting bracket for securing the second part to a door, the mounting bracket including an aperture being configured to function as a jig for use in positioning a door magnet to cooperate with the magnetometer that is configured to detect the presence of a door magnet, the mounting bracket including an aperture having a size and shape corresponding to an outline of the door magnet.
10. An electronically controlled lock as claimed in any one of claims 1 to 5, the lock comprising a lock case including a bolt that is moveable between an extended position, in which in use it engages with a retainer to secure the door to which the lock is mounted, and a retracted position in which it is free of the retainer so that the door is no longer secured by the lock;
wherein the lock case also houses the lock transceiver, the one or more magnetometers, the accelerometer, and an electrically controlled actuator for moving the bolt under the control of the processor.
11. An electronically controlled lock as claimed in any one of claims 6 to 10, wherein the lock case is configured for use in a mortice formed within a door.
12. An electronically controlled lock as claimed in any one of the preceding claims, further comprising a loudspeaker operatively connected to the processor.
13. An electronically controlled lock as claimed in any one of the preceding claims, the lock being mounted to a door, the door including one or more door magnets located outside the lock but within or attached to the door.
14. An electronically controlled lock as claimed in claim 13 as dependent, directly or indirectly, on claim 3, wherein the door is mounted in a frame that includes a keep for the lock, one or more frame magnets being provided within or attached to the frame.
15. A premises security monitoring system including a system controller and an electronically controlled lock according to any one of the preceding claims, the system controller including a first RF transceiver configured to receive tamper and alert signals transmitted by the lock RF transceiver.
16. A premises security monitoring system as claimed in claim 15, wherein the system controller includes a second RF transceiver for reporting to a remote monitoring entity alerts and tamper events corresponding to signals received from the lock.
17. A premises security monitoring system as claimed in claim 16, wherein the system controller is the controller of a video doorbell.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ESP202230444 | 2022-05-24 | ||
ES202230444A ES2956853A1 (en) | 2022-05-24 | 2022-05-24 | Electronic control lock (Machine-translation by Google Translate, not legally binding) |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023227258A1 true WO2023227258A1 (en) | 2023-11-30 |
Family
ID=84982131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2023/050824 WO2023227258A1 (en) | 2022-05-24 | 2023-01-16 | Electronically controlled lock for a door and premises security monitoring system comprising such a lock |
Country Status (2)
Country | Link |
---|---|
ES (1) | ES2956853A1 (en) |
WO (1) | WO2023227258A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9982459B2 (en) * | 2015-06-01 | 2018-05-29 | Schlage Lock Company Llc | Door improvements and data mining via accelerometer and magnetometer electronic component |
WO2020187857A2 (en) * | 2019-03-21 | 2020-09-24 | Verisure Sàrl | A door lock actuation device for operating a door lock and an alarm installation with such door lock actuation device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2463943B (en) * | 2008-10-06 | 2011-05-11 | Cooper Security Ltd | Locks |
US9697664B2 (en) * | 2012-04-11 | 2017-07-04 | Digilock Asia Limited | Electronic locking systems, methods, and apparatus |
US9695616B2 (en) * | 2013-03-15 | 2017-07-04 | August Home, Inc. | Intelligent door lock system and vibration/tapping sensing device to lock or unlock a door |
US9613478B2 (en) * | 2015-05-18 | 2017-04-04 | Unikey Technologies Inc. | Wireless access control system for a door including door position based authentication and related methods |
DE102019107281A1 (en) * | 2019-03-21 | 2020-09-24 | Verisure Sàrl | Method of operating an alarm system and alarm installation |
-
2022
- 2022-05-24 ES ES202230444A patent/ES2956853A1/en active Pending
-
2023
- 2023-01-16 WO PCT/EP2023/050824 patent/WO2023227258A1/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9982459B2 (en) * | 2015-06-01 | 2018-05-29 | Schlage Lock Company Llc | Door improvements and data mining via accelerometer and magnetometer electronic component |
WO2020187857A2 (en) * | 2019-03-21 | 2020-09-24 | Verisure Sàrl | A door lock actuation device for operating a door lock and an alarm installation with such door lock actuation device |
Also Published As
Publication number | Publication date |
---|---|
ES2956853A1 (en) | 2023-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107023224B (en) | Door lock opening control method and system based on active security | |
US8179248B2 (en) | Door latching recognition apparatus and process | |
JP6608911B2 (en) | Door and home security system and method | |
CA2529642C (en) | Door security device for use in security systems | |
US20080055040A1 (en) | Passive disarming transceiver for security systems | |
KR101872136B1 (en) | Security device for integration into a security system | |
US7142111B2 (en) | Method of programming security control panels for door entry device compatibility | |
CN206128879U (en) | Intelligence lock and lock anti -theft system thereof | |
CN102116122A (en) | Multifunctional intelligent control system of anti-theft door | |
CN104484915A (en) | Intelligent door lock grading defence organizing method and grading defence organizing system thereof | |
US11893877B2 (en) | Security system including automation notification and surveillance integration | |
CN103839389A (en) | Wireless anti-theft alarm system | |
CN106548550A (en) | A kind of Weigh sensor outdoor mounted system of reporting to the police | |
CN201209346Y (en) | Double pick-proof monitoring alarm unit for door lock | |
WO2023227258A1 (en) | Electronically controlled lock for a door and premises security monitoring system comprising such a lock | |
WO2023227256A1 (en) | Video doorbell device | |
JP2023528768A (en) | Connected lock system | |
RU2723306C1 (en) | Active door protection system with neurolinguistic effect on an intruder and electronic module for this system | |
KR100855125B1 (en) | Digital doorlock with fleeing prevention a security function by using security system and its controlling method | |
WO2020222722A1 (en) | Alarm device | |
KR100332829B1 (en) | Wireless Control System for Prevention of crimes | |
AU2021105181A4 (en) | Intelligent system & method for home surveillance with warning of robber activities using iot & artificial intelligence approach | |
US20240301718A1 (en) | Interactive security and locking system for dwellings doors | |
KR20100032609A (en) | Digital door lock having self-security function and digital door lock system having the same | |
JP2003208671A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23700534 Country of ref document: EP Kind code of ref document: A1 |