Door system with authentication and activation

ABSTRACT

A detection sensor or a user device is used to aid in providing authentication and activation of a door system when a user tries to access the door for ingress and egress. Operating parameters of the door systems may be set to allow ingress and egress only when a user is identified and authorized. As such, the operating parameters of the door systems may include authentication and activation parameters such that the door systems are controlled, at least in part, based on the presence of a user and/or a user device and the identification of the specific user. As such operating parameters may be different for different users or types of users. Moreover, the user device may be used to authenticate a user and control ingress and egress through the door automatically or through an authentication action taken by the user.

CROSS REFERENCE AND PRIORITY CLAIM UNDER 35 U.S.C. §119

The present Application for a Patent is a continuation of and claimspriority to copending U.S. Application No. 17/005,545 entitled “DoorSystem with Authentication and Activation”, filed on Aug. 28, 2020,which claims priority to U.S. Provisional Pat. Application Serial No.62/894,333 entitled “Door System with Authentication and Activation,”filed on Aug. 30, 2019, both of which are assigned to the assigneeshereof and hereby expressly incorporated by reference herein.

FIELD

The present invention relates to door systems with smart authenticationand activation, and more particularly to utilizing a smart wirelesscommunication and/or input and output devices on the door systems toaccess and set operating parameters, and further utilizing user devicesand sensors to authenticate and activate or deactivate the door systems.

BACKGROUND

Door systems may include door operators, door closers, or other likesystems that control the operation of opening and/or closing a door. Adoor operator is a device that is able to open and/or close a door orother barrier, or that aids in opening and/or closing a door or otherbarrier. Door operators typically include a motor that is connected to adoor via a linkage to control motion of the door. Door operators come ina variety of styles and configurations. In existing door operators,after the door operator is physically installed, an installer must openthe door operator case and set the operating parameters and featuresusing push buttons, potentiometers, dip switches and various interactivehardware devices. This installation process requires the installer tomanually access the door operator, typically on a ladder, and toindividually set up the operating parameters and features for each dooroperator. Door closers are similar to door operators; however, doorclosers are designed for manual opening (as opposed to automaticopening) and automatic closing. Door closers may have one or morecomponents, which includes a motor in some cases, that are used to closeor assist in closing a door or other barrier.

SUMMARY

In some embodiments a door system comprises a controller for controllingat least one operating parameter of the door system. A user computersystem (e.g., a mobile device, such as a smartphone, remote control,and/or the like) may communicate with the controller over a wirelessinterface directly or indirectly. Alternatively, or additionally, a usermay communicate with the controller through inputs and/or output devicesoperatively coupled to the door system. A drive system, including amotor assembly, drive train, and/or other components, is controlled bythe controller where the drive system operates under the at least oneoperating parameter. The door systems may be door operators, doorclosers, or other like systems for controlling the operation of a door.As such, it should be understood that when describing features orfunctions related to a door operator, the same or similar features orfunctions may relate to a door closer or other system that controls theoperation of a door. Consequently, when discussing a door operator, thephrase door operator may be substituted with door closer or other doorsystem, which may operate in the same or similar way.

The controller of the door system may comprise a processor for operatingthe controller and communicating with other components of the controllerand/or door system. The controller may also comprise a memory forstoring instructions and data, such as the instructions and data foroperating the door system. The controller may further comprise acommunication interface for allowing communication with the controllerand/or between the components of the controller and/or the door system.The communication interface may be a wireless communication interfacethat may use at least one of WiFi, Bluetooth, BLE, z-wave, Zigbee, 2G,3G, 4G, 5G, LTE, WPAN, WirelessHD, WiGig, NFC protocols, and/or anyother protocols, including any custom protocols. The controller mayreceive an authentication code or employ an authentication mechanism forallowing access to and/or changing the operation of the door system. Thewireless communication interface may operate over short or long rangeand may also have a range that is adjustable to limit access to the doorsystems. The wireless communication interface may be on at all times, orit may require an action with respect to an input of the controller,such as activation using a physical input (e.g., key, button,touchscreen, or other like selection) to enable wireless capability ofthe controller. The controller may act as a server with user interfaces(e.g. web pages, application interfaces, or the like) accessible overthe wireless communication interface. The user interfaces can be usedfor setup, diagnostics, input and output programming, settings, etc. Thecontroller may collect data for tracking, mapping, sensors,communication with other devices, alerts/notifications of door activity,performance, maintenance, faulty accessories, installation, etc. Thewireless interface may allow for the transfer of operating parameters ofone door system to another door system. The wireless communicationinterface may be used to communicate with other systems for variousfeatures/functions such as vestibule, door interlock systems, HVACcontrol, door synchronization, etc. The wireless communication interfacemay be used to communicate with other devices such as locks, exitdevices, wall plates, sensors, access control/security systems, etc.

The door systems may comprise one or more inputs devices (e.g., toggleswitches, touch screen, ports, or the like) for providing controlfeatures (e.g., on/off switches, entering characters, other parameters,or the like). The inputs devices (e.g., switches, or the like) can beused for standard functionality and/or turning wireless capability onand off. The input devices may also include sensors and/or the doorsystems may further comprise sensors (e.g., accelerometers, forcedetectors, strain detectors, detection sensors - movement sensors,identification sensors, biometric sensors, or the like) for additionaldata collection. For example, an accelerometer may detect an orientationof the door system where the accelerometer communicates with thecontroller or a force detection sensor that detects the force requiredto close or open a door where the force detection sensor communicateswith the controller. In some embodiments a door set up system (e.g.,door operator set up system, door closer set up system, or the like)comprises a controller for controlling at least one operating parameter(e.g., for opening, closing, setting up, and/or trouble shooting) of thedoor system. A wireless interface may allow for communication (e.g.,directly or indirectly) between the controller and a user computersystem over an air interface. A drive system may be controlled by thecontroller where the drive system operates under the at least oneoperating parameter, which may be set using a user computer system. Oneor more detection sensors may be operatively coupled to the door system(e.g., a camera, radar, infrared, light curtain, pressure pad, or thelike sensor), and may determine a user condition, such as the movementof a user, the identity of a user, a biometric reading of the user, orthe like. The movement of a user may be utilized in order to determineif the user is going to access the door or if the user is merely passingby the door. Moreover, the movement of a user may be tracked by one ormore movement sensors and/or the user computer systems in order to storepattens of use or non-use of the door systems and/or to identify if,how, and/or when a user may utilize or not utilize a door, as will bediscussed in further detail herein. The one or more detection sensorsmay be one or more identification sensors, which detect the identify ofthe user, such as though the use of facial recognition, identificationof the physical appearance of the user (e.g., type of clothes, color ofclothes, pattern, logos, size, or the like, height, hair color, hairlength, features, or the like), or other like identificationinformation. Identification of the user may be utilized in order toallow or prevent the access of a particular user or a type of user to aparticular door. The one or more detection sensors may be one or morebiometric sensors that may be used to for voice recognitionidentification, temperature detection, indication of a user being sick(e.g., cough, or the like), or the like of users near the door, whichmay also be used to allow or prevent the access of a particular user(e.g., from voice recognition) or type of user (e.g., determining usersthat have temperatures above or below 100° F., or the like) to aparticular door. It should be understood that the one or more detectionsensors may be used alone and/or in combination with the user device(e.g., user computer systems 30) in order to determine if access shouldbe permitted to a user or a group of users. For example, while a usermay be typically granted access to a door, it should be understood thatthe one or more detection sensors may be used to authenticate the useror override the authentication of a user or a group of users, as will bediscussed in further detail herein.

In addition to using a user computer system to set up a door system, auser computer system (or other type of user device) may also be used toaid in providing authentication and activation of the door system when auser tries to access the door for ingress and egress. In particularembodiments, the operating parameters of the door systems may be set toallow ingress and egress only when a user is authorized. As such, theoperating parameters of the door systems may include authentication andactivation parameters such that the door systems are controlled, atleast in part, based on the presence of a user device, such as the usercomputer system. The user device may be used to authenticate a user andcontrol ingress and egress through the door automatically or through a“knowing act” of the user (e.g., an authentication action), as will bedescribed herein.

It should be understood that since door systems are placed at areas ofingress and egress from buildings, they are ideally situated tointegrate various security systems directly into the door system, asopposed to having a separate security system (e.g., card swipe,identification reader, RFID, or the like) that operates independently ofthe door system (e.g., that controls a lock on the door, or theautomatic opening and closing of the door, or the like). Door systems ofthe present disclosure are able to control the actions of the door (e.g.locking and unlocking, controlling the opening and closing of the door)based on authentication and activation of users.

Door systems of the present disclosure may utilize a controller, doorinput devices (e.g., activation device, sensors - safety sensors or thelike, security devices, or the like), and/or other sensors tocommunicate with a user device for activating the door systems. Forexample, a user may have a user device (e.g., handheld wirelesstransmitter, user computer system, or the like) to cause the door toinitiate an automatic open while input devices (e.g., safety sensors)can prevent the doors from opening if an object (e.g., another user,inanimate object, or the like) is in the path of the door. The usercomputer system (e.g., a mobile phone, smart watch, or the like) mayinteract with the door system using an application installed on the usercomputer system. The user computer system may communicate user deviceinformation (e.g., device information, user information, or the like) tothe door system allowing the door system to take specific actions whenthe user having the user computer system approaches the door. Forexample, when an authorized user approaches the door, the door systemmay unlock and initiate an automatic open cycle if it is equipped with adoor opener. Other users may not require the use of automatic dooroperation and in those cases the door system can unlock the door andallow the user to open the door manually. If no door opener is present,the door will not automatically open, but the door can unlock forauthorized users and/or automatically close if the door includes a doorcloser. Moreover, the operating parameters may only allow the use of theuser device (e.g., user computer system and/or application thereof) tounlock, lock, open and/or close the door as a user approaches duringcertain times of the day or certain days of the week. As such, in someembodiments the operating parameters (e.g., speed, force, open time, orthe like) may be set for specific users and/or groups of users.

The features of the present invention may be utilized in varioussituations, such as in one example, in schools to identify authorizedchildren and/or adults that are equipped with a user device (e.g., usercomputer system, RFID tags, or other device) causing doors to lock ifthe user is not an authorized child and/or adult. Other examples ofimplementation may include equipping patients (e.g., patients withdementia, or other health issues), such that the patients may be allowedor denied access to ingress or egress through doors.

The door systems, door system inputs, and/or user devices may be furtherutilized to track ingress and egress of users within a building. Thatis, the door systems may be utilized to identify the entities thatpassed through doors within a building and/or log when the users passedthrough specific doors. In some embodiments, the door systems (e.g.,detection sensors incorporated there in, coupled thereto, or the like)and/or the user devices (e.g., the user computer systems, or the like)may track how each user approaches, uses, and/or departs from a door.The users may be monitored for what doors the users may utilize duringthe day, the particular times of day users may use the door, thefrequency of use of the doors by the users, the directions the users aremoving when the users use the door and the directions the users aremoving when the users fail to use the doors, and/or other like movementsof the users over time. The tracking of the users may be stored (e.g.,logged, or the like) and used to determine how a particular user orusers in general approach, use, and/or depart from a door. For example,patterns may be determined for individual users, groups of users, and/orusers in general, which may be utilized to identify users, operate thedoor systems, change the operation of the door systems, or the like. Assuch, when a user (e.g., specific user or a user in general) isidentified near a door, the door system may or may not operate dependenton the movement of the user, as will be discussed in further detailherein. Furthermore, the door system inputs, such as security deviceslike cameras (e.g., video, stills, or the like), movement sensors,infrared, radar, or the like may be operatively coupled to the doorsystems (e.g., within or adjacent the door systems) to provide securitymeasures. For example, a camera may be utilized to capture an image(e.g., in a video, still photo, live photo, or the like) when users passthrough or use a door in order to create a record of users using a doorfor security purposes.

Additionally, or alternatively, the security devices can be used toallow door systems to take various actions based on a user device of auser and/or other conditions occurring around the door. For example, adoor system may not unlock for a user that would have otherwise beenauthorized user if the security devices detect multiple users within adefined area, and one of which is not an authorized user. In otherexamples, the door system may not operate to unlock or open a door foran otherwise authorized user on the secure side (e.g., typically theinside) if another user (e.g., unauthorized user) is identified (e.g.,located at or approaching) on the non-secure side (e.g., typically theoutside) of the door.

Other door inputs devices, such as sensors (e.g., force sensors,accelerometers, or the like) could be used to detect if someone isattempting to force the door open, for additional data collection,and/or for detecting the force required to close or open a door duringoperation. The input devices may be further used to hold a door open andoverride the operating parameters if an object (e.g., person, or otherobject) does not move from the operating area of the door.

The user computer system that may be utilized herein to set theoperating parameters of the door and/or allow the use of the door, maycommunicate with the controller using at least one of a WiFi, Bluetooth,BLE, z-wave, Zigbee, 2G, 3G, 4G, 5G, LTE, WPAN, WirelessHD, WiGig, NFCprotocols, and/or any other protocols, including any custom protocols.The drive system may comprise a motor assembly, including a motor,controlled by the at least one operating parameter.

One embodiment of the invention comprises a door system. The door systemcomprises a drive system for operating a door and a controller forcontrolling the drive system. The controller comprises a communicationinterface, a memory having computer readable code stored thereon, and aprocessor operatively coupled to the memory and the communicationinterface. The processor is configured to execute the computer readablecode to identify a presence of a user, identify user information of theuser, identify at least one operating parameter based on the userinformation identified, and control the drive system based on the atleast one operating parameter.

In further accord with embodiments, identifying the presence of the usercomprises identifying the presence of a user device. Moreover,identifying the user information comprises identifying user deviceinformation.

In other embodiments of the system, identifying the user devicecomprises establishing wireless communication with the user device.Moreover, the user device is a user computer system or an access controldevice.

In yet other embodiments, the user computer system is a smartphonedevice or a smartwearable device.

In still other embodiments, identifying the user device informationbased on the user device comprises receiving the user device informationfrom the user device through a wireless connection with the user device.

In other embodiments, identifying the user device information based onthe user device comprises receiving a user device identifier from theuser device, and accessing stored user device information using the userdevice identifier.

In further accord with embodiments, identifying the at least oneoperating parameter based on the user device information comprisesaccessing stored user device information for a plurality of users. Thestored user device information for each of the plurality of users isassigned one or more stored operating parameters. The the user deviceinformation is compared with the stored user device information. The atleast one operating parameter from the one or more stored operatingparameters is identified based on the comparison of the user deviceinformation with the stored user device information.

In other embodiments, the processor is further configured to execute thecomputer readable code to identify an authentication action from theuser device. The authentication action is verified by comparing theauthentication action identified from the user device with a storedauthentication action for the user device. Moreover, identifying the atleast one operating parameter is further based on the authenticationaction.

In yet other embodiments, the authentication action comprises the usermaking a gesture with the user device or selecting a feature on the userdevice.

In still other embodiments, the processor is configured to execute thecomputer readable code to change the at least one operating parameterfrom at least one past operating parameter when the user deviceidentified is different than a previous user device.

In other embodiments, the processor is configured to execute thecomputer readable code to identify a presence of multiple user devices,and optimize operation of the door system based on the presence of themultiple user devices.

In further accord with embodiments, identifying the at least oneoperating parameter comprises identifying an operating parameter fromeach of the multiple user devices to determine multiple operatingparameter options. The at least one operating parameter is selected fromthe multiple operating parameter options or creating a new operatingparameter based on the multiple operating parameters options.

In other embodiments, the door system further comprises one or moredetection sensors operatively coupled to the controller. The processoris further configured to execute the computer readable code to capturethe user information using the one or more detection sensors, assign theuser information to the user device, and store the user information andthe user device information for security.

In yet other embodiments, the door system further comprises one or moredetection sensors operatively coupled to the controller. The processoris further configured to execute the computer readable code to identifyone or more objects in a door area of the door system using the one ormore detection sensors. The at least one operating parameter isidentified based on the user information is further based on the one ormore objects in the door area.

In still other embodiments, the door system further comprises one ormore detection sensors operatively coupled to the controller. Theprocessor is further configured to execute the computer readable code toidentify one or more objects in a door area of the door system using theone or more detection sensors during operation of the door system. Theat least one operating parameter is changed during operation of the doorsystem based on the identification of the one or more objects in thedoor area.

In other embodiments, the door system further comprises one or moredetection sensors operatively coupled to the controller. The processoris further configured to execute the computer readable code to identifya user condition using the one or more detection sensors, and overridingthe operation of the door system when the user condition is identified.

In further accord with embodiments, the door system further comprisesone or more detection sensors operatively coupled to the controller. Theone or more detection sensors comprise a camera, a motion sensor, amovement sensor, an infrared sensor, a radar sensor, a vision sensor, a3D sensor, a laser sensor, or a light curtain. Moreover, identifying theuser and identifying the user information occurs through the use of theone or more detection sensors.

In other embodiments, identifying the user information comprisesreceiving a voice command from the user. The drive system is controlledbased on the voice command. The voice command is received through amicrophone operatively coupled to the controller or received from a userdevice that received the voice command from the user.

Other embodiments of the invention comprise a method of operating a doorsystem through the use of one or more processors. The method comprisesidentifying a presence of a user, and identifying user information ofthe user. The method also comprises identifying at least one operatingparameter based on the user information identified. The method furthercomprises controlling a drive system based on the at least one operatingparameter.

In further accord with embodiments of the method, identifying thepresence of the user comprises identifying the presence of a userdevice. Moreover, identifying the user information comprises identifyinguser device information.

To the accomplishment the foregoing and the related ends, the one ormore embodiments comprise the features hereinafter described andparticularly pointed out in the claims. The following description andthe annexed drawings set forth certain illustrative features of the oneor more embodiments. These features are indicative, however, of but afew of the various ways in which the principles of various embodimentsmay be employed, and this description is intended to include all suchembodiments and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

The following figures illustrate embodiments of the invention, which arenot necessarily drawn to scale, and wherein:

FIG. 1 is a perspective view of a door operator embodying the smartsetup system, in accordance with some embodiments of the disclosure.

FIG. 2 is a perspective view of the door operator of FIG. 1 with thecover removed.

FIG. 3 is a block diagram illustrating the door operator of FIG. 1 .

FIG. 4 is a block diagram illustrating a remote control usable in thesmart setup system of FIG. 1 .

FIG. 5 a is a block diagram illustrating a method of using the smartsetup system, in accordance with some embodiments of the disclosure.

FIG. 5 b is a block diagram illustrating a method of using the smartdoor system for authentication and activation, in accordance with someembodiments of the disclosure.

FIGS. 6A - 6E are screen shots used in the implementation of the smartsetup system, in accordance with some embodiments of the disclosure.

FIG. 7 is a door operator embodying the smart setup system, inaccordance with some embodiments of the disclosure.

FIGS. 8 and 9 are block diagrams illustrating alternate networkarchitectures of the smart setup system, in accordance with someembodiments of the disclosure.

FIG. 10 is a door operator embodying the smart setup system, inaccordance with some embodiments of the disclosure.

DETAILED DESCRIPTION

The following detailed description teaches specific example embodimentsof the invention. Other embodiments do not depart from the scope of thepresent invention. The terminology used herein is for the purpose ofdescribing particular embodiments only and is not intended to belimiting of the invention. As used herein, the singular forms “a”, “an”and “the” are intended to include the plural forms as well, unless thecontext clearly indicates otherwise. It will be further understood thatthe terms “include” and/or “including” when used herein, specify thepresence of stated features, steps, operations, elements, and/orcomponents, but do not preclude the presence or addition of one or moreother features, steps, operations, elements, components, and/or groupsthereof.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by oneof ordinary skill in the art to which this invention belongs. It will befurther understood that terms used herein should be interpreted ashaving a meaning that is consistent with their meaning in the context ofthis specification and the relevant art and should not be interpreted inan idealized or overly formal sense unless expressly so defined herein.Certain terminology is used herein for convenience only and is not to betaken as a limitation on the invention. For example, words such as"upper," "lower," "left," "right," "horizontal," "vertical," "upward,"and "downward" merely describe the configuration shown in the figures.The referenced components may be oriented in an orientation other thanthat shown in the drawings and the terminology, therefore, it should beunderstood as encompassing such variations unless specified otherwise.

It will be understood that when an element is referred to as being“connected,” “coupled,” or “operatively coupled” to another element, theelements can be formed integrally with each other, or may be formedseparately and put together. Furthermore, “connected,” “coupled,” or“operatively coupled” to another element, can mean the element isdirectly connected, coupled, or operatively coupled to the otherelement, or intervening elements may be present between the elements.When two elements are connected, coupled, or operatively coupled to oneanother without intervening elements, the elements are referred to asdirectly connected, directly coupled, or directly operatively coupled.Furthermore, "connected," "coupled," or operatively coupled" may meanthat the elements are detachable from each other, or that they arepermanently coupled together.

It is understood that a door system (e.g., door operator, door closer,or the like) as described herein, can be any system that controls a dooror other barrier to an entry, an exit, a window or the like. The doorsystem may control a barrier that, for example, swings, slides, or rollsbetween the open and closed positions. For convenience only, the barrierwill be referred to herein as a door and the device will be referred toas a door system (e.g., door operator, door closer, or the like);however, the invention applies to, and can be used with, other types ofbarriers and the use of the terms “door” and “door system”, includingthe use of “door operator” and “door closer” are not meant to belimiting.

As used herein, the term “open position” for a door or other barriermeans a door position other than a closed position, including anyposition between the closed position and a fully opened position (e.g.,one or more “open positions”). The term “closed position” for a door orother barrier means a position in which the door or other barrier iscompletely shut and may be the position where the door or other barrierengages a frame and a lock or latch may be engaged.

Referring now to the figures, wherein like reference numerals designatecorresponding or similar elements throughout the several views, anembodiment of a door system (e.g., illustrated as a door operator) inwhich the smart setup system and methods are used is shown in FIGS. 1and 2 and is generally designated at 40. The door system 40 is mountedadjacent to, and is operatively connected to, a door 42 in a door frame44. The door 42 moves relative to the frame 44 between a closed positionand an open position. For the purpose of this description, only theupper portion of the door 42 and the door frame 44 are shown. Theillustrated door 42 is of a conventional type and is pivotally mountedto the frame 44 at hinges for swinging movement between the closedposition and an open position.

The door system 40 may comprise a casing 48, otherwise described as ahousing, that includes a back plate 50 and cover 51. A drive system 52(e.g., comprising a drive train 60 and a motor assembly 62), a closerassembly 54, and/or a controller 58 are mounted in the casing 48. Alinkage assembly 56 operably couples the door system 40 to the door 42.The casing 48 is shown mounted to the door frame 44, while in otherembodiments the casing 48 may be mounted to the door 42. The casing 48is typically mounted in a particular orientation, such as horizontally,with respect to the door frame 44. The cover 51 attaches to the backplate 50 and surrounds and encloses the components of the door system 40to reduce dirt and dust contamination, and to provide a moreaesthetically pleasing appearance. It is understood that door system 40may also be concealed within the door 42, the wall 38 or the door frame44, or it may be installed in the floor.

The motor assembly 62 may include a motor 64 (e.g., a reversibleelectric motor, unidirectional motor, or the like). The motor 64 mayinclude a motor drive shaft 68. The drive train 60 is shown as includinga drive gear 70 connected to drive shaft 68, a driven gear 74 connectedto output shaft 82 and a chain 72 connecting the drive gear 70 to thedriven gear 74. Operation of the motor 64 rotates the output shaft 82 todrive the linkage assembly 56 to open and/or close the door 42 or toassist in the opening and/or closing of the door 42. However, the motorassembly 62 may include a motor 64 and alternate components other thanshafts, gears, or the like that are utilized to assist in opening and/orclosing the door 42.

To close the door 42, a closer assembly 54 may be provided for returningthe door 42 to the closed position after the door 42 has been opened.The closer assembly 54 may include a closer 80 of standard constructionwhich provides a closing force on the door 42 when the door 42 is in anopen position. The closer 80 may comprise a spring system, hydraulicsystem, pneumatic system, and/or other systems, or combinations of suchsystems, for providing the closing force. In other embodiments, theclosing force may be supplied by the motor 64 that is used to open thedoor 42 or by a second motor (e.g., a closing motor).

The linkage assembly 56 is shown comprising a first rigid connecting armlink 86 and a second rigid connecting arm link 87. The first connectingarm link 86 is fixed at one end to the lower end of output shaft 82 suchthat the first connecting arm link 86 is rotated by the output shaft 82.The second end of the first connecting arm link 86 is pivotallyconnected to a first end of the second connecting arm link 87. Thesecond end of the second connecting arm link 87 is pivotally joined to adoor 42 directly or through a mounting bracket 92 fixed to the door 42.While a rigid two-arm linkage assembly 56 is shown, the linkage assembly56 may be different than that illustrated and may include a greater orfewer number of arm linkages, sliding elements, shock absorbing armsmounting brackets 92, or the like.

While a specific embodiment of a door system 40 is shown, the doorsystem 40 may comprise any suitable mechanisms and may use mechanismsother than, or in addition to, the illustrated components, and thus, isnot limited to the embodiment shown in FIGS. 1 and 2 . For example, thedrive system 52 may include hydraulic, pneumatic, electrohydraulic, orelectromechanical systems. The drive train 60 may comprise a gear trainrather than the chain drive 72. A single reversible motor 64 may be usedto provide both the opening and closing forces. Moreover, multiplemotors 64 may be used where, for example, one motor opens the door and asecond motor closes the door.

The controller 58 is in electrical communication with the drive system52 (e.g., the motor assembly 62, or the like). The controller 58, whichis described in detail below, controls the operation of the motor 64(and/or other components of the door system 40) and functions totransmit appropriate control signals to the drive system 52 foractuating the motor 64 and the drive train 60. The controller 58operates to control the drive system 52 in accordance with operatingparameters stored in the door system 40. By way of example, thecontroller 58 may control the drive system 52 to maintain the door 42 inan open position for a selected period of time in order to allowsufficient time for a person to go through the door opening. Thecontroller 58 may also control the speed of the motor 64 for controllingthe speed of opening the door 42. Other operating parameters forcontrolling the operation of the door system 40 will be described. It isto be understood that although the controller 58 is shown mounted incasing 48, the controller 58 could also be housed separately from thedoor system 40 such as within the wall 38, a ceiling, in or on the dooritself, in or on the floor, or remotely, such as in a mechanical room,for example.

The controller 58 is part of an overall control system which may includeone or more activation devices 136 in electrical communication with thecontroller 58 for allowing a user to selectively control actuation ofthe motor 64, and thus, the opening and/or closing of the door 42. Theone or more activation devices 136 may be typically located within 2, 4,6, 8, 10, 12, 14, 16, or the like feet from the door 2 (or rangebetween, overlap, or fall outside of these values). The activationdevice 136 is operable to generate and transmit a door movement signalto the controller 58 which, in turn, is responsive to receiving the doormovement signal to control operation of the motor 64 so as to controlpowered opening and/or closing of the door 42. The activation device 136may be of any known or desired type. For example, the activation device136 may consist of a manual push pad switch mounted on the wall 38, or apost, adjacent to the door 42. This arrangement is such that a user needonly press the push pad to activate the door operator 40 toautomatically open the door 42. In other embodiments, the activationdevice 136 may comprise a pressure pad such as in a switch-type floormat. Various other activation devices are also suitable for useaccording to the present invention, including any type of switch,sensor, and/or actuator, including mechanical switching device, infraredmotion sensors, radio frequency sensors, photoelectric cells, ultrasonicpresence sensor switches, and the like. As a result of the operation ofsome of these activation devices, an automatically operable door iscaused to open by mere proximity of a person to the door. Such proximitymay cause the door to operate by virtue of the activation device 136,such as interruption of a light beam, distortion of an electrical field,by the actual physical closing of the switch by contact with the personor in response to the weight of the person approaching the door, or thelike. The particular manner for generating a door movement signal to thecontroller 58 for energizing the motor 64 may be accomplished by anysuitable activation device.

One example door operator in which the system of the present disclosuremay be used is shown in U.S. Pat. No. 8,499,495, titled “Door Operator,”issued on Aug. 6, 2013 to Houser et al., which is incorporated byreference herein in its entirety. Another example door operator in whichthe system of the present disclosure may be used is shown in U.S. Pat.No. 8,407,937, titled “Door Operator,” issued on Apr. 2, 2013 to Houser,which is incorporated by reference herein in its entirety. Anotherexample door operator in which the system of the present disclosure maybe used is shown in U.S. Pat. No. 9,514,583, titled “Controller for aDoor Operator,” issued on Dec. 6, 2016 to Zasowski et al., which isincorporated by reference herein in its entirety. Another example dooroperator in which the system of the present disclosure may be used isshown in U.S. Pat. Application Publication No. US 2014/0325911, titled“Door Operator Assembly,” published on Nov. 6, 2014 to Hass, which isincorporated by reference herein in its entirety.

The door systems 40 and the various components described herein mayderive power from the power grid. The door systems 40 and the variouscomponents described herein may also be battery operated. In someembodiments, the door systems 40 and the various components describedherein may use a battery and derive power from the power grid. In someembodiments, the door operator 40 may use a rechargeable battery. Apower grid interface derives power from a power line and in turnsupplies current to the door systems 40. The power supply feeds power tovarious components of the door systems 40 including the controller 58,motor 64, charger, battery, sensors 8 and/or the like.

While an embodiment of a door system 40 is described, door systems 40may come in a variety of styles and may utilize a variety of operatingparameters. It should be understood that a door operator 40 may bothopen and close the door, while a door closer may only close the doorsuch that manual opening is used. Door systems 40 may also includemanual assist where under certain conditions the door system 40 assistsin the manual opening and/or closing of the door. Door systems 40 may becontrolled to adjust the opening and closing speeds of the door, theymay be adjusted for the size and/or weight of the door, to compensatefor wind and/or stack pressure, latch retry, electronic dampening,left/right opening, or the like as will be described herein. The doorsystems 40 may include various inputs (e.g., activation devices 136;sensors 8 -- motion detectors, light curtains, accelerometers, forcesensors, or the like; security devices - such as cameras, visionsystems, or the like, or other like inputs) that can be used with thecontroller 58 and/or with communication with a user device (e.g., usercomputer system, fob, badge, or other user device) to control the safeoperation of the door, authentication of users, monitoring of use byusers, and/or the like as will be discussed herein in further detail,and in particular, with respect to FIG. 5 b .

At least some of the parameters and/or features used to control the doorsystem 40 and/or the components therein (hereinafter “operatingparameters”) are adjustable such that when a door system 40 is installedat a door 42, the user (e.g., installer, or the like) is required to setthe operating parameters as part of the installation process. Some ofthe operating parameters may be user selected, some of the operatingparameters may be manufacturer defined, some of the operating parametersmay be set in response to building codes, and some of the operatingparameters may limit operation of the door system 40 based on userdetection and authentication, or the like. In existing door systems(e.g., door operators, door closers, or the like), after the door system40 is installed, the case 48 must be opened and the operating parametersset by push buttons, potentiometers, dip switches and variousinteractive hardware devices. This requires the installer to manuallyaccess the door operator, typically on a ladder, open the case 48 andmanually set the operating parameters for each door operator at thecontroller 58. In commercial settings this operation may require theinstaller to manually set a large number of door operators individually.Moreover, the user that sets the operating parameters may be differentthan the user that physically installs the door system such thatmultiple people must physically access each door system 40. The set-upoperation may also require the installer to rely on wiring diagrams todetermine the appropriate controller input for each operating parameter.Moreover, anytime an operating parameter needs adjusting, a user (e.g.,technician, maintenance provider, or the like) must access the doorsystem 40 to adjust the operating parameters, in the same or similar waythe installer was required to access the door system 40 (e.g., using aladder, rely on wiring diagrams, or the like). Furthermore, when theuser (e.g., installer, technician, or the like) is defining (e.g.,setting, adjusting, or the like) the operating parameters of the doorsystem 40, the doors 42 may require blocking off the doorway and/orhallway, thus preventing use of the doorway so that the user can set upa ladder, manually access the hardware to set or adjust the operatingparameters. In some embodiments, manual access may be required just tocheck the operating parameters of the door system 42.

In some of the embodiments of the systems and methods provided herein,information is sent to and received from the door system 40 to allowcontrolling, monitoring and adjusting of information pertaining to theoperation of the door system 40. The systems of the present disclosuremay be used by any user (e.g., an installer, maintenance person,technician, or the like), for example, to configure, adjust, command,test, troubleshoot, upgrade and/or monitor a door system 40. Referringto FIG. 3 , the controller 58 may comprise one or more processors 22,one or more memories 24, one or more communication interfaces 26, one ormore controls 204 (which may be a type of communication interface 26 orseparate from the communication interface), one or more control outputdevices 206 (e.g., a display, speaker, or the like), and/or one or morecontrol input devices 208, all of which may be operatively coupled toeach other. The processor 22 (e.g., a microprocessor or amicrocontroller) may communicate with the memory 24 for storing and/oraccessing instructions and data (e.g., computer readable instructions,the operating parameters, operation of the door system, user informationrelated to the users that are authorized to use the door, how users usethe door, other detection information, and/or the like) in order tooperate the door system 40 and provide the functionality describedherein. Some of the one or more memories 24 are non-volatile, storingconfiguration information and program code. As used herein, a“processor” generally refers to a device or combination of deviceshaving circuitry used for implementing the communication and/or logicfunctions of a particular system. For example, the processor 22 mayinclude one or more digital signal processor devices, microprocessors,and/or microcontrollers and other support circuits and/or combinationsof the foregoing. Control and signal processing functions of the systemare allocated between these processing devices according to theirrespective capabilities. The controller 58 may further includefunctionality to operate one or more software programs based oncomputer-executable program code, which may be stored in memory 24. Asthe phrase is used herein, a controller 58 may be “configured to”perform a certain function in a variety of ways, including, for example,by having one or more general-purpose circuits perform the function, byexecuting particular computer-executable program code embodied incomputer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

The door systems 40 (e.g., door operator, door closer) can includecomputer program code which, when executed by the processor 22, causesthe door systems 40 (e.g., door operator or door closer) to perform asdescribed herein. A computer program product can include a medium withnon-transitory computer program code that when executed causes the doorsystem 40 to operate as described herein. The present invention may beembodied as a method, device, article, system, computer program product,or a combination of the foregoing. Any suitable computer usable orcomputer readable medium may be utilized for a computer program productto implement all or part of the system. The computer usable or computerreadable medium may be, for example but not limited to, a tangibleelectronic, magnetic, optical, electromagnetic, or semiconductor system,apparatus or device. More specific examples of the computer readablemedium may include, but is not limited to, the following: a portablecomputer diskette, a hard disk, a random-access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a portable compact disc read-only memory (CD-ROM), oran optical storage device.

Computer program code for carrying out operations of the presentinvention or for assisting in the carrying out of a method according toan example embodiment of the invention may be written in an objectoriented, scripted or unscripted programming language such as Java,Peri, python, C++ or the like. However, the computer program code forcarrying out operations of the present invention may also be written inconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerprogram code may also be written in HTML5 or similar languages that arecommonly used for applications or “apps” intended to be run on mobilecomputing devices such as smart phones, tablets, and the like. Whilespecific examples of programming languages are described herein, theseexamples are not exhaustive, and the computer program code may bewritten in any suitable programming language.

Computer program instructions may be provided to the controller 58 toproduce a machine, such that the instructions, which execute via theprocessor 22 of the controller 58, create a device for implementing thefunctions necessary to carry out the embodiments as described herein.Computer program instructions may also be provided as firmware for anembedded controller or a plurality of embedded controllers.

Referring to FIG. 2 , the controller 58 includes, or is in communicationwith, an onboard communication interface 26, such as a wiredcommunication interface (as will be discussed below) and/or a wirelesscommunication interface (e.g., wireless communication chip) thatcommunicates with a user device, such as a user computer system 30(e.g., mobile devices, such as remote control, smartphone, smartwearabledevice - watches, glasses, or the like) or an access control device(e.g., badge, fob, electronic key, card, or the like) over a wirelessconnection 32. It should be understood that the wireless communicationmay occur over any type of wireless network, or such communication mayoccur directly between the controller 58 and the user device (e.g., usercomputer system 30, or the like) such that the controller 58 does notrequire access to an external network (e.g., external Wi-Fi network, thecellular network or other external network). As used herein, the term“directly communicates” means that the user device (e.g., user computersystem 30) communicates with the on-board communication interface 26without an intervening network such as an external wireless network(e.g., external Wi-Fi network, LAN or WAN, or other external wirelessprotocol). In some embodiments, the controller 58 may be directlycoupled to, and may directly communicate with, an access control deviceand/or a user computer system 30 (e.g., a mobile device, such as aremote control, smartphone, or the like) over relatively short distanceusing the wireless communication interface 26. The controller 58 may becoupled to the user device (e.g., user computer system 30) via thewireless communication interface 26 that communicates using a wirelessnetworking protocol, such as WiFi based on the institute of Electricaland Electronics Engineers (IEEE) 802.11 standards, Bluetoothshort-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz,a proprietary communication interface or other wireless accesstechnology whether or not described herein.

While in some embodiments, the communication interface 26 communicatesdirectly with the user device (e.g., user computer system 30) over ashort range via a wireless connection 32 such as WiFi, Bluetooth orother wireless access technology, a wireless connection 33 may operateover long or intermediate ranges and may include intervening networks35, as shown in FIG. 7 . In this regard, the door system 40 may comprisea transceiver 28 that communicates with the controller 58 and that isconfigured to operate with one or more air interface standards,communication protocols, modulation types, and access types. By way ofillustration, the door operator may include a transceiver 28 that may beconfigured to operate in accordance with any of a number of first,second, third, fourth, fifth, and/or the like generation communicationprotocols and/or the like. For example, the door system 40 may beconfigured to operate in accordance with second-generation (2G) wirelesscommunication protocols IS-136 (time division multiple access (TDMA)),GSM (global. system for mobile communication), and/or IS-95 (codedivision multiple access (CDMA)), or with third-generation (3G) wirelesscommunication protocols, such as Consolidated Mobile TelecommunicationsSystem (UMTS), CDMA2000, wideband CDMA (WCDMA) and/or timedivision-synchronous CDMA (TD-SCDMA), with fourth-generation (4G)wireless communication protocols, with 1,TE protocols, with 3GPPprotocols, with fifth-generation (5G) wireless communication protocols,and/or the like. The door operator 40 may also be configured to operatein accordance with non-cellular communication mechanisms, such as via awireless local area network (WLAN) or other communication/data networks.

The wireless communication interface 26 may be on at all times or a usermay be required to take an action with respect to an input device 208 tothe controller (e.g., action with respect to a physical “key”, button,touchscreen, or the like) may be required to enable wireless capability.As such, the user may enter a wireless authentication input into thedoor system 40. For example, a user may need to turn an on/off switchtwo, three, four, or other like times in order to enable the wirelesscommunication interface 26 of the door system 40. Other actions mayinclude selecting a pattern of physical input keys or touchscreeninputs, entering the authentication code (e.g., static, dynamic, or thelike character code of numbers, letters, and/or symbols, scan a barcode,QR code, or other like code, or the like), holding multiple inputs atthe same time, or the like. It should be understood that any action withrespect to any input may be required, but that such an action isutilized to provide a layer of security that restricts unauthorizedusers from accessing the door system 40, in part, by requiring anauthorized user to take an action to which only the authorized users areaware.

Additionally, or alternatively, other security measures may be providedto restrict (e.g., prevent, reduce the chance of, or the like)unauthorized access to the door system controller 58 to reduce thechance of tampering with the operating system and/or the operatingparameters of the door system 40. Furthermore, to enhance the securityof the system and to restrict unauthorized access to the door system 40,the wireless communication interface 26 may have a limited range suchthat the user computer system 30 must be in within the limited range(e.g., in close proximity) of the door system 40 in order to access thesystem. In some embodiments, the wireless communication interface 26 maybe limited to a range of approximately 100 feet or less, 50 feet orless, 20 feet or less, or approximately 10 feet or less and may have arange of approximately 10 feet. In some embodiments, the range may beeven less than 10 feet, although in a preferred embodiment the range issufficient to allow an authorized user to gain access to the system overwireless connection 32 without the need to climb a ladder. The range maybe selected such that the user computer system 30 may program aplurality of door operators at one time. For example, the range may beselected such that the user computer system 30 can access and program aplurality of door operators 40 located along a hallway in a building.Moreover, the wireless communication range can be extended, ifnecessary, by using a node network or a wireless communication extender.Providing the interface 26 with a limited range prevents remoteunauthorized access to the system and requires any individual accessingthe system to be in relatively close physical proximity to the doorsystem 40. While specific ranges have been set forth above, it is to beunderstood that the range of the wireless communication interface device26 may be increased in certain applications where a greater range isrequired to access the door operator and/or where unauthorized remoteaccess is not an issue. As such, the wireless communication interface 26of the door operator system 30 may programable (e.g., set, adjusted, orthe like) by an authorized user in order to optimize the range of thewireless communication for the needs of the particular customer.

Moreover, additional security may be implemented such that the user maybe required to log into the system and gain access to the controller 58.For example, the system may require that the user’s identity beauthenticated using a user name, a passcode, a cookie, a biometricidentifier, a private key, a token, and/or another authenticationmechanism. The door operator system 40 may display an authenticationinterface on the user computer system 30, which requires the input foruser authentication. A suitable authentication response may be providedby the user, such as access code may be provided by the user to thecontroller 58 via the authentication interface on user computer system30 (e.g., remote control 30, mobile device, or the like). Theauthentication system may use any suitable security measures that may ormay not be specifically described herein.

To further enhance security of the system, the door system 40 may beprovided with an on/off input 34 (e.g., a toggle switch) located on theexterior of the casing 48, or a remote location, such that thecommunication interface 26 is operable only when the input 34 is turnedon. The input 34 may be located in a position on the casing 48 or off ofthe casing 48 such that the input is accessible to an authorized userbut is not readily available to the general public, such as on top ofthe casing 48, within a access panel (e.g., cover or the like) on thecasing 48, within an access panel off of the casing (e.g., on a wall,post, frame, or the like), or the like. The input 34 may be located in aposition on the casing 48 or off the casing 48 along with additionalsecurity features, such as a security screw, lock, hidden access, or thelike.

The controller 58 may communicate with the user computer system 30(e.g., a mobile device, such as a remote control, smartphone, or thelike) over a wireless connection 32, directly or through an externalnetwork. The user computer system 30 is used to program the door system40 to define (e.g., set, adjust, or the like) the operating parametersof the door system 40 after the door system 40 is physically installedon the door/door frame. The user computer system 30 may comprise amobile device, such as a cellular phone, tablet, dedicated terminal,laptop, remote control, or the like. The wireless connection 32 betweenthe user computer system 30 and the controller 58 may be implementedusing dedicated applications (e.g., apps, applet, or the like), portionsof dedicated applications, a web browser-based interface, and/or thelike, or combinations of such systems. The controller 58 may act as aweb server providing user interfaces (e.g., web pages, or the like) thatmay be accessed by the user computer system 30 over the wirelessconnection 32. The user interfaces can be used for setup, diagnostics,input and output programming, settings, or the like. The controller 58may collect data for tracking, mapping, sensors, and communication withother devices, notifications (e.g., alerts, messages, or the like) ofdoor activity, performance, maintenance, faulty accessories,installation, or the like.

The user computer system 30 may display various menus, icons, and otherinformation to the user on a user interface 104 within a display 103(e.g., output device) of the user computer system 30. The user canscroll through menus and icons displayed on user interface 104 totransmit information to and receive information from the controller 58.Referring to FIG. 4 , the user computer system 30 comprises one or moreprocessors 100, one or more memories 102 (e.g., having computer readablecode and/or data stored thereon, such as like the memories 24 of thecontroller 58 described herein), one or more displays 103 (e.g., forproviding a user interface 104 thereon), one or more communicationinterfaces 106, and/or one or more transceivers 108, or the likeoperatively coupled to each other. The one or more communicationinterfaces 106 may be made up of user output devices and/or user inputdevices and/or may be separate from such output and input devices. Theuser output devices may include the display 103 and a speaker or otheraudio device, which are operatively coupled to the processor 100. Thedisplay 103 may be configured to present data in a graphical and/orcharacter format (e.g., alphanumerical, symbolic, or the like format).The user input devices may include any of a number of devices allowingthe user computer system 30 to transmit data, such as a keypad,keyboard, touchscreen, touchpad, microphone, mouse, joystick, otherpointer device, button, soft key, and/or other input device(s). The usercomputer system 30 further includes a power source, such as a battery,for powering various circuits and other devices that are used to operatethe user computer system 30. Embodiments of the user computer system 30may also include a clock or other timer configured to determine and, insome cases, communicate actual or relative time to the controller 58.

As used herein, the memory 102, as previously described with respect tothe memory 24 of the controller 58, includes any computer readablemedium (as defined herein) configured to store data, code, or otherinformation. The memory 102 may include volatile memory, such asvolatile Random-Access Memory (RAM) including a cache area for thetemporary storage of data. The memory 102 may also include non-volatilememory, which can be embedded and/or may be removable. The non-volatilememory 102 can additionally or alternatively include an electricallyerasable programmable read-only memory (EEPROM), flash memory or thelike.

The memory 102 can store any of a number of applications or codethereof, which comprise computer-executable instructions/code executedby the processor 100 to implement the functions of the user computersystem 30 and/or the door system 40, and/or one or more of theprocess/method steps described herein. For example, the memory 102 mayinclude system specific applications or APPs or such applications as aconventional web browser application. In some embodiments, the usercomputer system 30 is capable of providing graphical and/or characterdepictions of the operating parameters of the door system 40. Thegraphical and/or character representations allow the user to set oradjust the operating parameters of the door system 50.

In some embodiments, the user computer system 30 includes a wirelesscommunication interface 106, such as a wireless communication chip, thatcommunicates with a wireless communication interface 26 over a wirelessconnection 32, such that the user computer system 30 communicates withcontroller 58 directly without requiring access to an external network(e.g., Wi-Fi network, the cellular network or other network), orotherwise, through such an external network. As previously described,the controller 58 may be directly coupled to and may directlycommunicate with the user computer system 30 over wireless connection32. The communication interface 106 may communicate using a wirelessnetworking protocol such as WiFi based on the Institute of Electricaland Electronics Engineers (IEEE) 802.11 standards; Bluetoothshort-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz,a proprietary interface or other wireless access technology that iscompatible with the protocol used by the controller 58 whether or notsuch protocol is described herein.

The user computer system 30 may also be configured to communicate withan external source such as a help desk associated with the door system40 over a wider communications network. In this regard, the usercomputer control 30 may be configured to operate with one or more airinterface standards, communication protocols, modulation types, andaccess types. By way of illustration, the communication interface 106 ofthe user computer system 30 may include a transceiver 108 that may beconfigured to operate in accordance with any of a number of first,second, third, and/or fourth-generation communication protocols and/orthe like. For example, the user computer system 30 may be configured tooperate in accordance with second-generation (2G) wireless communicationprotocols 1S-136 (time division multiple access ('PUMA)), GSM (globalsystem for mobile communication), and/or IS-95 (code division multipleaccess (CDMA)), or with third-generation (3G) wireless communicationprotocols, such as Consolidated Mobile Telecommunications System (UMTS),CDMA2000, wideband CDMA (WCDMA) and/or time division-synchronous CDMA(TD-SCDMA), with fourth-generation (4G) wireless communicationprotocols, with LTE protocols, with 3GPP protocols, fifth-generation(5G) wireless communication protocols, and/or the like. The usercomputer system 30 may also be configured to operate in accordance withnon-cellular communication mechanisms, such as via a wireless local areanetwork (WLAN) or other communication/data networks. While thecommunication interface 106, the display 103, and/or the transceiver 108are shown as separate blocks in FIG. 4 , these components may be asingle physical component, be within one or more physical components, orthe functionality of these components may be shared.

Providing the user computer system 30 with the functionality tocommunicate over a wider network may not be required for communicatingwith the controller 58 in order to set up the operating parameters ofthe door system 30. However, providing such functionality allows theuser computer system 30 to communicate with a help desk, retrieveinstallation instructions from the door system 40 manufacturer over theinternet and otherwise send and retrieve information to a node otherthan the door system 40. Referring to FIGS. 8 and 9 , in addition tocommunicating with the user computer system 30, the communicationinterface 26 of the door system 40 may communicate directly with otherdoor systems 40 such that operating parameters may be set at one doorsystem 40, the primary door system, and those settings may betransmitted via the communication interfaces 26 over additional wirelessconnections 32a ... 32n to other door systems 40a ... 40n (e.g., replicadoor operators). In this manner the user has the capability ofinstalling and setting up multiple door systems 40 by accessing theoperating parameters of a single door system 40 from the user computersystem 30. The door systems 40 may be arranged in a primary-replicanetwork or in a peer-to-peer network or using other networkarchitectures where the door systems 40 may be individually addressable.Furthermore, the user computer system 30 may also be used to set theoperating parameters for the plurality of door systems 40 in order tocontrol the access that a plurality of users have with respect to eachdoor system 40. That is, the door systems 40 may have operatingparameters set to allow certain users (e.g., as defined based on a userdevice, or the like) to use some door systems 40, while preventing useof other door systems 40 (e.g., preventing ingress and egress forcertain users for certain door systems 40).

In the embodiments described above, a user computer system 30 is used toconnect to the door system 40 through one or more user interfaces 104 ina display 103 of the user computer system 30. However, the user may nothave a wireless enabled user computer system 30, or access to a usercomputer system 30. In these situations, it may be desirable to providecomponents (e.g., devices, interfaces, or the like) that allow a user tocommunicate with the door system 40 directly (e.g., without the need forthe user computer system 30). As shown in FIGS. 1, 3 and 10 , the doorsystem 40 may be provided with an onboard control 204 in addition to, inplace of, or as a part of the communication interface 26. The onboardcontrol 204 may comprise one or more control output devices 206 and/orone or more control input devices 208. For example, the control outputdevices 206 may include one or more displays and one or more audiodevices (e.g., a speaker/microphone, or the like), which are operativelycoupled to the processor 22. The one or more displays may be configuredto present data in a graphical, alphanumerical, character, and/or otherlike format. The one or more displays may include any type of display,such as but not limited to an LCD, plasma, LED, electroluminescent,electronic paper, digital light processing technology, LCoS, fieldemission, laser TV, Quantum Dot, interferometric modulator, flexibledisplay, vacuum fluorescent, seven segment, Retina, OLED, TFT, AMOLED,and/or any other type of display. It should be understood that the oneor more displays may be operatively coupled to the communicationinterface 26, and/or the other components in the controller 58, suchthat instead of and/or in addition to, communicating wirelessly with theuser computer system 30, the user interfaces 104 (e.g., as described infurther detail below) or other like interfaces, may be presented on thedisplay of door system 40. The control input devices 208 may include anyof a number of devices allowing the onboard control 204 to receive andtransmit data inputted by a user. The control input devices 208 mayinclude a keypad, keyboard, touchscreen, touchpad, microphone, mouse,joystick, other pointer device, button, switch, toggle, soft key, and/orother input device(s). It should be understood that in addition to thecontrol input devices 208 that may be a part of a control 204 within thecontroller 58, the controller 58 may include other controller inputs 140(e.g., connections to which devices may be connected) as will bedescribed in further detail below.

It should be understood that the control 204, such as the one or morecontrol output devices 206 and/or the one or more control input devices208, allows for the functionality of the smart setup system as describedherein even if a wireless connection and/or user computer system 30 arenot available to the user. As such, the user may utilize the one or morecontrol output devices 206 and/or the one or more control input devices208, and the other components of the controller 58 in order to definethe operational parameters (e.g., make initial set-up configurations,adjust the present configurations, and/or the like), as will bedescribed herein.

The door system 40 may be provided with default settings for theoperating parameters such that absent instructions from the usercomputer system 30 the default settings control the operation of thedoor system 40. The default settings may be changed by the user usingthe user computer system 30 and/or the door system 40 itself, such thatthe door system 40 may be programmed to have customized operatingparameters. In some embodiments, the user may change each individualoperating parameter and/or may select from a plurality of operatingparameter sets, which provide different pre-selected operatingparameters based on the type of door system 40, the type ofinstallation, the regulations which the door system 40 should meet. Insome embodiments, in order to define the operating parameters, a menu isdisplayed on a user interface of the user computer system 30 and/or theone or more output devices 206 of the door system 40 that leads the userthrough a menu of operating parameters that may be programmed by theuser to control operation of the door system 40, as will be described infurther detail below.

A wide variety of operating parameters may be controlled using thesystem of the present disclosure. Example operating parameters aredescribed herein; however, the list is not exhaustive and otheroperating parameters in addition to, or in place of, those describedherein may be controlled. The door system 40 may be controlled to adjustthe opening and closing speed of the door. The door system 40 may becontrolled to adjust for the size and/or weight of the door. The doorsystem 40 may be controlled to compensate for wind and/or stack pressurecaused by the flow of air through a building. The door system 40 may becontrolled for latch retry. The door system 40 may be controlled forelectronic dampening. The door system 40 may be controlled forleft/right opening doors. The door system 40 may be controlled based atleast in part on communication with various door system inputs, such assensors (within the door system and/or operatively coupled to the doorsystem outside of the door system), such as motion detectors, to controlthe safe operation of the door. The door system 40 may be controlled forwhether the door system 40 operates based on an external activationdevice 136 (e.g., a switch) or operates with a slight movement of thedoor toward the open position, such as when a user pushes or pulls onthe door. The door system 40 may be controlled to operate on bothactivation of an external activation device 136 and movement of thedoor. The system 40 may be controlled for obstruction detection, anddelay sensitivity may be set and/or adjusted. For example, during theopening cycle, the door may be controlled to press against anobstruction for the obstruction delay time set and then to closenormally. During the closing cycle, the door may be controlled to pressagainst an obstruction for the time set and then to attempt to reclose.If the obstruction is still present, power to the motor may be turnedoff such that only a spring force pushes the door against theobstruction. The door system 40 may be controlled so that a “latchboost” feature can be adjusted such as to “Off”, “Low”, or “High.” Forexample, if during the last few inches of door closing, the door doesnot close due to mechanical door issues, environment issues, and thelike, additional closing force can be added to close the door. Theadditional force may be adjustable. The door system 40 may be controlledto adjust the time the door is held at the fully open position. The doorsystem 40 may be controlled to have a delayed start where the delay tothe motor start can be set in increments to allow unlocking of electrichardware. The door system 40 may be controlled for alarm delay. The doorsystem 40 may be controlled to set the closed and open position of thedoor. While a number of operating parameters have been described above,any operating parameter of the door system 40 may be defined (e.g., setand/or adjusted) using the user computer system 30 over the wirelessconnection 32, or through the use of the one or more output devices 206and/or the one or more input devices 208 of the door system 40.

As will be described in further detail with respect to FIG. 5 b below,the operating parameters may be set for operation with respect to thedetection and authentication of one or more specific users. That is, thedoor systems 40 may be set for operation based on the identity of theuser, user device of the user, (e.g., user computer systems 30, accesscontrol devices, or the like), and/or user action of the user trying touse the door for ingress and egress. That is, the door system 40 mayonly operate in accordance with operation parameters that are assignedto one or more users. As such, the door system 40, or a componentthereof or operatively coupled thereto, may detect the presence of auser, a user device, the occurrence of a user action, and/or movement,identity, and/or biometrics of a user, and in response operate the door(or prevent the door from operating). It should be understood that theoperating parameters for detection and authentication may be set by theuser at the location of the door system 40 and/or may be set remotelyfrom a decentralized user computer system 30 and/or from a centralizeduser computer system 30.

In addition to defining the operating parameters, the door system 40 maycommunicate with the user computer system 30 and/or other systems (e.g.,door system owner systems, maintenance provider systems, or the like) totrack and monitor operation of the door system 30. For example, thenumber of open/close cycles the door system 40 has experienced can berecorded and transmitted to the user computer system 30 and/or othersystems. The battery performance can be recorded and transmitted to theuser computer system 30 and/or other systems. The identity of the doorusers that are using the door for ingress and egress or are simplypassing by the door, as well as the frequency, time, duration, of suchuse or non-use may also be captured, stored, and/or communicated asnecessary for security or other purposes. For example, the use andnon-use of the door by individual users or users in generally, may beutilized for pattern recognition in order to determine when and how toallow activation of the door system 40. Other operating performanceissues may be tracked, monitored, and transmitted to the user computersystem 30 and/or other systems.

To monitor the proper installation of the door system 40 and door 42,the door system 40 may include sensors 8 that may provide feedback tothe user computer system 30 and/or the one or more control outputdevices 206 of the door system 40 (FIG. 3 ). For example, the doorsystem 40 may receive a signal from a sensor 8 that senses aninstallation condition of the door system 40. For example, anaccelerometer 10 may be provided in the door operator 40 where theaccelerometer 10 communicates with the controller 58. The accelerometer10 performs a level test where the level of the door operator 40 isdetected and a corresponding signal is transmitted to the controller 58.The level condition may be communicated (e.g., in a notification, or thelike) to the user computer system 30 and/or the one or more outputdevices 206, such that the installer can determine if the door system 40is installed properly. Similarly, a force detection sensor 12 may beprovided that detects the amount of force required to open and/or closethe door 42. If the force is above a predetermined level, the systemmay, for example, determine that the hinges are binding, the linkages ofthe door operator are not properly installed, or the like. For example,the force detection sensor 12 may be provided in the door system 40 thatcommunicates with the controller 58. The force detection sensor 12transmits a signal indicative of the force required to open the door tothe controller 58. The force level may be communicated to the usercomputer system 30 and/or to the one or more output devices 206 suchthat the installer can determine if the door is installed properly.Alternatively, the controller 58 may do a comparison between the actualforce as detected by sensor 12 and a desired force, and send an errormessage to the user computer system 30 and/or to the one or more controloutput devices 206 if the actual force as detected by sensor 12 exceedsa desired force limit. Various inputs such as sensors 10 and 12 (andother detection sensors 14, as will be discussed in further detaillater) may be operatively coupled (e.g., connected to) the controller 58at inputs 140 (e.g., connectors to which a device is connected) or maybe integral within the door system 40. The inputs 140 may beprogrammable such that various devices (e.g., sensors 8, or the like)may be connected to any one of the inputs 140. In other embodiments thesensors 8 may be integrally operatively coupled to the door systems 40or wireless communicate with the door systems 40. While sensors 10, 12,14 are examples of such devices, the devices may include other devicesor systems such as security systems/devices, fire protectionsystems/devices, activation devices 136, vestibule/door interlocksystems, HVAC control, door synchronization, locks, exit devices, wallplates, or the like.

A method of setting up and operating a door system 40 is described inFIG. 5 a with respect to the use of the user computer system 30 and/orthe control 204 of the door system 40 by a user. It should be understoodthat a connection (e.g., a wired connection, a wireless connection 32,or the like) between the controller 58 and the control 204 and/or theuser computer system 30 is established, as illustrated by Block 501 ofFIG. 5 a . When the connection is a wireless connection, the wirelessconnection 32 may or may not be of a limited range and may be a directconnection or intervening network components may be present. In someembodiments, the wireless connection 32 is a direct connection over alimited range. For security purposes, establishing the wirelessconnection may comprise receiving system authentication at thecontroller 58 through an input (e.g., inputs 140, one or more controlinput devices 208, and/or other input), as illustrated in block 502 ofFIG. 5 a . For example, establishing the wireless connection maycomprise receiving an action with respect to the input of the doorsystem 40. For example, the action may require the on/off input to betoggled on and off two, three, four, or the like times in order toactivate the wireless connection interface 26 and to thereafter allowthe user computer system 30 to make a wireless connection 32 to thecontroller 58. To further enhance security, the system may furtherreceive a user authentication at the controller 58 through the control204 and/or through the user computer system 30 (or through anothersystem that communicates with the controller 58) to authenticate theuser, as illustrated in block 503 of FIG. 5 a . For example, a user mayenter a code into an input device 208 of the door system 40, and/or intothe user computer system 30 when the user is accessing the door system40 through a wireless connection 32.

Information regarding at least one operating parameter is transmitted toand received by the door system 40, as illustrated by blocks 504 and 505of FIG. 5 a . For example, the information is transmitted by the userusing one or more control output devices 206 and/or one or more controlinput devices 208 of the door system 40. Alternatively, or additionally,the information related to the operating parameter may be transmitted tothe door system 40 through the user computer system 30 to the controller58 over the wireless connection (e.g., direct or indirect connection).The information that is transferred to and received by the door system40 may be the operating parameter itself, a value related to theoperating parameter, activation of an operating parameter (turning anoperating parameter on/off), or the like.

As illustrated in block 506 of FIG. 5 a , the information regarding theoperating parameter is saved by the controller 58 such as in memory 24(e.g., using the processor 22 in the controller 58, or the like). Aspreviously discussed herein, the controller 58 controls the operation ofthe door system 40, such as the operation of the drive system 52 of thedoor system 50 in the future using the information regarding the atleast one operating parameter, as illustrated in block 507 of FIG. 5 a .

As previously discussed herein, the user computer system 30 and/or theone or more output devices 206 may display various menus, icons, andother information to the user on one or more user interfaces). The usercan access (e.g., scroll through, or the like) menus and icons displayedon a user interface to input information to, and receive informationfrom, the controller 58. Referring to FIG. 6A, an example screen shot isshown illustrating a user interface 104 on a display 103 of a usercomputer system 30. The screen shot. of FIG. 6A may be an initial homescreen that presents a user with a menu 300 for adjusting or setting theoperating parameters of a door system 40 that is in communication withthe user computer system 30. The home screen may also present the userwith information 302 about the door system 40. The information 302 mayinclude identifying information 304 about the door system 40 such asSerial Number, software Version, hardware Version or the like. Theinformation 302 may also include status information 306 about the statusof the door system 40 as installed. For example, the status information306 may include whether any System Errors are detected. These errors maybe based on the sensors or diagnostics performed by the controller 58.The status information 306 may include Cycle Count that indicates use.The status information 306 may include Door Position that indicates, forexample, the position of the door system 40. The status information 306may include other information such as Power Status or Temperature thatmay be used to determine faulty operating conditions. The information302 may also include information 308 about the configuration of the doorsystem 40 itself such as Relay or battery conditions.

The user may access the control system using the menu 300. For example,assuming that the door system 40 has been installed properly, the usermay want to change one or more of the operating parameters. The user mayaccess the “Settings” menu to change the operating parameters bydepressing the “Settings” button 310 on the home screen. In theillustrated embodiment, the buttons are soft buttons provided on a touchscreen; however, any suitable user input may be used. FIG. 6B shows anexample “Settings” menu 312 that may be presented to the user. The“Settings” menu 312 provides a list of user controllable operatingparameters. The list of operating parameters is made by way of exampleand in use the operating parameters may be different than thosespecifically listed in FIG. 6B. In addition to the buttons 314, thescreen may present a value 316 for each operating parameter. The values316 may be preset values or the values may have been set by the userduring initial door setup. The user may select one or more of theoperating parameters. For explanatory purposes, assume the user selects“Opening Speed.” The remote control will then display the “OpeningSpeed” control screen as shown in FIG. 6C. The user may adjust theopening speed using controller 318 and may save the change by pressingthe “Save” button 320. In this embodiment, the information provided tothe door operator 40 from the user computer system 30 is anidentification of the operating parameter to be changed and the value(e.g. speed) of the operating parameter. The settings are stored inmemory 24. The controller 318 is shown as an adjustable slider; however,any suitable control may be used. While speed is used as the example forsetting an operating parameter, it should be understood that theoperating parameter may be related to one or more users being authorized(and the type of authentication required) for the one or more users touse the door for ingress and egress. After the operating parameters areset, the user may return to the “Home” page by depressing the “Home”button 322.

From the “Home” page, FIG. 6A, the user may press the “Door Set Up”button 324. The Door Set Up button 324 may take the user to a door setup screen as shown in FIG. 6D. The door set up screen may take the userthrough a series of door set up menus to initialize the operatingparameters of the newly installed door. It should be noted that the“Settings” menu (FIG. 6B) may also be accessed during the door set upprocess to set the initial operating parameters. FIG. 6D illustrates onedoor set up parameter. As illustrated, the door set up parameter setsthe door open position and the door closed position. To use the door setup menu the door is closed and the “Set Closed Position” button 326 ispressed such that the door system 40 is programmed to recognize theposition of the door system 40 at the door closed position. Similarly,the door is opened (e.g., moved to the fully open position, or the like)and the “Set Open Position” button 328 is pressed such that the dooroperator 40 is programmed to recognize the position of the door system40 at the door open position. These positions are stored in memory 24.The “Learn” button 330 may be pressed such that the system completes atest or a series of tests to determine certain characteristics of thedoor such as door weight and size (inertia) and door system springsetting. If the door operator 40 is able to property complete the tests,the user is instructed to press the “Refresh” button 332 to save thesettings in memory of the controller 58. The user may return to the“Home” page by depressing the “Home” button 334. If the operator was notsuccessful in completing the test the user may re-run the test(s) aftermaking adjustments to the door system 40, the door 2, and/or associatedcomponents.

From the “Home” page, FIG. 6A, the user may press the “Control Inputs”menu button 336. The Control Inputs button 336 may take the user to anExternal Inputs menu 338 as shown in FIG. 6E. The External Inputs menuallows the user to set the various inputs 140 of the door system 40. Forexample, the various sensors 8 activation devices 136, or the like asdescribed herein, in addition to other inputs such as from fire controlsystems, alarm systems or the like, may be connected to the inputs 140of the door system 40. The External Inputs menu 338 allows the user todesignate specific inputs 140 for the various input devices connected tothe system using the Assign Inputs button 340. This allows the dooroperator 140 to be customized for a particular user’s needs andintegrated into other systems. The user is instructed to press the“Refresh” button 342 to save the settings. The user may return to the“Home” page by depressing the “Home” button 344.

From the “Home” page, FIG. 6A, the user may press the “Support” menubutton 350. The Support button 350 may take the user to themanufacturer’s web site or other external site such as over an Internetconnection where the user may be provided technical support for theinstallation and setup of the door system 40.

In the embodiments described above with respect to FIGS. 6A-6D, a usercomputer system 30 is used to connect to the door system 40 through theuser interface 104. However, as also described above, the user may nothave, or have access to, a wireless enabled user computer system 30. Insuch situations, it may be desirable to provide the control 204,including the one or more input devices 206 and/or one or more outputdevices 206 within the door system 40. As such, the one or more outputdevices 206 may be used to provide the user interfaces (e.g., asdescribed with respect to FIGS. 6A-6B) as part of the door system 40. Inthis manner, the functionality of the smart setup system as describedherein may be provided even if a wireless connection and/or usercomputer system 30 are not available to the user.

After the smart set up system is used to set up or change the operatingparameters of the door system 40, the door system 40 may be utilized bya user in accordance with the operating parameters of the door system40. FIG. 5 b illustrates a method of using the smart door system forauthentication and activation, in accordance with some embodiments ofthe disclosure.

In particular, as illustrated by block 602 in FIG. 5 b , the door systemmay identify the presence of a user device. As previously describedherein the user device may be a user computer system 30 (e.g., asmartphone, smart wearable device - smartwatch, smart glasses, or thelike) or the user device may be an access control device. The accesscontrol device may be a badge (e.g., an electronic badge), a card (e.g.,electronic card - RFID, NFC, or the like), a fob, a key (e.g.,electronic key), any other control device that is or is not wirelesslyenabled, and which may be used to operate the door system 30 and/oranother component of the door (e.g., electronic lock). The door system40 may identify the presence of the user device in any number of ways,such as through the use of one or more door input devices 208. The oneor more door input devices may be the communication interface 26 itself,and/or may communicate with the communication interface 26. As such, thedoor input devices 208, as described herein, may be activation devices136, sensors 8, security devices, or the like. The door input devicesand/or the communication interface 26 may identify that the user deviceis near the door system 40, may communicate with the user device, and/ormay capture information from the user device (e.g., wirelesslycommunicate with the user device, capture information from the userdevice without wireless communication, utilize both wireless and otherinformation capture means, or the like).

In some embodiments, the user device may be a user computer system 30,such as a smartphone, smart wearable device (e.g., a watch, or thelike), or the like that communicates with the door system 40 when theuser computer system 30 is in range of the door system 40. It should beunderstood that the user computer system 30 may commentate directly withthe door system 40 and/or through the use of an application that isrunning on the user computer system 30. In some embodiments (as will bediscussed in further detail with respect to block 608), the door system40 (e.g., through the door input device, or the like) may determine ifthe user device is moving closer to the door (e.g., indicating that theuser may want to activate the door) or if the user device is moving pastthe door (e.g., as parallel to the door, near the door, away from thedoor, or the like) indicating that the user may not want to activate thedoor.

As illustrated by block 604, in addition to identifying the presence ofthe user device, the door system 40 may identify user deviceinformation. For example, the door system 40 (e.g., the input deviceand/or communication interface 26 of the controller 58) may receive(e.g., pull from or receive a push of) user device information, such asa user device identifier. The user device identifier may provideinformation about the user device in the presence of the door system 40.The user device identifier may be a string of characters (e.g., letters,numbers, symbols, or the like), a signal, private public keys, codes, orany other type of identifier, which in some embodiments may be encryptedfor security purposes. In some embodiments instead of a user deviceidentifier, the user device information may include the user name, auser identifier, or the like for the user assigned to the user device.In this way the user device information may be utilized to identify theuser to which the user device is assigned.

FIG. 5 b further illustrates in block 606 that the door system 40 (e.g.,the input device and/or communication interface 26 of the controller 58)may receive an authentication action from the user device. Theauthentication action may be any action taken by the user using the userdevice, and in some embodiments may be described as a “knowing act.” Forexample, the authentication action may be the user signing into anapplication on the user device; entering a password into the userdevice; selecting a feature (e.g., button, link, or the like) within theapplication; selecting an input on the user device (e.g., button,pressure sensitive screen, or the like); performing an action with theuser device (e.g., swiping the user device in a reader, placing the userdevice near a reader, or the like); making a gesture with the userdevice (e.g., shaking the user device, moving the user device in apattern, making a movement on a touchscreen of the user device, or thelike); allowing the user device to scan the user (e.g., face,fingerprint, palm, or the like scan); making a voice command in the userdevice (e.g., in the user computer system 30); and/or anotherauthentication action not specifically described herein.

In some embodiments, it should be understood that in addition to orinstead of the door system identifying the presence of the user device(e.g., as described in block 602), identifying information from the userdevice (e.g., as described in block 604), and/or receivingauthentication from the user device, the door system 40 may be activatedby the user’s voice commands (e.g., an “open door command,” or thelike). For example, when approaching the door system, the user may speakthe phrase “open door”, (or another like phrase) and the door system 40(e.g., through a sensor 8, such as a microphone, or the like) or theuser device (e.g., through a microphone and the processor passes thecommunication to the door system 40) receives the command and the doorsystem 40 may open the door as requested. However, as previouslydescribed, the door system 40 may identify information from the userdevice (as described in block 604) and/or require authentication fromthe user (e.g., as described in block 606) before activating the door.

Block 608 further illustrated in block 608 that in some embodiments, oneor more detection sensors 14 may be used to detect a user condition ofthe user, such as to detect the movement of the user, the identity ofthe user, biometric information of the user, or the like. As previouslydiscussed herein the one or more detection sensors 14 may be operativelycoupled to the door system 40, such as, may be integral with the doorsystem 40 or may be removably coupled to the door system 40 through awired or wireless connection. For example, the one or more detectionsensors 14 may comprise one or more movement sensors, such as, a camera,infrared, motion sensor, movement sensor, light curtain, pressure pad,or the like sensor that may detect the movement of a user near the door(e.g., at a door or passing by a door). Alternatively, or additionally,the movement of the user near the door may be determined by tracking themovement of the user device of the user near the door. The one or moremovement sensors and/or the movement of the user device may be utilizedin order to determine if the user is going to access the door or if theuser is merely passing by the door.

The one or more detection sensors 14 may be one or more identificationsensors, such as a camera (e.g., video and/or still, or the like) whichmay be used to detect the identity of the user. The one or moreidentification sensors may use of facial recognition, identification ofthe physical appearance of the user (e.g., type of clothes, color ofclothes, location of clothes, pattern, logos, size, or the like, height,hair color, hair length, features, or the like), or other likeidentification information. Identification of the user may be utilizedin order to allow or prevent the access of a particular user or a typeof user to a particular door.

The one or more detection sensors 14 may be one or more biometricsensors, such as an infrared, retina, camera, microphone, or other likesensor. The one or more biometric sensors may be used to providetemperature detection, an indication of a user being sick (e.g., cough,or the like), voice recognition, height (or other physical features), orthe like of users near the door, which may be used to allow or preventthe access of a particular user (e.g., from voice recognition) or typeof user (e.g., determining users that have temperatures above or below100° F., or the like) to a particular door.

It should be understood that in some embodiments, a sensor 14 may servetwo purposes, such as a camera may provide for identifying a user andfor determining the motion of users. It should be understood that theone or more detection sensors 14 may be used alone and/or in combinationwith the user computer systems 30 in order to determine if access shouldbe permitted to a user or a group of users. For example, while a usermay be typically granted access to a door, it should be understood thatthe one or more detection sensors 14 may be used to authenticate theuser or override the authentication of a user or a group of users, aswill be discussed in further detail herein.

Block 610 of FIG. 5 b illustrates that the door system 40, through theuse of one or more door input devices, such as detection sensors 14, mayin addition to being utilized to detect specific users near the door,may also be utilized to identify the conditions in an area around thedoor system 40. For example, the area may include a specific distanceaway from the door system 40 (e.g., 2, 4, 6, 8, 10, 15, 20 ft, or thelike). In some embodiment the conditions being evaluated around the doorinclude the presence of any objects (e.g., other people, inanimateobjects, or the like) in the surrounding area around the door. Forexample, the one or more door inputs devices, such as security devicesensors like cameras (e.g., video, stills, or the like), movementsensors, infrared sensors, radar sensors, motion sensors, visionsensors, 3D sensors, laser sensors, light curtains, or the like may beoperatively coupled to the door system 40 (e.g., within or adjacent tothe door systems) to identify any objects near the door. As such, theone or more door input devices may identify objects, such as people orinanimate objects along with the presence of the user device. In someembodiments the additional people identified in the door surroundingsmay be unauthorized users (e.g., tailgaters, or the like). As such, thedoor system 40 may identify if there is an object that should not bepresent for the operation of the door system 40.

Block 612 of FIG. 5 b illustrates that the door system 40 (e.g., a doorinput device) identifies the operating parameters for the door system 40based on the presence of the user device, the user device information,the authentication action from the user device, the one or moredetection sensors 14, and/or the surrounding objects. For example, oncethe door system 40 has the user device information (e.g., user deviceidentifier, user information, or the like), the authentication action,and/or detected that the user wants to access the door, the controller58 of the door system 30 may access stored information (e.g., storedlocally within the door system 40 memory, stored in a centralizeddatabase on a server located apart from the door system 40, or thelike). The stored information may include stored user device informationfor a plurality of users, authentication requirements for the users,and/or operating parameters for the foregoing. Additionally, the storedinformation may include operating parameters when objects are identifiedin a surrounding area near the door system 40 (e.g., unauthorized users,or the like). Additionally, the stored information may include overrideinformation, such as should a user device and/or authentication becompromised, and the one or more detection sensors identify anon-authorized user (e.g., wearing certain clothes, meeting a physicaldescription, or the like). For example, the stored information mayinclude a list of user device information, how the user device isauthenticated (e.g., what action the user is required to take forauthentication) and the resulting operation of the door system 40 shoulda user be identified and authenticated. In some embodiments, theoperating parameters may be general operating parameters for all usersor a group of users. Alternatively, the operating parameters may bespecific for specific users and/or types of users. That is, for example,if the user is a child (e.g., at a school), a patient at a hospital, auser that has an object (e.g., cart, box, wheelchair, gurney, forklift,delivery vehicle, another person, or the like), an elderly person, orother like user, the operating parameters may open and/or close the doormore slowly. Alternatively, if the user is an adult, doctor, securitypersonal, or a person without an accompanying object, the operatingparameters may open and/or close the door more quickly. In someembodiments, the specific user may have specific operating parametersregarding how the user would like the door system 40 to operate thedoor. As such, the operating parameters (e.g., speed, force, open time,or the like) of the door system 40 may be changed depending the on theuser identified and/or the conditions around the door system 40.

It should be understood that in some embodiments, the operationparameters for an authorized user may be overwritten if unauthorizedusers and/or unauthorized objects are identified in surrounding areasaround the door system 40. As such, the one or more input devices, suchas the one or more detection sensors 14, may be utilized to take variousactions outside of the normal operating procedures based on theconditions occurring around the door. For example, a door system 40 maynot unlock for a user that would have otherwise been authorized user ifthe security devices detect multiple users within defined area, and atleast one of such users is not authorized. In other examples, the doorsystem may not operate to unlock or open a door for an otherwiseauthorized user on one side (e.g., the secured side — typically theinside) if another user (e.g., unauthorized user) is identified onanother side (e.g., located at, approaching, or the like on the secondside - typically the non-secured side). In some embodiments, should auser be determined to only be passing by a door, instead of headingtowards the door, the door system 40 may not operate (e.g., may beoverridden) even if the user device is present and the user has beenauthenticated. In another example, should a notification (e.g., analert) be sent to prevent a user with specific physical attributes evenif a user device is present and a user is authenticated, the door system40 may not operate (e.g., may be overridden) when detected by theidentification sensor. In another example, when a user is identified hashaving a particular biometric reading (e.g., a temperature over athreshold value, a cough, or the like), the door system 40 may notoperate (e.g., may be overridden).

While FIG. 5 b illustrates that the authentication action may be takenby the user on the user device before the door system 40 identifies theoperating parameters, it should be understood that the once the doorsystem 40 identifies the user device information based on the userdevice, the door system 40 may identify stored information regardingwhat authentication is required from the user device, if any. In someembodiments when the door system 40 receives the correct authentication,the door system 40 will operate in accordance with the stored operatingparameters. Alternatively, the door system 40 may send a request to theuser device (e.g., message the user computer system 30 - text message,pop-up window, application alert, or the like) requesting the user toprovide the authentication action. The request may include a storedauthentication action, a dynamic authentication that the user isrequired to take, and/or a combination of both. For example, the usermay be required to enter a dynamic pin number or take a specific actionwith respect to the user device in addition to providing the user’stypical authentication action, which may increase security related toutilizing the door.

While the embodiments of the disclosure discussed above relate to theuse of a single user device, it should be understood that multiple userdevices may be utilized by the user in order to activate the door system40. For example, the user may be required to swipe an access controlbadge in addition to having the user’s user computer system 30. As such,the door system 40 may identify the presence of the user computer system30 and the authentication action may require the user to swipe a badgeto activate the door system 40.

Furthermore, embodiments of the invention may include identifying thepresence of multiple user devices at the same time (or within a range oftime), thus indicating that multiple users are present (e.g., trying touse the door), and determining the operating parameters for the presenceof multiple users. As such, when multiple user devices are present, thedoor system 40 may identify at least one operating parameter for each ofthe multiple user devices, and thus, have a pool of multiple operatingparameter options (e.g., multiple door opening speeds, forces, time toleave open before closing, or the like). In response the door system 40may select at least one operating parameter based on the multipleoperating parameter options. In some embodiments the at least oneoperating parameter selected from the multiple operating parameters isdetermined by comparing the multiple operating parameters options foreach of the multiple user devices and optimizing the operation of thedoor system. For example, the operating parameter that has the longerduration for keeping the door open may be selected (e.g., it would takelonger to allow multiple users through the door). Alternatively, shouldthere be users on each side of the door, the door may open at the lowestspeed to accommodate the user that has an operating parameter with thelowest speed. In alternate embodiments, the operating parameter mayadjusted, changed, and/or a new operating parameter may be created whenmultiple users devices are identified. That is, should multiple userdevices have two different durations for keeping a door open, the doorsystem may use the longer duration operating parameter and apply afactor increase to account for the identification of multiple users. Thefactor increase may be based on the number of user devices identified.For example, the factor increase in the duration that the door mayremain open may be 1.5 times the operating parameter of a single userwhen two users are present, but it may be 2 times the operatingparameter of a single user when 3 users are present. While specificoperating parameters may be discussed herein, it should be understoodthat any operating parameters may be selected, changed, adjusted, or thelike when multiple users are identified.

While the operating parameters are also described herein as opening aclosed door when an authorized user is identified, it should beunderstood that the door system 40 may be maintained in other positions(e.g., open) during certain time periods. Accordingly, in someembodiments the activation of the door system 40 may be to close thedoor and/or lock the door when an unauthorized person is identified.

FIG. 5 b further illustrates in block 614 that the door system 40 willoperate based on the operating parameters identified in accordance withblock 612. However, in some embodiments of the invention, duringoperation of the door system 40, should the one or more door inputdevices, such as the one or more detection sensors 14, identify that anobject (e.g., person or thing) is located in the door operating area(e.g., opening of the door, within the arc of movement of the door, orthe like), the authorized user has been compromised (e.g., user devicehas been taken), the movement of the user changes direction (e.g.,instead of movement towards the door the user begins to move away fromthe door), or the like, the controller 58 of the door system 40 mayoverride the operating parameters of the door system 40. For example, adoor system 40 may hold a door open should a user take too long to passthrough the door, reverse the movement of the door towards closingshould the movement of the user change, locking the door should the userbe determined to be unauthorized, or the like.

Moreover, block 616 of FIG. 5 b illustrates that the door input devices,such as one or more sensors 14, may be further utilized to monitor theuse of the door over time. For example, a camera may be utilized tocapture an image (e.g., in a video, still photo, live photo, or thelike) when users pass through or use a door for security purposes. Thatis, the user information may be captured for security purposes in orderto capture when a user enters an area within a building. Additionally,the door systems 40, user devices, and/or one or more detection sensors14 may be further utilized to track ingress and egress of users within abuilding. That is, the door systems may be utilized to identify theusers that passed through doors within a building and/or log when theusers passed through specific doors (or tried to pass through specificdoors).

In other embodiments, the use or non-use of the door by the user,including the movement of a user, may be tracked by one or moredetection sensors 14 (e.g., the one or more movement sensors) and/or theuser device (e.g., user computer systems 30, or the like) in order tostore not only time of day, frequency of use, duration of use or non-useof the door system 40, but the movement of the user around the door(e.g., towards the door, away from the door, passing by the door, or thelike). The individual door systems 40, a centralized system, or the likemay use the stored user information in order to analyze the use and/ornon-use of the doors in order to determine any patterns of the user, agroup of users, or the like for a specific door and/or for multipledoors. Moreover, while the movement of a single user may be tracked andanalyzed for patterns, the movement of multiple users (e.g, 2, 3, 4, 5,or the like) around the door at the same time may also be tracked andanalyzed for patterns. The patterns may be further utilized to setoperating parameters (e.g., change, delete, add, or the like) for theuser or a group of users. That is, over time the patterns of use forusers with specific doors may change based on time, the door being used,the presence of multiple users, objects with the user (e.g., carts, orthe like), movement of the user around the door, or the like. As such,the operating parameters of a specific user or group of users for a dooror a group of doors may be different based on when a user is near adoor, how a user is moving, what the user has (e.g., cart, box, or thelike), or the like. It should be understood that the door systems 40,the one or more detection sensors 14, and/or the user devices may bemonitored (e.g., periodically, continuously, and/or the like) in orderto change the operating parameters of the door systems 40 over time(e.g., periodically, in real-time, such as instantaneously or withinseconds or minutes, or the like) as the pattens of use for individualusers or a group of users change.

In some embodiments, the door system 40 may also be operatively coupledto a lock in the door. As such, the user device (e.g., user computersystem 30 and/or application thereof) may be utilized to unlock, lock,open and/or close the door as a user approaches the door system 40. Assuch, the automated movement of the door based on the operatingparameters may be controlled in association with the locking and/orunlocking of a door lock.

The door system 40 of the present disclosure provides improvements tocurrent door operators and/or door closers. It should be understood thatsince door systems are placed at areas of ingress and egress frombuildings, they are ideally situated to integrate various securitysystems directly into the door system, as opposed to having a separatesecurity system (e.g., card swipe, identification reader, RFID, or thelike) that operates independently of the door system 40 (e.g., thatcontrols a lock on the door, or the like). As such, the door systems 40described herein are able to control the actions of the door (e.g.locking and unlocking, controlling the opening and closing of the door),utilizing the door system to operate the ingress and egress based onauthentication and activations of users, monitoring the use and non-useof the doors for pattern recognition for improved operation of the doorsystems 40 for each user, or the like. The integration of thesecomponents greatly reduces the costs to securely operate the door andimproves the personalization of the operation of the door systems 40.Moreover, the features of the present disclosure may be utilized invarious situations, such as in schools to identify authorized childrenand/or adults that are equipped with a user device causing doors to lockif the user is not an authorized child and/or adult. Other examples ofthe use of the door system 40 may include equipping patients (e.g.,patients with dementia, or other health issues), such that the patientsmay be allowed or denied access to doors, while other people may freelymove through the doors. Furthermore, the use of detection sensors 14 maybe used to prevent access of otherwise authorized users when authorizeduser devices have been compromised, when the authorized user are presentat the door but are not going to use the door, when the authorized userhas a physical condition that prevents entry (e.g., temperature over athreshold level, is identified as being sick, or the like).

As described herein, the term user may be used generally herein todescribe a person that is responsible for installing, setting up,maintaining, and/or changing the operation of a door system 40. In suchsituations the user may be referred to as an installation user orservice provider user. Alternatively, when describing a user that istrying to pass through the door using the door system 40, the user maybe referred to as a patron user or operating user.

Although specific embodiments have been illustrated and describedherein, those of ordinary skill in the art appreciate that anyarrangement which is calculated to achieve the same purpose may besubstituted for the specific embodiments shown and that the inventionhas other applications in other environments. This application isintended to cover any adaptations or variations of the presentinvention. The following claims are in no way intended to limit thescope of the invention to the specific embodiments described herein.

What is claimed is:
 1. A door system, wherein the door system is a dooroperator or a door closer, the door system comprising: a drive systemfor operating a door, wherein the door is a swinging door and the drivesystem comprises: a motor; and a linkage assembly operatively coupled tothe motor, wherein the linkage assembly is configured to be operativelycoupled to the door, a wall, or a door frame; one or more door inputdevices; and a controller for controlling the drive system andoperatively coupled to the one or more door input devices, thecontroller comprising: a communication interface; a memory havingcomputer readable code stored thereon; and a processor operativelycoupled to the memory and the communication interface, wherein theprocessor is configured to execute the computer readable code to:identify a presence of a user through the one or more door inputdevices; identify the user from a user device through the one or moredoor input devices; identify at least one operating parameter for theuser from a plurality of operating parameters that are stored for aplurality of users in a database by identifying the at least oneoperating parameter stored for the user, wherein the plurality ofoperating parameters stored in the database comprise a speed of openingor closing the door, a force for opening or closing the door, or opentime for the door for the plurality of users, and wherein the pluralityof operating parameters are used to change the operation of the drivesystem based on the identification of the user; and control the drivesystem based on the at least one operating parameter identified for theuser from the database.
 2. The door system of claim 1, whereinidentifying the presence of the user comprises identifying the presenceof the user device, and wherein identifying the user comprisesidentifying user device information.
 3. The door system of claim 2,wherein identifying the user device comprises establishing wirelesscommunication with the user device, and wherein the user device is auser computer system or an access control device.
 4. The door system ofclaim 3, wherein the user computer system is a smartphone device or asmartwearable device.
 5. The door system of claim 2, wherein identifyingthe user device information based on the user device comprises receivingthe user device information from the user device through a wirelessconnection with the user device.
 6. The door system of claim 2, whereinidentifying the user device information comprises: receiving a userdevice identifier from the user device; and accessing stored user deviceinformation using the user device identifier.
 7. The door system ofclaim 2, wherein identifying the at least one operating parameter basedon the user device information comprises: accessing stored user deviceinformation for the plurality of users, wherein the stored user deviceinformation for each of the plurality of users is assigned one or morestored operating parameters; comparing the user device information withthe stored user device information; and identifying the at least oneoperating parameter from the one or more stored operating parametersbased on the comparison of the user device information with the storeduser device information.
 8. The door system of claim 2, wherein theprocessor is further configured to execute the computer readable codeto: identify an authentication action from the user device; and verifythe authentication action by comparing the authentication actionidentified from the user device with a stored authentication action forthe user device; wherein identifying the at least one operatingparameter is further based on the authentication action.
 9. The doorsystem of claim 8, wherein the authentication action comprises the usermaking a gesture with the user device or selecting a feature on the userdevice.
 10. The door system of claim 2, wherein the processor isconfigured to execute the computer readable code to: change the at leastone operating parameter from at least one past operating parameter whenthe user device identified is different than a previous user device. 11.The door system of claim 2, wherein the processor is configured toexecute the computer readable code to: identify a presence of multipleuser devices; and optimize operation of the door system based on thepresence of the multiple user devices.
 12. The door system of claim 11,wherein identifying the at least one operating parameter comprises:identifying an operating parameter from each of the multiple userdevices to determine multiple operating parameter options; and selectingthe at least one operating parameter from the multiple operatingparameter options or creating a new operating parameter based on themultiple operating parameters options.
 13. The door system of claim 1,wherein the one or more door input devices comprises one or moredetection sensors, wherein the processor is configured to execute thecomputer readable code to identify the presence of the user by:detecting movement of the user near the door with the one or moredetection sensors; wherein the user is identified when the user isdetected moving towards the door, and wherein the user fails to beidentified when the user is moving past the door.
 14. The door system ofclaim 1, wherein the one or more door input devices comprises one ormore detection sensors, wherein the processor is further configured toexecute the computer readable code to: identify one or more objects in adoor area of the door system using the one or more detection sensors;wherein identifying the at least one operating parameter based on theuser is further based on the one or more objects in the door area. 15.The door system of claim 1, wherein the one or more door input devicescomprises one or more detection sensors, wherein the processor isfurther configured to execute the computer readable code to: identifyone or more objects in a door area of the door system using the one ormore detection sensors during operation of the door system; and changingthe at least one operating parameter during operation of the door systembased on the identification of the one or more objects in the door area.16. The door system of claim 1, wherein the one or more door inputdevices comprises one or more detection sensors, wherein the processoris further configured to execute the computer readable code to: identifya user condition using the one or more detection sensors; overriding theoperation of the door system when the user condition is identified. 17.The door system of claim 1, wherein at least one of the plurality ofoperating parameters are set by the user.
 18. The door system of claim1, wherein the plurality of operating parameters comprise at least theopen time for the door, and the speed of opening or closing the door orthe force for opening or closing the door.
 19. The door system of claim1, wherein identifying the presence of the user comprises: receiving avoice command from the user; wherein controlling the drive system isbased on the voice command; and wherein the voice command is receivedthrough the one or more door input devices or received from the userdevice.
 20. A method of operating a door system, wherein the door systemis a door operator or a door closer, wherein the door system comprises adrive system comprising a motor and a linkage assembly operativelycoupled to the motor, wherein the door system is operatively coupled toone or more door input devices, wherein the door system and linkageassembly are operatively coupled to a door and a wall or a door frame,and wherein the door is a swinging door, the method comprising:identifying, by one or more processors of the door system, a presence ofa user through the use of the one or more door input devices;identifying, by the one or more processors, the user from a user devicethrough the one or more door input devices; identifying, by the one ormore processors, at least one operating parameter for the user from aplurality of operating parameters that are stored for a plurality ofusers in a database by identifying the at least one operating parameterstored for the user, wherein the plurality of operating parametersstored in the database comprise a speed of opening or closing a door, aforce for opening or closing the door, or an open time for the door forthe plurality of users, and wherein the plurality of operatingparameters are used to change the operation of the drive system based onthe identification of the presence of the user; and controlling, by theone or more processors, the drive system based on the at least oneoperating parameter identified for the user from the database to operatethe door.