Wireless credential proximity control

ABSTRACT

Embodiments of the present application generally relate to controlling ingress/egress through entryway devices. More particularly, but not exclusively, embodiments of the present invention relate to attaining confirmation of intent relating to access to a controlled opening. According to certain embodiments, the credential device and/or the user of the credential device is prompted to provide a response, or otherwise is to perform certain actions, that can demonstrate a confirmation of intent to gain access to the controlled opening. Such responses and/or actions can be evaluated to determine authority to gain access to the controlled opening. Further, such intent confirmation events may, depending on the embodiment, be performed before or after credential information is communicated from the credential device and/or before or after pairing of the access control device and the credential device. According to other embodiments, intent may be confirmed, at least in part, based on changes in the characteristics of signals communicated from the credential device.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of U.S. Provisional PatentApplication Ser. No. 62/323,127 filed Apr. 15, 2016, the contents ofwhich are incorporated herein by reference in their entirety.

BACKGROUND

Embodiments of the present invention generally relate to controllingingress/egress through entryway devices. More particularly, but notexclusively, embodiments of the present invention relate to attainingconfirmation of intent relating to access to a controlled opening(s) aspart of an approach to controlling the opening/closing of entrywaydevices.

Security management systems often utilize a variety of access controldevices to control ingress and/or egress through a controlled opening,including, for example, an entryway that can be closed through the useof an entryway device, including, but not limited to, a door or gate.The operation and management of such security management systemstypically involves the transmission and/or receipt of certain electroniccommunications between different credential devices and an accesscontrol system. Often, the communications between the credential deviceand the access control system are generally omni-directional. Forexample, a mobile credential device may transmit signals containinginformation relating to authorization to unlock an lock device from avariety of positions relative to a receiving component of the accesscontrol system. Further such communication from the credential devicemay be automatically transmitted in that such communications often donot require specific prompting by a user of the credential device.

Yet, in at least certain situations, the credential device being able toautomatically communicate information relating to authorization to passthrough the controlled opening does not necessarily correlate to anintent by a user of the credential device to actually pass through acontrolled opening. For example, the credential device may pass througha hallway having a plurality of controlled openings and associated lockdevices. In certain situations, the presence of the credential device inrelative close proximity to the lock device can lead to the credentialdevice automatically communicating to the lock device informationcorresponding to authorization to unlock lock device and/or to passthrough the associated controlled opening. Yet, the presence of thecredential device in such a location does necessarily always equate toan intent of a user of the credential device to actually pass throughany or all of those controlled openings. Moreover, in at least certainsituations, despite the presence or position of the credential device,the actual intent of the user may be that the status(es) of at least oneof the access control devices remain unchanged, such as, for example,the access control device(s) remains in a locked state and/or theassociated entryway device(s) for the controlled entryway(s) remainclosed.

Additionally, the omni-directional nature of at least some credentialdevices can present issues with determining which side(s) of thecontrolled opening the credential device is, or is no longer,positioned. For example, the omni-directional nature of communicationsat least with the credential device may present issues with determiningwhether the authorized credential device has, or has not, passedthrough, or is in the process of passing through, the associatedcontrolled opening. For example, often, for at least some systems,following authorization for the lock device to be unlocked, andsubsequent opening of the associated entryway device and correspondingpassage through the controlled opening, the credential device maycontinue to communicate to the lock device an intent to pass through thecontrolled opening and/or a request that the lock device be in anunlocked state. Such continued communication can, in at least certainsituations, lead to the lock device continuing to be in an unlockedstate and/or leave the controlled opening otherwise susceptible tosubsequent passage by unauthorized users, including people who maytailgate or otherwise subsequently follow the authorized credentialdevice through the controlled opening.

BRIEF SUMMARY

In one aspect of the present application, a method is provided forcontrolling ingress/egress through entryway devices. More particularly,but not exclusively, embodiments of the present invention relate toattaining confirmation of intent relating to access to a controlledopening. According to certain embodiments, the credential device and/orthe user of the credential device is prompted to provide a response, orotherwise is to perform certain actions, that can demonstrate aconfirmation of intent to gain access to the controlled opening. Suchresponses and/or actions can be evaluated to determine authority to gainaccess to the controlled opening. Further, such intent confirmationevents may, depending on the embodiment, be performed before or aftercredential information is communicated from the credential device and/orbefore or after pairing of the access control device and the credentialdevice. According to other embodiments, intent may be confirmed, atleast in part, on changes in the characteristics of signals communicatedfrom the credential device.

BRIEF DESCRIPTION OF THE DRAWINGS

The description herein makes reference to the accompanying figureswherein like reference numerals refer to like parts throughout theseveral views.

FIG. 1 illustrates a schematic view of an exemplary access controlsystem.

FIG. 2 illustrates a schematic of an exemplary access control device,credential device, and received signal strength indication (RSSI)system.

FIG. 3 illustrates a side perspective view of an exemplary accesscontrol device mounted against opposing sides of an entryway device andwhich has a pair of exemplary access switching devices.

FIG. 4 illustrates a side perspective view of the exemplary firstassembly of the access control device shown in FIG. 3, and includes anexemplary access switching device according to an embodiment of thepresent application.

FIG. 5 illustrates a front view of a portion of an alternative firstassembly of an exemplary access control device having an accessswitching device according to an embodiment of the present application.

FIG. 6 illustrates a schematic flow diagram of an exemplary process ofoperation of at least a portion of an access control system inconnection with activation of an access switching device so as toconfirm intent to gain access to, or through, a controlled opening.

FIG. 7 illustrates a schematic flow diagram of an exemplary process ofoperation of at least a portion of an access control system inconnection with activation of an access control device so as to gainaccess to, or through, a controlled opening.

FIG. 8 illustrates a schematic flow diagram of an exemplary process ofoperation of at least a portion of an access control system that istransitioning from an idle mode to an active mode of operation.

FIG. 9 illustrates a schematic flow diagram of a portion of an exemplaryprocess of operation of at least a portion of an access control systemhaving a credential device and an access control system and/or accesscontrol device that are paired and operating between a generally normaloperation mode and a security mode.

FIG. 10 illustrates a schematic flow diagram of an exemplary process ofoperation of at least a portion of an access control system during asecurity mode.

FIG. 11 illustrates a schematic flow diagram of an exemplary process ofoperation of at least a portion of an access control system followingpassage through a controlled opening and/or during an egress operation.

FIG. 12 illustrates an exemplary relationship between RSSI levelstrength as a function of distance between a credential device and anaccess control device.

The foregoing summary, as well as the following detailed description ofcertain embodiments of the present invention, will be better understoodwhen read in conjunction with the appended drawings. For the purpose ofillustrating the invention, there is shown in the drawings, certainembodiments. It should be understood, however, that the presentinvention is not limited to the arrangements and instrumentalities shownin the attached drawings.

DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS

Certain terminology is used in the foregoing description for convenienceand is not intended to be limiting. Words such as “upper,” “lower,”“top,” “bottom,” “first,” and “second” designate directions in thedrawings to which reference is made. This terminology includes the wordsspecifically noted above, derivatives thereof, and words of similarimport. Additionally, the words “a” and “one” are defined as includingone or more of the referenced item unless specifically noted. The phrase“at least one of” followed by a list of two or more items, such as “A, Bor C,” means any individual one of A, B or C, as well as any combinationthereof.

FIG. 1 illustrates a schematic view of an exemplary access controlsystem 100. As illustrated, the access control system 100 includes atleast one access control device 102, which in this example can includeone or more lockset devices 104, door closers 106, and/or reader devices108, and/or a combination thereof. However, the number and types ofaccess control devices 102 may vary for different access controlsystems. For example, according to certain embodiments, the accesscontrol system 100 can also include, in addition to or in lieu of otheraccess control devices 102, one or more exit devices and/or paymentterminals, among other access control devices 102. According toembodiments discussed below, the access control device 102 can comprisean electronic lock 110 having a reader device 108, the reader device 108being a part of, or electrically coupled to, the lockset device 104.However, according to other embodiments, the access control device 102can comprise an electronic lock 110 or other device that is inelectrical communication with the reader device 108 and/or receivesinformation directly or indirectly from the reader device 108.

At least some types of access control devices 102 may be involved withcontrolling, managing, and/or facilitating the displacement, includingauthorization to displace, an entryway device 112 from a closed positionto an open position, and/or from an open position to a closed position,and thereby at least assist in controlling ingress/egress through theassociated controlled opening or entryway. For example, according tocertain embodiments, at least one access control device 102 may be, orinclude, a lockset device 104, such as, but not limited to, anelectronic lock 110, that includes a lock mechanism 114. According tocertain embodiments, the lock mechanism can include, for, example, adisplaceable bolt and/or a latch, such as, for example, a deadbolt orlatch bolt, that is displaceable between locked and unlocked positionsto selectively lockingly engage the adjacent door frame, wall, and/ormating components that are coupled or mounted to/in the adjacententryway device. Similarly, according to other embodiments, the accesscontrol device(s) 102 can include an exit device having a push bar orpush pad that is coupled to a lock mechanism 114 that includes a latchassembly. According to such an embodiment, the operable displacement ofthe push bar or pad can facilitate the displacement of a latch of thelatch assembly from an extended, locked position to a retracted,unlocked position.

The door closer 116 can be configured to at least provide a force thatassists in the displacement of the entryway device 112. For example, thedoor closer 116 may provide a force that at least assists in thedisplacement of the entryway device 112 from the open position to theclosed position. Thus, certain door closers 106 may be structured toautomatically return an opened, or partially opened, entryway device 112to the closed position, and thereby remove the need for manual closingby a user. Conversely, according to certain embodiments, the door closer116 may be set to resist the displacement of the entryway device 112from at least one of the open and closed positions by a user. Accordingto certain embodiments, the door closer 116 can be part of the accesscontrol device 102 such that operation of the access control device 102can facilitate automatic opening or closing of the entryway device 112via automatic operation of the door closer 116. For example, accordingto certain embodiments, the access control device 102 can beelectrically coupled to a motor of the door closer 116, such that theaccess control device 102 can control the motor so as to facilitate theopening/closing of the entryway device 112.

The reader device 108 can for at least purposes of illustration and forat least certain embodiments, be part of the access control device 102,and may receive or detect credential and/or identification informationin connection with a determination of whether a change in status of thelock mechanism 114, such as, for example, the lock mechanism beingunlocked or locked, and/or displacement of the entryway device 112 toaccommodate ingress/egress through the controlled opening generally is,or is not, authorized. According to certain embodiments, the readerdevice 108 is a credential reader that retrieves or detects credentialinformation on or from a credential device 116. For example, certainreader devices 108 may include a credential reading interface structuredto read at least one type of credential, including, but not limited to,a prox and/or NFC (i.e., smart card). The identification informationprovided to, or retrieved by, the reader device 108 may be evaluated bythe reader device 108 or another device of the access control system 100and/or access control device 102 in connection with determining whetherthe credential and/or identification from the credential device 116 haspermission or authorization to operate components of the access controlsystem 100 and/or access control device 102, such as, for example, tounlock the lock mechanism 114 of the associated access control device102 and/or to displace the entryway device 112.

According to certain embodiments, the access control system 100 caninclude one or more servers 118 that can communicate with one or more ofthe access control devices 102 in a variety of different manners,including, for example, over a wide area network (WAN) (e.g., theInternet), a cellular data network, a local area network (LAN), or anycombination thereof. According to certain embodiments, the server 118may include, or comprise, a cloud-based server. However, a variety ofother different types of servers may also be used for the server 118and/or a web-based server, among other servers.

The server 118 and/or the access control device 102, including thereader device 108, can be configured to store a variety of differentinformation, including, for example, user lists, access logs, andinformation related to each credential device 116, such as, for example,access permissions for each credential device 116 corresponding to eachuser in the user lists, a location, status, and/or type identifiers foreach credential device 116, and/or any other information for the system100. The server 118 and/or the access control device 102, including thereader device 108, can further include non-transitory computerexecutable instructions to perform various operations in the form of anapplication. The various operations can include, but are not limited to,functionality relating to program one or more of the access controldevices 102, verifying access permissions received from the credentialdevices 116 at each reader device 108, determining a communicationprotocol or mode that is to be used to communicate information todevices of the access control system 100, issuing commands forestablishing direct or indirect connections between various devices ofthe system 100, and updating user lists, access permissions, andadding/removing access control devices 102 and their associated readerdevices 108 to/from the system 100, among other operations.

One or more types of devices can be employed as credential devices 116,including, but not limited to, mobile or portable electronic devices,including, but not limited to, personal electronic devices, smartphones,cellular phones, tablet computers, smart badges, smart bracelets,computing devices, passive or non-passive identification badges or tags,and electronic gaming devices, among other types of devices. Further,according to certain embodiments, the credential device 116 can have acredential or other identification information that can be used toestablish whether the credential device 116 is authorized to communicatewith the access control system 100, and/or to operate one or more accesscontrol devices 102, including authorization to gain access to/throughone or more controlled openings, among other permissions orauthorizations. Such credentials or identification can be providedand/or stored on the credential device 116 in a number of manners,including, for example, via use of memory and/or a software application,commonly referred to as an app, of the credential device 116, amongother manners of storage of the credential information.

The credential device 116 can be in communication with one or more ofthe access control devices 102 and their associated reader devices 108in a variety of different manners, including, for example, via awireless communication protocol such as WI-FI and/or Bluetooth LowEnergy (BLE). The access control device 102, including the associatedreader device 108, can send to the credential device 116 a variety ofdifferent types of information, such as, for example, deviceidentification information, diagnostic results, usage data, and thelike, among other types of information. Additionally, according tocertain embodiments, the credential device 116 may communicate withother devices of the system 100, including, for example, but not limitedto, the server 118. For example, the credential device 116 may send avariety of different types of information to the server 118, such as,for example, identification information relating to the owner of thecredential device 116, information identifying the access controldevice(s) 102 to which the credential device 116 is communicating, orattempting to communicate, with, firmware updates, information regardingactivation or deactivation of components or access control devices 102,and/or information retrieved from the access control device 102, amongother information.

According to certain embodiments, the access control system 100 may alsoinclude a host 120 that is used to control and/or manage the operationsof the access control system 100. The host 120 may include any type ofcomputing device, such as, for example, a laptop or desktop computer, ora mobile electronic device, among other computing devices, that includesa memory and a processor sufficient in size and operation to store andmanipulate a database and one or more applications for communicatingwith the other devices of the access control system 100. For example,according to certain uses, a company, facility, or entity may utilizethe host 120 to manage and oversee the operations of the access controlsystem 100, including, for example, establishing authorization ofcertain credentials and/or users, establishing times for access controldevices 102 to seek updates, setting parameters regarding time periodsduring which entryway devices 112 may be displaced from their respectiveclosed position, and/or monitoring and analyzing information pertainingto the usage of components of the access control system 100. The host120 may communicate with the access control system 100 in a variety ofmanners, including, but not limited to, through the use of a gateway122. Additionally, the gateway 122 can communicate with one or moreaccess control devices 102 using one or more wireless protocols,including, but not limited to, WI-FI, Bluetooth, including Bluetooth lowenergy (BLE). According to certain embodiments, the host 120 may beconfigured to select the manner in which, as well as when, one or moreapproaches at seeking confirmation of intent of a credential device 116,and/or of the associated user, as discussed below, is to implemented.Further, such approaches to confirming intent, may be stored on theaccess control device 102, and/or may retained in one or more otherlocations, including by the server(s) 118.

FIG. 2 illustrates a schematic of an exemplary access control device 102and credential device 116. As illustrated, the access control device 102can include a processing device 124, an input/output device 126,operating logic 128, and a memory 130 that may or may not be part of theprocessing device 124. According to certain embodiments, theinput/output device 126 allows the access control device 102, includingthe reader device 108, to communicate with one or more external devices,including, for example, the credential device 116, among other types ofdevices that allow data to be inputted and/or outputted to/from theaccess control device 102. According to other embodiments, theinput/output device 126 can be adapted to communicate with the readerdevice 108, among other devices. According to certain embodiments, inaddition to the credential device 116, the external device may include aserver 118 or host 120, and/or other access control devices 102 of theaccess control system 100. Additionally, according to certainembodiments, the external device may be integrated into the accesscontrol device 102. It is further contemplated that there may be morethan one external device in communication with the access control device102.

According to certain embodiments, the input/output device 126 includesone or more transceivers 132, network adapters, network cards,interfaces, and/or ports, such as, for example, a USB port, serial port,parallel port, an analog port, a digital port, VGA, DVI, HDMI, FireWire,or any other type of port or interface. Further, the input/output device126 may include hardware, software, and/or firmware. Additionally, it iscontemplated that the input/output device 126 can include more than oneof these adapters, cards, or ports. Additionally, according to certainembodiments, the input/output device 126 can also be structured tocommunicate with a server 118, such as, for example, a cloud server, viaan Internet Protocol (IP) connection over the Internet.

The processing device 124 of the access control device 102 can be aprogrammable type, a dedicated, hardwired state machine, or anycombination of these. The processing device 124 may further includemultiple processors, Arithmetic-Logic Units (ALUs), Central ProcessingUnits (CPUs), Digital Signal Processors (DSPs), or the like. Processingdevices 124 with multiple processing units may utilize distributed,pipelined, and/or parallel processing. The processing device 124 may bededicated to performance of just the operations described herein or maybe utilized in one or more additional applications. In the depictedform, processing device 124 is of a programmable variety that executesalgorithms and processes data in accordance with operating logic 128 asdefined by programming instructions (such as software or firmware)stored in memory 130. Alternatively, or additionally, the operatinglogic 128 for the processing device 124 is at least partially defined byhardwired logic or other hardware. The processing device 124 may includeone or more components of any type suitable to process the signalsreceived from input/output device 126 or elsewhere, and to providedesired output signals. Such components may include digital circuitry,analog circuitry, or a combination of both.

The memory 130 may be of one or more types, such as a solid-statevariety, electromagnetic variety, optical variety, or a combination ofthese forms. Further, the memory 130 can be volatile, nonvolatile, or acombination of these types, and some or all of the memory 130 can be ofa portable variety, such as a disk, tape, memory stick, cartridge, orthe like. In addition, the memory 130 can store data that is manipulatedby the operating logic 128 of the processing device 124, such as datarepresentative of signals received from and/or sent to the input/outputdevice 126 in addition to or in lieu of storing programming instructionsdefining the operating logic 128, just to name one example. As shown inFIG. 2, the memory 130 may be included with the processing device 124and/or coupled to the processing device 124.

FIGS. 3 and 4 illustrate an embodiment of an exemplary access controldevice 102 that can be utilized to at least assist in controllingaccess, such as, for example, ingress and/or egress, through acontrolled opening. In the illustrated embodiment, the access controldevice 102 includes at least an electronic lockset device 104 that canbe utilized to at least lock the entryway device 112 in at least aclosed position. Further, as previously discussed, according to certainembodiments, the access control device 102 can also include the readerdevice 108. According to the illustrated example, the electronic locksetdevice 104 may include first and second assemblies 134, 136 that aremounted on opposing sides of the entryway device 112. For example, thefirst assembly 134 may be mounted, or otherwise positioned adjacent to,a first, exterior side 138 of the entryway device 112, while the secondassembly 136 may be mounted to a second, interior side 140 of theentryway device 112.

According to the illustrated embodiment, the first assembly 134 caninclude a first lever 142, a first escutcheon plate 144, and a firstbacking plate 146. Similarly, the second assembly 136 can include asecond lever 148, a second escutcheon plate 150, and a second backingplate 152. According to the depicted certain embodiment, one or both ofthe first and second assemblies 134, 136 can include or be electricallycoupled to the reader device 108 (FIG. 2) that is structured to readand/or to communicate with at least one type of credential device 116.According to certain embodiments, the reader device 108, among othercomponents of the access control device 102, can be configured for oneor two-way wireless communication with the credential device 116, amongother possible communications with other components of the accesscontrol system 100. Further, according to certain embodiments, thereader device 108, as well as other electrical components of the accesscontrol device 102, can be housed in an inner region between the firstescutcheon plate 144 and a portion of the first backing plate 146,and/or an inner region between the second escutcheon plate 150 and aportion of the second backing plate 152. For example, according tocertain embodiments, the reader device 108 and/or other component of theinput/output device 126 can be positioned in an inner region within thefirst assembly 134, while other electrical components of the accesscontrol device, including, for example, the processing device 124, atimer 154, and/or an electrical power source, such as, for example, oneor more batteries, can be housed in an inner region of the secondassembly 136.

According to the illustrated embodiment, the electronic lockset device104 includes a lock mechanism 114, such as, for example, a lockmechanism 114 having a selectively displaceable deadbolt or latch bolt156 that can engage or extend into an adjacent wall, frame, or componentin a manner that may secure the entryway device 112 in a closed and/oropen position relative to the associated controlled opening. The lockmechanism 114 can also be operably coupled to the first lever 142 and/orthe second lever 148. Accordingly, at least in certain situations, therotation of the first and/or second levers 142, 148, can displace thedeadbolt or latch bolt 156 from an extended position to an at leastpartially retracted position such that the deadbolt or latch bolt 156does not prevent the entryway device 112 from being displaced, relativeto the controlled opening, from the closed position to an open position,and/or vice versa. Additionally, according to certain embodiments, thelock mechanism 114 may also include a lock cylinder 158 having a keyslot 160 that is accessible from at least one of the first and secondsides 138, 140 of the entryway device 112. The lock cylinder 158 mayhave a variety of different configurations, including, but not limitedto, a pin and tumbler, mortise, and tubular lock configuration, amongothers.

As shown in FIGS. 3 and 4, one, or both, of the first or secondassemblies 134, 136 also include a switching device 162 that can be usedin connection with controlling an automatic change in a status of theaccess control device 102, such as, for example, control the automaticunlocking of the access control device 102 such that the entryway device112 may be displaced to an open position. Moreover, as discussed below,the switching device 162 can be used to at least assist with controllingwhen, and for how long, the access control device 102 may, or may not,remain in a change status, such as, for example, when and how long apreviously locked access control device 102 can be unlocked. Moreover,according to certain embodiments, engagement of the switching device 162can, in at least certain situations, provide an acknowledgement of anintent to displace the entryway device 112 to the open position and/orto attain access to the corresponding controlled opening. Further,according to certain embodiments, activation of the switching device 162can, in at least certain embodiments, prompt a request for confirmationof intent to displace the entryway device 112 to the open positionand/or to pass through the corresponding controlled opening.

According to certain embodiments, the switching device 162 may be abutton, switch, touch screen, or other device that may be engaged orinterfaced with/by a user. For example, according to certainembodiments, the switching device 162 can be a mechanical device that isdisplaceable by engagement with a digit or other portion of the user,such as, for example being slid, depressed, pulled, or otherwisedisplaced from an un-activated position and an activated position.Further, according to certain embodiments in which the switching device162 is a mechanical device, the switching device 162 may be biased tothe un-activated position, such as, for example, by a spring.Alternatively, according to other embodiments, the switching device canbe an optical or electrical device, such as, for example, a resistive orcapacitive touch screen or surface, and/or utilize capacitive sensing orproximity technology, among other switches or devices. For example asdiscussed below, according to certain embodiments, the switching device162 can be an area, or areas, of the access control device 102 that canbe touched, including, for example, touched in a certain, pre-setpattern, so as to confirm an intent to gain access to the correspondingcontrolled opening. According to certain embodiments, activation of theswitching device 162 can result in an electric signal being provided, ornot being provided, to the processing device 124 that indicates that auser has engaged the activated, or otherwise operably engaged, theswitching device 162.

While FIG. 3 illustrates both the first and second assemblies 134, 136as having a switching device 162, according to certain embodiments, theswitching device 162 can be positioned on only one of the first andsecond assemblies 134, 136. In such situations, which of the first andsecond assemblies 134, 136 may have the switching device 162 can dependon a variety of factors, including, for example, whether the accesscontrol device 102 is being utilized to control ingress or egress froman area. Moreover, for example, according to certain embodiments, thefirst, exterior assembly 134 of the electronic lock 110 may beaccessible from an exterior region or space, and the second, interiorassembly 136 may be accessible from an interior region or space. Thus,according to a least certain embodiments in which the access controldevice 102 is controlling the passage from the exterior region to theinterior region, the switching device 162 may be positioned about atleast the first, exterior assembly 134. Further, according to suchembodiments, the second, interior assembly 136 may, or may not, have aswitching device 162. Conversely, according to a least certainembodiments in which the access control device 102 is controllingpassage from the interior region to the exterior region, the switchingdevice 162 may be positioned about at least the second, interiorassembly 136. Further, according such embodiments, the first, exteriorassembly 134 may, or may not, have a switching device 162.

FIG. 5 illustrates a front view of a portion of an alternative exemplaryfirst assembly 134′ having an access switching device 162 according toan embodiment of the present application. According to the depictedembodiment, automatic operation of the access control device 102′ can beindependent of the rotational displacement of the lever 142′ and/ordisplacement of latch bolt 156′, if any, associated with the lever 142′.More specifically, the access control device 102′ can include anelectronic lock that includes a lock cylinder 158′, such as, forexample, a pin and tumbler, mortise, and tubular lock configuration,among others that is not coupled to the lever 142′ and which is used tocontrol the operation of a deadbolt that may extend into, and retractedfrom, an adjacent frame or wall. According to certain embodiments,automatic displacement of the deadbolt can be attained in a variety ofmanners, including, for example, through the application of an electricsignal, including, but not limited to, an electric signal used tocontrol the operation of a motor or solenoid 115, among other devices,of the access control device 102′. Further, according to certainembodiments, the lock cylinder 158′ can include a keyway that isconfigured to receive the insertion of a key that can be used torotatably displace at least a portion of the lock cylinder 158′ so as tofacilitate the manual retraction or extension of the deadbolt. As shownabove, the alternative embodiment of the access control device 102′ caninclude a switching device 162.

As shown in at least FIG. 5, according to certain embodiments, theswitching device 162 can include a face portion 164 that can provide avisual indication of the status of at least the access control device102′, such as, for example, whether the access control device 102′ is ina “locked” or “unlocked” status. Such statuses can correspond to theposition of the latch bolt 156 and/or the deadbolt, such as, forexample, whether the deadbolt is in an extended, locked position, or aretracted unlocked position. The status of the access control device102′ can be displayed in a variety of different manners. For example,according to certain embodiments, the face portion 164 of the switchingdevice 162 may comprise a plurality of faces, or the face portion 164may extend such that, when the position and/or orientation of the faceportion 164 is adjusted, a different face, or different portion of theface portion 164, having an indication of a different status of theaccess control device 102′ is viewable to a user of the access controldevice 102. Alternatively, the access control device 102 may employanother type of visual indicator to indicate the status of the accesscontrol device 102, such as, for example, using a digital or electronicdisplay(s) or light(s) on, or adjacent to, the switching device 162and/or the access control device 102. Additionally, according to certainembodiments, the access control device 102 can also utilize an audiblesound to indicate the status, or a change in status, of the accesscontrol device 102′.

FIGS. 6-11 illustrate schematic flow diagrams of exemplary processes, orportions of processes, relating to the operation of at least a portionof an access control system 100 in connection with activation of aaccess control device 102 so as to gain access to, or through, acontrolled opening. The operations illustrated for all of the processesin the present application are understood to be examples only, andoperations may be combined or divided, and added or removed, as well asre-ordered in whole or in part, unless explicitly stated to thecontrary.

Referencing FIG. 6, according to certain embodiments, at step 602, thecredential device 116 is moved into a distance or range so as to be incommunication with the access control system 100 and/or the accesscontrol device 102. As discussed above, according to certainembodiments, the credential device 116 can be a mobile or portableelectronic device that can act either as one or both of an identifierand a credential. Further, the credential device 116 and access controlsystem 100 can be configured such that at least the credential device116 and other components of the access control system 100 can engage intwo-way communication with each other. Further, the location of thecredential device 116 when the credential device 116 is withincommunication range of the access control device 102 can vary, such as,for example, vary for different types of wireless communicationprotocols and/or different types and positions of components of theaccess control system 100. For example, according to certainembodiments, the access control system 100 may include one or moreantennas that may be configured and positioned to expand the range overwhich credential device 116 can communicate with the access controlsystem 100 and/or the access control device 102. Additionally, accordingto certain embodiments, whether the credential device 116 is withinrange may be based on the distance between the credential device 116 andthe access control device 102 or some other component(s) of the accesscontrol system 100. According to certain embodiments, the access controldevice 102 can include a transceiver 132 (FIG. 2) that is configured tocommunicate with the credential device 116 when the credential device116 is in relatively close proximity to the access control device 102,such as, for example, within 10 feet or less of the credential device116, among other larger or smaller distances.

At step 604, with the credential device 116 within range, the credentialdevice 116 can communicate an intent to pass through the controlledopening and/or to operate the access control device 102 or othercomponent of the access control system 100 that may be controllingpassage through, or access to, the controlled opening. For example,according to certain embodiments, the credential device 116 maycommunicate credential information relating to authorization orpermission to operate the access control device 102 and/or to open theentryway device 112 from a closed position to an open position. Suchcommunication can include transmission from the credential device 116 ofencrypted or non-encrypted identification, authorization, and/orcredential information to the access control system 100, including, forexample, to the access control device 102.

At step 606, the access control system 100 and/or the access controldevice 102 may evaluate information communicated from the credentialdevice 116 to determine whether the credential device 116 hasauthorization to pass through the controlled opening and/or to changethe status of the access control device 102 and/or displace the entrywaydevice 112. For example, according to certain embodiments, the accesscontrol device 102, host 120, and/or other component of the accesscontrol system 100 can determine whether, based on the credential(s) oridentification(s) provided by the credential device 116, if thecredential device 116 is on an approved user or credential list and/orwhether the information provided by the credential device 116 is validor authentic. Such a determination may also include additionaltransmissions and/or receipt of encrypted or non-encrypted informationto/from the credential device 116. If at step 608 the access controlsystem 100 determines that the credential device 116 is not authorized,or has not provided information to properly indicate the authorizationof the credential device 116, then the access control system 100 willnot grant authorization to pass through the controlled opening and/orcan deny attempts to unlock the access control device 102. According tocertain embodiments, in such a situation, the access control device 102may re-enter an idle mode at step 610.

If, however, the access control system 100 and/or the access controldevice 102 determines that the credential device 116 has authorizationto change the status of the access control device 102 and/or to passthrough the controlled opening, then, at step 612, the access controlsystem 100 and/or the access control device 102 can initiate, orotherwise denote the time of, a timer 154. For example, following adetermination that the credential device 116 is authorized to at leastinitiate a change in status of the access control device 102, such as,for example, an automatic unlocking of a locked access control device102, the timer 154 and the switching device 162 can be used inconnection with confirming an intent to change the status of the accesscontrol device 102. Moreover, according to certain embodiments, the usermay be given a time period in which to activate or otherwise engage theswitching device 162 before authorization to change the status of theaccess control device 102 and/or to pass through the controlled openingis disabled and/or revoked.

Accordingly, following the initiation of the timer 154 at step 616, theaccess control system 100 and/or the access control device 102 willdetermine whether the switching device 162 has been activated. If theaccess control system 100 and/or the access control device 102determines that the switching device 162 has been activated within apredetermined time period, or before a timeout, as monitored orevaluated through use of the timer 154 at step 614, then at step 618 thestatus of the access control system 100 and/or the access control device102 can be changed, such as, for example, the access control device 102automatically displacing the deadbolt or latch bolt 156 from theextended, locked position, to the retracted, unlocked position. Theperiod of time to activate the switching device 162 can vary, such as,for example, lasting under 5 seconds or under 10 seconds, among othertimes. Further, according to certain embodiments, the duration of timecan be programmed by the owner of the access control system 100, suchas, for example, via use of the host 120. Additionally, according tocertain embodiments, at step 620, the status indicator of the switchingdevice 162 and/or of the access control device 102 may indicate thechange in status of the access control device 102, such as, for example,changing from the term “locked” to “unlocked”, change a status lightcolor, and/or transmit an audible signal. A user of the credentialdevice 116 may then be able to manipulate the lockset device 104, suchas, for example, rotate the lever 142, 142′, such that the user maydisplace the entryway device 112 from the closed position to the openposition.

Following detection of activation of the switching device 162 and/orafter a change in status of the access control device 102, thecredential or identification of the credential device 116, and/or thecredential device 116 itself, that was used in connection with beinggranted authorization to change the status of the access control device102 is at least temporarily de-authorized or disabled from having theability to be used to enable the automatic unlocking feature of theaccess control device 102. According to certain embodiments, theduration of time during which the credential or identification of thecredential device 116, and/or the credential device 116, is disabled orde-authorized from using the automatic unlock feature can be based on anumber of factors. For example, according to certain embodiments, atstep 622, the credential or identification of the credential device 116,and/or the credential device 116, may be prevented from seekingpermission to change a status of the access control device 102 for apredetermined time period, as may be monitored through the use of thetimer 154, as indicated by step 624. As discussed below, according tocertain embodiments, the subsequent inability to automatically enable achange in the status of the access control device 102 may be based onone or other conditions, such as, for example, the credential device 116moving outside of, and/or staying within, a certain range or distancefrom the access control device 102 within a certain time period, and/orthe time period that had lapsed since the automatic unlock feature wasenabled, among other conditions.

Additionally, according to certain embodiments, before expiration of thepredetermined time period or timeout relating to the disabling orde-authorization of the credential or identification of the credentialdevice 116, and/or the credential device 116, can be overridden by aforced interrupt. The forced interrupt can be achieved in a variety ofmanners. For example, according to certain embodiments, the forceinterrupt can be driven by a user of the credential device 116. Forexample, according to certain embodiments, the user of the credentialdevice 116 may enter a passcode or personal identification number (PIN)or press a hot button or icon of/on the credential device 116, amongother manners of manually initiating the force interrupt. Such apasscode, PIN, or hot button can be utilized via software or otherprogramming or application (“app”) stored on the credential device 116,such as, for example, through the use of software or other applications.Alternatively, the ability to use such a passcode, PIN, or hot buttonmay be communicated or retrieved to/by the credential device 116.

According to other embodiments, the force interrupt can be initiated orrequested by the access control system 100. For example, according tocertain embodiments, the user of the credential device 116 maysubsequently again activate the switching device 162. If the initialpredetermined time period for activating the switching device 162 thathad already been activated has not expired before the switching device162 was again activated, the access control device 102 may seekconfirmation from the user of the credential device 116 that the user isagain trying to re-gain access to the controlled opening via use of theaccess control device 102. For example, the access control system 100and/or the access control device 102 can communicate a message orquestion to the credential device 116 seeking confirmation that the useragain seeks access to the controlled opening. According to such anembodiment, the access control system 100 can seek to prevent passagethrough the controlled opening until the access control system 100receives a reply communication from the credential device 116 indicatinga confirmation of intent to regain access to the controlled opening.Thus, in the event the user communicates, through use of the credentialdevice 116, that the user does not intend to regain access to thecontrolled opening, or ignores the request from the access controlsystem 100 and/or the access control device 102, the access controlsystem 100 and/or the access control device 102 may seek to preventaccess through the controlled opening and/or not change the status ofthe access control device 102, such as, for example, not unlock a lockedaccess control device 102. Additionally, according to certainembodiments, such a request for confirmation to the user of thecredential device 116 may also not be communicated unless, in additionto the subsequent activation of the switching device 162, the credentialdevice 116 also communicated a request or intent to pass through thecontrolled opening.

Again, referencing FIG. 6, upon timeout, at step 626, the credentialdevice 116 may be re-authorized to enable the automatic unlock featureof the access control device 102. Further, as discussed below, accordingto certain embodiments, the timer 154 may also be used to enable asubsequent automatic re-lock feature, which can occur at a predeterminedtime after the access control device 102 had been automatically unlockedat step 618. Such an automatic re-lock feature can include the return ofthe deadbolt or latch bolt 156 to the extended, locked position.Further, at step 628, in connection with the automatic re-lock, thestatus indicator may again change, at step 626, to indicate a change instatus of the access control device 102, which, in this example, can beassociated with the access control device 102 returning to the lockedstatus.

While the above example discusses an intent confirmation event used toat least assist in establishing intent to pass through the controlledopening, namely activation of the switching device 162, occurring aftercredential information or other authorization information to enable theautomatic unlock feature has been communicated from the credentialdevice 116 to the access control device 102, as discussed belowaccording to other embodiments such credential information may not becommunicated from the credential device 116 until after completion of anintent confirmation event.

FIG. 7 illustrates an alternative process for operation of an accesscontrol device 102. According to the illustrated embodiment, inconnection with a period of relative inactivity, at step 702 the accesscontrol device 102 can be in an idle mode, such as, for example, astandby or energy saving mode. When an authorized credential device 116is within range of the access control device 102, at step 704 thecredential device 116 can be paired to the access control device 102, orother components of the access control system 100, in a variety ofmanners. For example, referencing FIG. 8, the access control device 102can be removed and/or awaken from the idle mode as the credential device116 approaches access control device 102 at step 802. As the credentialdevice 116 at least approaches the access control device 102 at step804, the credential device 116 may transmit communication signals usingone or more wireless communication protocols, such as, for example,communicate via Bluetooth low energy protocol. Such signals may, whenthe credential device 116 is within range of the access control device102, be of sufficient strength to be detected by, and accommodatepairing with, the access control device 102. Further, according tocertain embodiments, such signals from the credential device 116 can bein response to advertising signals that can be transmitted from theaccess control device 102.

At step 806, the access control device 102 and/or other components ofthe access control system 100 can inquire as to whether, and/or confirmthat, signals have been detected or received from the credential device116. If no signals have been detected or received, the access controlsystem 100 and/or the access control device 102 may remain in, or returnto, the idle mode. However, if at step 806 the access control system 100and/or the access control device 102 have detected signals from thecredential device 116, and moreover in this example, have detected acredential(s) or other identification information from the credentialdevice 116, then at step 808 a pair credential may be used to establishauthorization of the credential device 116 and access control system 100and/or access control device 102 to communicate. Further, according tothe illustrated embodiment, if authorized, the credential device 116 andthe access control system 100 and/or the access control device 102 canthen enter a pair mode at step 810 wherein the credential device 116 andthe access control system 100 and/or the access control device 102 canengage in certain authorized communications.

At step 812, the access control system 100 and/or the access controldevice 102 may evaluate the received signal strength indication (RSS orRSSI) from the credential device 116. For example, according to certainembodiments, the access credential device 116 can include an internalRSSI system 166 that can measure the power presented in a receivedwireless communication(s) or signal(s) from the credential device 116.Alternatively, according to certain embodiments, the RSSI system 166 canbe an external system that is in communication with one or morecomponents of the access control system 100 and/or the access controldevice 102. According to the illustrated embodiment, the RSSI system 166is shown as including a processor 168 and a transceiver 170. However,according to certain embodiments in which the RSSI system 166 is aninternal component or system of a device of the access control system100, such as, for example, an internal component or system of the accesscontrol device 102, the RSSI system 166 can use the processing device124 and/or the transceiver 132 of the access control device 102.

If the RSS level does not satisfy a threshold level, then, at step 814,the credential device 116 and the access control device 102 can remainin the paired mode. At step 816 the access control system 100 and/or theaccess control device 102 can then determine whether a signal(s) fromthe credential device 116 is still being detected. If the signal(s)is/are not still being detected, the access control system 100 and/oraccess control device 102 can return to the idle mode. If, however, asignal(s) from the credential device 116 is/are still being detected,then the access control system 100 and/or access control device 102 maycontinue to evaluate whether the signal(s) being received meets the RSSthreshold level. If the signal(s) from the credential device does meetthe RSS threshold level, then at step 818 the access control system 100and/or access control device 102 can enter an active mode, which is alsoidentified as step 706 in FIG. 7.

Referencing FIG. 9, when in the paired mode, and upon satisfaction ofthe RSS threshold, the access control system 100 and/or access controldevice 102 can, at step 706, 818 be in the active mode. According tocertain embodiments, when in the active mode, at step 902, the timer 154can be initiated. Further, according to certain embodiments, at step 902the access control device 102 can also be in a touch open mode in whichthe status of the access control device 102 can be changed by activationof the switching device 162. For example, according to certainembodiments, the access control device 102 can be prepared to have achange status, such as, for example, being changed from being in alocked status wherein the latch bolt 156 or deadbolt is in an extended,locked position, to an unlocked status, wherein the latch bolt 156 ordeadbolt is in a retracted, unlocked position so that a closed entrywaydevice 112 can be displaced from the closed position to the openposition. At step 904, the access control system 100 and/or the accesscontrol device 102 can determine if the switching device 162 has beenactivated before the predetermined time has expired, which can beevaluated using at least the timer 154. If the switching device 162 hasbeen activated before occurrence of the timeout, then, at step 906, thestatus of the access control device 102 can be automatically change,such as, for example, the access control device 102 changing for beinglocked to being unlocked. However, if the timeout occurs beforeactivation of the switching device 162, then, at step 908, the accesscontrol system 100 and/or the access control device 102 can enter into asecurity mode, as discussed below.

Following the change in status of the access control device 102, theaccess control system 100 and/or the access control device 102 candetermine if the status of the access control device 102 wassubsequently changed. For example, according to certain embodiments,following a change in status at step 910, such as, for example, theaccess control device 102 being unlocked, the access control system 100and/or the access control device 102 can determine at step 910 whetherthe status of the access control device 102 was subsequently changed.Such a subsequent change can include, for example, the access controldevice 102 being returned to the locked status, such as, for example, bymanual re-locking of the access control device 102. Such manualre-locking can include, for example, the insertion of a key into the keyslot 160 and subsequent rotation of the key and lock cylinder 158, orvia manually entering information or engaging an icon that is shown orotherwise available via the input/output device 126 of the accesscontrol device 102, such as, for example, via a keypad. If the status ofthe access control device 102 was manually changed, then the accesscontrol system 100 and/or the access control device 102 can enter intothe security mode at step 908. If, however, the status of the accesscontrol device 102 was not manually changed, then at step 912, thestatus of the access control device 102 can be automatically changed.For example, at step 912 the access control device 102 can receive aninstruction from another component of the access control system 100 orcan be programmed to automatically change to a lock status, such as, forexample, via operation of a motor or solenoid 115 of the access controldevice 102 that displaces the latch bolt 156 or deadbolt to theextended, locked position.

Following the change of status of the access control device 102 at step912, such as, for example, following the automatic re-locking of thecredential device 116, the access control system 100 and/or the accesscontrol device 102 can, at step 914, determine whether the credentialdevice 116 is still within range of the access control system 100 and/orthe access control device 102. For example, according to certainembodiments, the access control system 100 and/or the access controldevice 102 can determine whether the access control system 100 and/orthe access control device 102 is still receiving signals or othercommunications from the credential device 116. If the credential device116 is determined to no longer be in range, the access control system100 and/or the access control device 102 can return to the idle mode atstep 916. If, however, the credential device 116 is determined to be inrange, the access control system 100 and/or the access control device102 can enter the security mode at step 908.

FIG. 10 illustrates an exemplary process following the entry into thesecurity mode at step 908. As shown, according to certain embodiments,the access control system 100 and/or the access control device 102 canagain, at step 1002, determine whether the signal(s), if any, beingreceived from the credential device 116 satisfies an RSS thresholdlevel. If the RSS threshold level is not met, then at step 1004, theaccess control system 100 and/or the access control device 102 may notdo anything further in response to signals that are, if any, beingreceived from the credential device 116. If, however, the RSS thresholdlevel is met, then, at step 1006, the access control system 100 and/orthe access control device 102 can prompt the user for confirmation ofintent to re-enter the controlled passageway and/or to again change thestatus of the access control device 102. As discussed above, accordingto certain embodiments, such confirmation can include prompting the userto reply, via the credential device 116, to a confirmation notificationor request that the access control system 100 and/or the access controldevice 102 sent to the credential device 116. Further, at step 1008, theaccess control system 100 and/or the access control device 102 canevaluate a set time period during which the user is to confirm intent toagain pass through, or gain access to, the controlled opening and/or toagain change the status of the access control device 102. Again,according to certain embodiments, such a time period may be evaluatedusing the timer 154. If the credential device 116 provides a response tothe notification or request for confirmation of intent before a timeoutoccurs, then, at step 1010, the status of the access control device 102can again automatically change, such as, for example, by the accesscredential device 102 being changed from a locked status to an unlockedstatus. At steps 1012, 1014, 1016, and 1018, the access control system100 and/or access control device 102 may then proceed with checkingwhether the status of the access control device 102 was subsequentlymanually changed, such as, for example, manually re-locked, and if notmanually changed, automatically change the status of the access controldevice, such as, for example, automatically locking the access controldevice before checking if the credential is still in range beforere-entering the security or idle modes in manners similar to thosediscussed above with respect to steps 910, 912, 914, 916.

FIG. 11 illustrates an exemplary process for operation of an accesscontrol device 102 following a manual change in the status of the accesscontrol device 102. For example, at step 1102, the lockset device 104may be unlocked from an interior side of the lockset device 104, suchas, for example, by inserting a key into a key slot 160 in the second,interior assembly 136 of the lockset device 104, via operation of athumb turn on an interior side of the lockset device 104, or via manualoperation of the credential device 116, among other manners of manuallyunlocking the lockset device. According to such an embodiment, followingthe manual change in the status of the access control device 102 and/ordetection of such a change by the access control system 100 and/or theaccess control device 102, at step 1104, the access control system 100and/or the access control device 102 can inhibit or otherwise ignore atleast certain communications from/with the credential device 116,including, for example, communications relating to credentialinteraction. Such inhibiting of credential interaction can also beassociated with starting the timer 154.

According to such an embodiment, the user may then engage or otherwiseactivate the switching device 162 in association with an intent tochange the status of the access control device 102. Accordingly, at step1106, the access control system 100 and/or the access control device 102can determine whether such engagement or activation of the switchingdevice 162 occurred before a timeout occurred, as determined at least inpart by using information from the timer 154. If the switching device162 was activated before the timeout, then in response, the accesscontrol system 100 and/or the access control device 102 can change theaccess control device 102 from the unlocked status to a locked status.Again, according to certain embodiments, when in the locked status, alatch bolt 156 and/or deadbolt of the access control device 102 can bein the extended, locked position. Further, at step 1108, the accesscontrol system 100 and/or access control device 102 can start a newtimed event. According to certain embodiments, the timed event may set atime that the credential device 116 may be unable to change the statusof the access control device 102, and/or be unable to automaticallychange the status of the access control device 102. Upon a relatedtimeout, at step 1110 the access control system 100 and/or the accesscontrol device 102 can return to the idle mode. Conversely, if theswitching device 162 is determined at step 1112 to have not beenactivated, upon a timeout, the access control system 100 and/or theaccess control device 102 can automatically change the status of theaccess control device 102. Such automatic change in status of the accesscontrol device 102 before the access control system 100 and/or theaccess control device 102 returns to the idle mode at step 1110.

Another aspect of the present application is the use of strength orspeed of the signal provided from the credential device 116 to determinethe relative proximity of the credential device 116 to the accesscontrol device 102. Such information can at least assist the accesscontrol system 100 and/or the access control device 102 in determiningwhether to change the status of the access control device 102, such as,for example, whether to adjust an access control device 102 from beingin one of a locked status or an unlocked status, to the other of thelocked status and the unlocked status. More specifically, such anembodiment can determine based, at least in part, on a relative RSSlevel, whether there is intent to operate the access control device 102and/or to access the controlled opening.

According to certain embodiments, the RSS level may be evaluated usingthe RSSI system 166, as discussed above and as shown, for example, inFIG. 2. Further, as previously discussed, the RSSI system 166 can be acomponent or system of a device of the access control system 100, suchas, for example, of the access control device 102, and/or can be aseparate, external system. Further, the RSSI system 166 can beconfigured to evaluate or determine the strength of a wirelesscommunication(s) or signal(s) from at least the credential device 116for one or more wireless protocols and with respect to one or moreaccess control devices 102. For example, according to certainembodiments, the transceiver 170 of the RSSI system 166 is a Low EnergyBluetooth (BLE) transceiver that is adapted to at least receive BLEsignals from the credential device 116, among other wirelesscommunication protocols.

FIG. 12 illustrates an exemplary relationship between RSS level as afunction of distance between a credential device 116 and an accesscontrol device 102. While FIG. 12 illustrates, for at least purposes ofdiscussion, such a relationship as being linear, the particular natureof the relationship, and moreover whether such a relationship is, or isnot, linear or non-linear, can be based on a variety of factors,including, but not limited to, the type of wireless communicationprotocol and degree of interference, among other factors. As shown inFIG. 12, the vertical axis depicts the strength of the RSS level, andincreases from a relatively very weak RSS level to a relatively verystrong RSS level. The horizontal axis provides an indication of thedistance between the credential device 116 and the access control device102, and decreases from a location near the vertical axis where the RSSlevel is relatively very weak and the distance between the credentialdevice 116 and the access control device 102 is relatively large, to thesituation in which the credential device 116 and the access controldevice 102 are moved to be in closer proximity to each other.

Referencing FIG. 12, when the credential device 116 is at a relativelyfar distance from the access control device 102, or other associatedcomponents of the access control system 100, such as, for example, anantenna, the RSS level may be at a relatively low level such that thedistance between the credential device 116 and the access control device102 can be considered at an out-of-range, idle level. During such RSSlevels, the access control device 102 can be in the idle mode. Further,to the extent the access control device 102 communicates advertising orother communications providing an indication of the presence of theaccess control device 102 while the credential device 116 and the accesscontrol device 102 are separated by a distance that is at theout-of-range, idle level, the access control device 102 may not receive,or may receive relatively weak, response signals from the credentialdevice 116. Moreover, when at the out-of-range, idle level,communications from the credential device 116 can vary from having arelatively weak RSS level to being non-existent. According to certainembodiments, when at the out-of-range, idle level, the access controldevice 102 may communicate advertising signals at relatively largeintervals, such as, for example, at 4 second intervals. Further, again,such advertising may, or may not, elicit a response from the credentialdevice 116 and/or may result in a reply from the credential device 116that has a relatively low or weak RSS level.

As indicated in FIG. 12, as the distance between the credential device116 and the access control device 102 decreases, the RSS level canincrease to a point where the RSSI system 166, and/or the firmwareembedded therein, can classify the distance between the credentialdevice 116 and the access control device 102 as being at a first activelevel, which, for at least purposes of discussion, can also be referredto as in-range active-1 level. As the distance between the credentialdevice 116 and access control device 102 continues to decrease, the RSSlevel can continue to increase from the relatively low RSS level that isassociated with being just outside the out-of-range, idle level.According to at least certain systems, the RSS level can increaseproportionally to a decrease in the distance between the credentialdevice 116 and the access control device 102.

According to certain embodiments, when the distance between thecredential device 116 and access control device 102 is at least in thefirst active level, the credential device 116 can respond to theadvertising of the access control device 102. Such an initial response,and/or subsequent responses from the credential device 116, as well ascontinued communications from the access control device 102, can includecommunications that provide credential or identification informationthat can be used to establish the authority or permission of thecredential device 116 to operate the access control device 102, such asfor example, unlock an electronic lock 110, and/or gain access to thecontrolled opening. For example, according to certain embodiments, asthe distance between the credential device 116 and the access controldevice 102 changes to attain the in-range active-1 level, the credentialdevice 116 and the access control device 102 may exchange communicationsthat are used to pair the access control device 102 and the credentialdevice 116. According to certain embodiments, such communications caninvolve an exchange of a personal identification number (PIN) orpersonal credential, which may be at least initially manually enteredinto the credential device 116 and subsequently automaticallycommunicated to the access control device 102. However, as discussedbelow, according to other embodiments, such exchanges of credentialinformation may not occur until after the successful completion of anintent confirmation event.

Additionally, upon the access control system 100 and/or access controldevice 102 determining that the distance between the access controldevice 102 and the credential device 116 is within the in-range active-1level, the connection interval between the credential device 116 and theaccess control device 102 can become more frequent than the interval forthe previously discussed advertising that occurs when at theout-of-range, idle level. For example, according to certain embodiments,the initial response by the credential device 116 to the advertising ofthe access control device 102 can be evaluated to determine theassociated RSS level of the initial response. Upon determining that theRSS level corresponds to the in-range active-1 level, the access controldevice 102 can increase the frequency of the advertising from the accesscontrol device 102, such as, for example, communicate advertising at onesecond intervals.

The access control device 102 can then continue to monitor the RSS levelof subsequent responses from the credential device 116. Moreover, theaccess control device 102 can be configured to expect, after receipt ofthe initial response from the credential device 116, a continuingincrease in RSS levels for at least some of the subsequent responses tothe advertising of the access control device 102, which can indicate acontinuing decrease in the distance between the credential device 116and the access control device 102. Further, according to certainembodiments, an absence of an increase in the RSS level and/or asubsequent decrease in RSS level can result in the access control device102 changing the frequency with which the access control device 102communicates advertising to the credential device 116. Moreover,according to certain embodiments, upon detecting a lack of an increasein the RSS level, the access control device 102 may monitor whether theRSS level does, or does not, increase within a certain time period.According to such embodiments, the absence of an increase in the RSSlevel before a timeout of that certain time period can result in theaccess control device 102 reducing the advertising interval, such as,for example, changing the advertising from being transmitted at a onesecond interval to a two second interval.

Additionally, in response to the lack of an increase in RSS level, theaccess control device 102 can also set a time period for which theaccess control device 102 will re-enter the idle mode if a subsequentincrease in the RSS level is not detected. For example, according tocertain embodiments, if after a time period of around 10 minutes, amongother time periods, the RSS level does not increase, the access controldevice 102 can determine that the credential device 116 is not seeking,or cannot seek, a change in lock status. In response to such asituation, upon timeout of the time period, the access control device102 can re-enter the idle mode.

If, however, the RSS level continues to increase, the RSS level canreach a threshold RSS level that provides an indication that thecredential device is in relatively very close range to the accesscontrol device 102. For example, according to certain embodiments, thethreshold RSS level can be set to indicate that the credential device116 and the access control device 102 are separated by a distance ofabout, and/or less than, ten feet, and, at least according to certainembodiments, indicates that the distance is less than six feet. Further,according to certain embodiments, the threshold RSS level can be set toindicate that the credential device 116 is generally about an arm'slength away from the access control device 102.

According to the illustrated embodiment, when the threshold RSS level ismet or exceeded, the RSSI system 166, and/or the firmware embeddedtherein, can classify the distance between the credential device 116 andthe access control device 102 as being at a second active level, which,for at least purposes of discussion, can also be referred to as in-rangeactive-2 level. Additionally, according to certain embodiments, once theRSSI system 166 determines that the in-range active-2 level has beenattained, and the access control device 102 can be authorized toautomatically change the status of the access control device 102. Forexample, according to certain embodiments, once the in-range active-2 isattained, the embedded firmware of the RSSI system 166 and/or the accesscontrol device 102 can enable an automatic unlocking of the accesscontrol device 102, such, as, for example, the latch bolt 156 ordeadbolt of the access control device 102 being displaced from theextended, locked position to the retracted, unlocked position. Moreover,such an automatic unlock may allow the user of the credential device todisplace the entryway device 112 the closed position to the openposition so as to enable authorized passage through the controlledopening. Alternatively, according to other embodiments, once the RSSIsystem 166 determines that the in-range active-2 level has beenattained, the credential device 116 may be prompted to communicatecredential information that may be used to verify the authenticityand/or authority of the credential device 116. In such a situation, uponverification of the communicated credential information, and in theabsence of any other intent confirmation events that may need to beproperly completed, the automatic unlocking of the access control device102 can be enabled.

According to certain embodiments, the automatic unlock of the accesscontrol device 102 can be enabled for a certain time period. A varietyof different time limits can be used for the time duration of theenablement of the automatic unlocking of the credential device 116,including, for example, a duration of around 10 seconds, among othertime limits. Thus, the user of the credential device 116 may have alimited period of time to operate the access control device 102, orother components of the access control system 100, so as to gain passagethrough the controlled opening.

In the event the predetermined time period following the automaticunlocking of the credential device 116 expires without operation of theaccess control device 102 or other component of the access controlsystem 100 that allows displacement of the entryway device 112 and/orpassage through the controlled opening, the automatic unlock feature ofthe access control device 102 can be disabled and/or the status of theaccess control system 100 can change. For example, upon timeout orexpiration of the prescribed time period, the embedded firmware of theaccess control device 102 can automatically change the status of theaccess control device 102, such as, for example, re-lock the accesscontrol device 102. Such automatic re-locking of the access controldevice 102 can be achieved in a variety of different manners, including,for example, by the access control device 102 activating an electricmotor or solenoid 115 of the access control device 102 so that the latchbolt 156 or deadbolt is displaced from the retracted, unlocked positionto the extended, locked position.

Further, although certain events can result in the automatic unlockfeature of the access control device 102 being disabled and the accesscontrol device 102 re-entering the idle mode, the status of the accesscontrol device 102 can still be changed, such as, for example, from alocked status to an unlocked status, by manual operation of the accesscontrol device 102. Such manual changes can be performed in a variety ofmanners, including, for example, via operable manipulation of a key inthe key slot 160, entering of information into the input/output device126 of the access control device 102, and/or user operation of thecredential device 116, such as, for example, via a hot button and/orentering a PIN or passcode, among other manual operations.

Additionally, according to certain embodiments, upon the access controldevice re-entering the idle mode, despite the distance between theaccess control device 102 and the credential device falling in thein-range active-1 level and/or the in-range active-2 level, thecredential device 116 can be unable to subsequently be used to enablethe automatic unlock of the access control device 102 until certainother intent confirmation events are satisfied. For example, accordingto certain embodiments, re-enabling the automatic unlock feature mayinvolve, at least in part, the credential device 116 being moved to theout-of-range, idle level or moved to the out-of-range, idle level for acertain period of time, such as, for example, four minutes, among othertime limits. In such a situation, as the credential device 116 isreturned to the locations that separate the credential device 116 fromthe access control device 102 by distances that fall within theabove-identified in-range active-1 and/or in-range active-2 levels, thecredential device 116 and the access control device 102 can againundergo the above-discussed processes for enabling the automatic unlockof the access control device 102.

According to certain embodiments, when the automatic unlocking of theaccess credential device 116 was used so that the credential devicepassed through the associated controlled opening, the credential device116 may still be within the in-range active-1 and/or in-range active-2level relative to the access control device 102, albeit on an oppositeside of the controlled opening. According to certain embodiments, insuch situations, the access control system 100 and/or the access controldevice 102 may monitor whether the credential device 116 stays withinthe in-range active-1 and/or in-range active-2 level relative to theaccess control device 102 for a period of time. For example, the accesscontrol device 102 may evaluate for a period of time, such as, forexample, ten minutes, whether the RSS level indicates that thecredential device 116 has, or has not, remained within the in-rangeactive-1 level and/or in-range active-2 level relative to the accesscontrol device 102. If the RSS levels indicate that during the timeperiod the credential device 116 has not left the in-range active-1level and/or the in-range active-2 level, then during that time period,the automatic unlock of the access control device 102 can remainenabled. However, according to such an embodiment, upon determinationthat an RSS level is outside of the RSS level for the in-range active-1and/or in-range active-2 levels, the automatic unlock feature may bedisabled. Further, such disablement of the automatic unlock feature canalso be accompanied by the automatic locking of the access controldevice 102. However, in such situations, the status of the accesscontrol device 102 can still be manually changed, such as, for manuallylocked or unlocked, as previously discussed.

In addition to changing the status of the access control device 102,such as, for example, enabling the automatic unlocking of the accesscontrol device 102, the evaluation of RSS levels may also be used inconnection with having authorization to change programming of the accesscontrol device 102. For example, according to certain embodiments, atleast certain credential devices 116 may not be authorized to programthe access control device 102 unless the RSS level, as determined by theaccess control device 102 or other component of the access controlsystem 100, falls within a certain level. For example, according tocertain embodiments, a credential device 116 may not be grantedauthorization to program a credential device 116 unless the credentialdevice 116 is both paired to the access control device 102 as well as beseparated from the access control device 102 by a distance that iswithin the in-range active-1 level and/or in-range active-2 level.

While the above examples are discussed in terms of RSS levels, thedistance, if any, between the access control device 102 and thecredential device 116 can be determined in a variety of other manners.For example, according to certain embodiments, in addition to, or inlieu of, evaluating RSS levels, the distance between the access controldevice 102 and the credential device 116 can be determined using a speedof light test. Further, according to other embodiments, the accesscontrol system 100 and/or access control device 102 may includedirectional antennas or signal direction modifiers that can assist indetermining the location of the credential device 116 that may be usedin connection with attempting to gain access to the controlled opening,and more specifically, can determine whether the credential device 116is within a certain proximity to the access control device 102 to enablethe automatic unlocking of the access control device 102.

Additionally, while the automatic unlocking of the access control device102 is discussed above in connection with RSS levels and an authorizedcredential device 116, such automatic unlocking can be associated withother intent confirmation events, in addition to, or in lieu of RSSlevels, that can at least confirm an intent to pass through a controlledopening. Further, as previously mentioned, such other intentconfirmation events can, according to certain embodiments, be performedafter the credential device 116 has communicated credential informationto the access control device 102 and/or the access control system 100that has been used to authenticate the credential device 116. Accordingto other embodiments, the credential device 116 may not communicatecredential information, and/or the access control device 102 may notauthenticate the credential device 116, until such intent confirmationevents have been satisfied.

For example, according to certain embodiments, as the distanceseparating the credential device 116 and access control device 102 isreduced such that the access control device 102 and the credentialdevice 116 are within the in-range active-1 and/or in-range active-2levels away from each other, an application (“app”) can appear, if notalready appearing, on the credential device 116, such as, for example,on a screen of a smartphone. The application, which can be initiated bythe credential device 116 and/or the access control device 102, canrequest or provide a notification that the user of the credential device116 is to touch or activate one or more icons on the screen or displayof the credential device 116, and/or buttons positioned on thecredential device 116. According to certain embodiments, the credentialdevice 116 may not communicate credential information from thecredential device 116 to the access control device 102 until the user ofthe credential device 116 complies with the request or notification.Alternatively, the access control device 102 may not enable theautomatic unlock feature of the access control device 102 until afterthe user of the credential device 116 has complied with the request ornotification. Such notifications or requests can take a variety of otherforms that require the user and/or the credential device 116 to performdifferent actions or tasks before automatic unlocking of the accesscontrol device 102 can be enabled. For example, according to certainembodiments, the request or notification can be a question for the userof the credential device 116 to answer or prompts the input certainidentification information, such as, for example, by pressing one ormore icons, buttons, and/or switches on the credential device 116 and/orby speaking into a microphone of the credential device 116.

Alternatively, according to other embodiments, the request ornotification can seek to obtain biometric verification, such as, forexample, have the user of the credential device 116 be positioned for acamera or scanner to take an image in connection with facialrecognition, present a digit, such as a finger, for scanning andsubsequent verification, and/or have the user say certain words,phrases, or sounds in connection with voice verification. Notificationof intent could also be linked to a wearable device, and could beresponded to via an interaction with a device other than the credentialdevice 116, such as, for example, via a watch, among other wearabledevices.

According to other embodiments, the status of the access control device102 may not change until after activation of the switching device 162that is in the form of one or more touch sensitive areas on the accesscontrol device 102. Such embodiments may include having the user of thecredential device 116 to touching a plurality of touch sensitive areason the access control device 102, and/or touch such touch sensitiveareas in a particular pattern or sequence.

Other intent confirmation events can include certain physicaldisplacement(s) or movement(s) of the credential device 116. Forexample, according to certain embodiments, as the credential device 116approaches the access control device 102, the credential device 116 andthe access control device 102 can communicate with each other toestablish or verify the authorization of the credential device 116 tooperate the access control device 102 and/or to pass through theassociated controlled opening. The intent to enter through a controlledopening can be further confirmed by generating a particular electricalor visual signal that corresponds to moving the credential device 116 ata particular time and/or in a particular manner, pattern, and/orspeed(s). Moreover, a user may shake, wave, or otherwise move thecredential device 116 in a particular direction(s), make a certainnumber of a movements with the credential device, and/or move thecredential device at a certain speed(s). According to certainembodiments, such movements may be tracked using an accelerometer 172and/or other motion-detecting devices that may be used to generate fromsuch movements an electronic signal that can be communicated to theaccess control device 102. Alternatively, such movements may be trackedby a camera or other image capturing device that may translate suchmovement into electrical signals.

The access control device 102 may then verify the information of thecommunicated electronic signal to determine whether the associatedcommunicated movement information satisfies recorded information forthat credential device 116. For example, the credential device 116 maybe moved in a manner that simulates three knocks on a door. Suchmovement may be used to generate a corresponding electronic signal, suchas, for example, via use of the accelerometer 172 and/or othermotion-detecting devices. The credential device 116 may then verify theauthenticity of the movement using other information stored on thecredential device 116. Such evaluation may be a prerequisite todetermining whether to communicate at least certain credentialinformation to the access control device 102 and/or to enable anautomatic change in status of the access control device. According tocertain embodiments, if the credential device 116 does not, or cannot,verify the authentication of the movement(s), the credential device 116may not communicate information to the access control device 102 thatcould otherwise lead to the enablement of the automatic lock feature ofthe credential device. Alternatively, according to other embodiments,authentication of the electronic signal generated in response tomovement of the credential device 116 may be performed by the accesscontrol device 102 or the component of the access control system 100,and use information that can be stored at a variety of locations of theaccess control system 100, including stored by the access control device102.

According to certain embodiments, rather than, or in addition to, usingcertain movements of the credential device 116, the intent to operatethe access control device 102 and/or pass through the associatedcontrolled opening can be confirmed by evaluating one or more particularmovements of the user of the credential device 116. For example,according to certain embodiments, the credential device 116 can includean accelerometer 172 and/or other motion-detecting devices that can beused to determine certain movements of the user, including for example,relatively quick surges and withdrawals toward/away from the accesscontrol device 102 and/or patterns of movements. Additionally, accordingto certain embodiments, such movements or patterns of movement can beevaluated using one or more video cameras, which can capture one or moreimages that are translated to electronic signals that are compared withreference electronic signals in connection with verifying intent toenter a controlled opening and/or operate an access control device 102.

Conversely, rather than utilizing particular movement or patterns ofmovement of the credential device 116 and/or the user of the credentialdevice 116, lack of motion for a certain time period may also beutilized to confirm an intent to gain access to a controlled openingand/or to operate the access control device 102. For example, accordingto certain embodiments, the credential device 116 can be configured tosense a general stoppage in motion for a predetermined time, such as,for example, for a period of one to two seconds, among other timeperiods, before the credential device 116 will communicate credentialinformation to the access control device 102. Such an embodiment couldat least assist in preventing the unintentional unlocking of the accesscontrol devices 102 that could otherwise occur when the credentialdevice 116 merely is passing the access control devices 102. Accordingto certain embodiments, upon completion of the time period of generalstoppage of motion, the credential device 116 can communicate credentialinformation that can facilitate the automatic unlocking of the accesscontrol device 102 and/or the status of the access control device 102can automatically change. However, like other embodiments of the presentapplication, such features can be combined with one or moreprerequisites to at least assist in confirming an intent to enter acontrolled opening and/or to operate the access control device 102.

Additionally, the above-identified intent confirmation events may, ormay not, be associated with a time limit, which, can, according tocertain embodiments, be evaluated using the timer 154. Further, aspreviously discussed, the failure to satisfactorily complete the intentconfirmation event before a timeout of the can result in the denial ofan attempt to change the status of the access control device 102 and/orto gain access to the associated controlled opening. Further, accordingto certain embodiments, the failure to satisfactorily complete theintent confirmation event before a timeout can result in the accesscontrol device 102 re-entering the idle mode.

The intent to enter through a controlled passageway when the credentialdevice 116 is within range of one or more access control devices 102 canbe also communicated in a number of other manners. For example,according to certain embodiments, triangulation can be employed betweenmultiple access control devices 102. According to certain embodiments,multiple access control devices 102, including, but not limited to twoor more and/or various combinations of electronic locks, crash bars,reader devices, and beacons, among other devices, can utilize BLEcommunications, and thus may each include or be in electricalcommunication with an associated BLE antenna. According to such anembodiment, the access control devices 102, which may each have anestablished, generally static location, may use triangulation todetermine the location of the credential device 116. Such an approachmay allow a particular access control device 102 from the plurality ofaccess control devices 102 to be determined, or be selected, forcommunicating an advertising or other credential to the credentialdevice 116 if and when that credential device 116 comes into range ofthat particular access control device 102, which can also be determinedvia the use of triangulation. Additionally, if the credential device 116is determined to be authorized to operate the access control device 102and/or has permission to attain access to the associated controlledopening, triangulation can also be used to determine when the credentialdevice 116 is in close enough proximity to the access credential device116 such that the access control device 102 can enable the automaticunlock feature. Moreover, according to certain embodiments, intent toenter through the associated controlled opening can be confirmed throughthe proximity of the credential device 116 to the access control device102. According to other embodiments, as discussed above, enablement ofthe automatic unlock feature may be predicated on the satisfaction of atleast one other intent confirmation event, such as, for example,activation of the switching device 162, among other intent confirmationevents.

Additionally, according to certain embodiments, as each of a pluralityof such access control devices 102 can have, or be assigned, a generallystatic location, triangulation can be utilized by the credential device116 to determine which of the plurality of access control devices 102the credential device 116 is approaching. Moreover, such triangulationcan be used to determine which, if any, of the plurality of accesscontrol devices 102 is to be associated with an intent, if any, to beoperated by use of the credential device 116 so as to accommodate accessto the associated controlled opening. According to certain embodiments,the credential device 116 can use such information to determine which,if any, of the plurality of access control devices 102 the credentialdevice 116 is to communicate with and/or to which advertising thecredential device 116 may provide a reply or response. Thus, such anapproach may also limit which of the access control devices 102 thecredential device 116 may communicate intent to operate and/or intent togain access to the associated controlled opening.

While the above example is discussed in terms of using triangulation andBLE signals, the location of the credential device 116, including thelocation of the credential device 116 relative to one or more of accesscontrol devices 102, can be determined in a variety of other manners.For example, according to certain embodiments, such relative positionsof the credential device 116 and one or more of the access controldevices 102 can be determined using a global positioning system (GPS),WIFI, and/or BLE Radio on the access control devices 102 and/or otherBLE-enabled devices.

While the foregoing has discussed a variety of approached of confirmingintent to pass through a controlled opening and/or operate theassociated access control device 102, a number of the approaches may beused in combination with other approaches to provide furtherverification of intent. Additionally, according to certain embodiments,the access control system 100 and/or the access control device 102 maybe configured to select one or more of these approaches to utilize atcertain times, and which other approaches to implement at other times.Thus, the approach for verifying the intent can be relatively dynamic,as the selected approach(es) utilized in connection with verifying anintent in one instance may be different than the approach(es) utilizedin verifying another intent in another instance. Additionally, accordingto certain embodiments, the various available approaches can beorganized, either individually and/or in various combinations, in aselectable table that provides an administrator of the access controlsystem 100 and/or of the access control device 102 which approaches areto be, or are not to be, utilized before a credential device 116communicates credential information and/or before the automatic unlockfeature of the access control device 102 is activated. Additionally,such tables may be stored on the host 120 and/or accessible to the host120 from the server 118.

While the invention has been described in connection with what ispresently considered to be the most practical and preferred embodiment,it is to be understood that the invention is not to be limited to thedisclosed embodiment(s), but on the contrary, is intended to covervarious modifications and equivalent arrangements included within thespirit and scope of the appended claims, which scope is to be accordedthe broadest interpretation so as to encompass all such modificationsand equivalent structures as permitted under the law.

Furthermore it should be understood that while the use of the wordpreferable, preferably, or preferred in the description above indicatesthat feature so described may be more desirable, it nonetheless may notbe necessary and any embodiment lacking the same may be contemplated aswithin the scope of the invention, that scope being defined by theclaims that follow. In reading the claims it is intended that when wordssuch as “a,” “an,” “at least one” and “at least a portion” are used,there is no intention to limit the claim to only one item unlessspecifically stated to the contrary in the claim. Further, when thelanguage “at least a portion” and/or “a portion” is used the item mayinclude a portion and/or the entire item unless specifically stated tothe contrary.

1-32. (canceled)
 33. A method, comprising: receiving, by an accesscontrol device, credential information from a credential device;evaluating, by the access control device, the credential information todetermine whether the credential device has authorization to passthrough a controlled opening secured by the access control device;detecting, by the access control device, that a switching device of theaccess control device has been physically activated; and automaticallyunlocking a lock mechanism of the access control device in response to(i) determining that the credential device has authorization to passthrough the controlled opening and (ii) detecting that the switchingdevice has been physically activated.
 34. The method of claim 33,further comprising automatically locking the lock mechanism in responseto (i) automatically unlocking the lock mechanism and (ii) detectingthat the switching device has been further physically activated.
 35. Themethod of claim 33, wherein detecting that the switching device of theaccess control device has been physically activated comprises capacitivesensing that the switching device has been physically activated.
 36. Themethod of claim 33, further comprising determining, by the accesscontrol device, at least one of a distance or a direction of thecredential device relative to the access control device based on one ormore signals transmitted between the credential device and the accesscontrol device; and wherein evaluating the credential informationcomprises evaluating the credential information to determine whether thecredential device has authorization to pass through the controlledopening secured by the access control device based on the at least oneof the distance or the direction of the credential device relative tothe access control device.
 37. The method of claim 36, whereindetermining the at least one of the distance or the direction of thecredential device relative to the access control device comprisesdetermining the at least one of the distance or the direction of thecredential device relative to the access control device based on atleast one of a strength or a speed of the one or more signalstransmitted between the credential device and the access control device.38. A method, comprising: receiving, by an access control device,credential information from a credential device; evaluating, by theaccess control device, the credential information to determine whetherthe credential device has authorization to pass through a controlledopening secured by the access control device; detecting, by the accesscontrol device, that a switching device of the access control device hasbeen physically activated; and enabling a first automatic change of alock mechanism of the access control device in response to (i)determining that the credential device has authorization to pass throughthe controlled opening and (ii) detecting that the switching device hasbeen physically activated.
 39. The method of claim 38, wherein enablingthe first automatic change of the lock mechanism comprises enabling thefirst automatic change of the lock mechanism in response to (i)determining that the credential device has authorization to pass throughthe controlled opening and (ii) detecting that the switching device hasbeen physically activated within a predetermined time period subsequentto authorization of the credential device.
 40. The method of claim 38,wherein enabling the first automatic change of the lock mechanismcomprises enabling an automatic unlock of the lock mechanism.
 41. Themethod of claim 40, wherein enabling the automatic unlock of the lockmechanism comprises automatically unlocking the lock mechanism.
 42. Themethod of claim 40, further comprising enabling a second automaticchange of the lock mechanism in response to (i) enabling the firstautomatic change of the lock the mechanism and (ii) detecting that theswitching device has been further physically activated.
 43. The methodof claim 42, wherein enabling the second automatic change of the lockmechanism comprises enabling an automatic lock of the lock mechanism.44. The method of claim 38, wherein detecting that the switching deviceof the access control device has been physically activated comprisescapacitive sensing that the switching device has been physicallyactivated.
 45. The method of claim 38, further comprising determining,by the access control device, at least one of a distance or a directionof the credential device relative to the access control device based onone or more signals transmitted between the credential device and theaccess control device; and wherein evaluating the credential informationcomprises evaluating the credential information to determine whether thecredential device has authorization to pass through the controlledopening secured by the access control device based on the at least oneof the distance or the direction of the credential device relative tothe access control device.
 46. The method of claim 45, whereindetermining the at least one of the distance or the direction of thecredential device relative to the access control device comprisesdetermining the at least one of the distance or the direction of thecredential device relative to the access control device based on atleast one of a strength or a speed of the one or more signalstransmitted between the credential device and the access control device.47. The method of claim 46, wherein determining the at least one of thedistance or the direction of the credential device relative to theaccess control device comprises determining the at least one of thedistance or the direction of the credential device relative to theaccess control device based on a speed of light.
 48. The method of claim38, wherein evaluating the credential information comprises transmittingthe credential information to a host device.
 49. An access controlsystem, comprising: a switching device; a lock mechanism; a processor;and a memory comprising a plurality of instructions stored thereon that,in response to execution by the processor, causes the access controlsystem to: receive credential information from a credential device;evaluate the credential information to determine whether the credentialdevice has authorization to pass through a controlled opening secured bythe lock mechanism; detect that the switching device has been physicallyactivated; and automatically unlock the lock mechanism in response to adetermination that the credential device has authorization to passthrough the controlled opening and the switching device has beenphysically activated.
 50. The access control system of claim 49, whereinthe switching device comprises at least one of a capacitive or resistivetouch screen; and wherein to detect that the switching device has beenphysically activated comprises to detect interaction of a user with theat least one of the capacitive or resistive touch screen.
 51. The accesscontrol system of claim 49, wherein the plurality of instructionsfurther causes the access control system to automatically lock the lockmechanism in response to the automatic unlock of the lock mechanism andfurther activation of the switching device.
 52. The access controlsystem of claim 49, further comprising an access control device thatincludes the switching device, the lock mechanism, the processor, andthe memory.