Access management system

ABSTRACT

Disclosed are an apparatus and a method for remotely managing access to an area. An access management platform, which can be an electronic lock that is installed on e.g., a door of a house, can enable a user to establish a virtual presence at the door. In one example, a delivery person activates a doorbell button/icon of the access management platform, which sends a message to a smartphone of the owner of the platform. The owner, who is at work, uses his smartphone to initiate a video stream using a camera of the platform, and a two way audio stream. The owner sees and initiates a discussion with the delivery person. The owner uses his smartphone to unlock the door, and asks the delivery person to open the door and deliver the package inside. The owner uses his smartphone to capture his signature to acknowledge the delivery.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.14/736,126, filed Jun. 10, 2015, which is a non-provisional applicationfiled under 37 C.F.R. § 1.53(b), claiming priority under U.S.C. Section119(e) to U.S. Provisional Patent Application Ser. No. 62/150,192 filedApr. 20, 2015 both of which are incorporated by reference herein intheir entireties. This application is also a continuation-in-part ofU.S. patent application Ser. No. 14/736,072, filed Jun. 10, 2015, whichis a non-provisional application filed under 37 C.F.R. § 1.53(b),claiming priority under U.S.C. Section 119(e) to U.S. Provisional PatentApplication Ser. No. 62/096,434 filed Dec. 23, 2014.

BACKGROUND

Delivery services deliver packages, merchandise, groceries, etc. tohomes and businesses. When making a delivery that requires a signature,a driver of the delivery service may knock on a door or ring a doorbellof a home/business/etc. When a recipient is at the home or business, therecipient can answer the door, accept delivery of the package, and signfor the package delivery. When no person is at the home or business, thedelivery driver often will not make the delivery. Instead, the packagema be delivered on another day, the person to whom the package isaddressed may need to go to the delivery service to pick up the package,the package may be returned to the shipper, etc. In some cases, items ofa delivery that does not require a signature can be left outside a homeor business. In such cases, there is a risk that someone may steal thedelivered items.

SUMMARY

This application discloses technology related to an access managementsystem that enables a person to remotely manage his door from anywherein the world with access to the Internet. The disclosed technologyincludes a hardware platform, such as a remote door management platform,that enables the person to have a virtual presence at his door. In someembodiments, a remote door management platform replaces a door lock of adoor and includes a camera, microphone, speaker, motorized lock, keypad,wireless communication system, battery power supply, and a processor.Such as remote door management platform can enable a person, such as arecipient, to interact with, for example, a delivery person, and enablethe delivery person to deliver the delivery items inside the home orbusiness, even when the recipient is not present at the home orbusiness.

In one example, a delivery person walks up to a door equipped with adoor management platform. In this example, the door previously had adoor handle that included as deadbolt locking mechanism, and the doorhandle was replaced by the door management platform, which also includesa deadbolt locking mechanism in this example. The delivery personpresses a doorbell button on the door management platform (also referredto herein as the “platform”) to notify a recipient that the deliveryperson is at the door. Optionally, the delivery person can have a mobiledevice that communicates with the platform to identify the deliveryperson and the tracking number for the package. Additionally, thedelivery person can also enter a key code that uniquely identifies thedelivery service. The platform has Internet access, such as via a Wi-Finetwork of the home or business, via a cellular network, etc., and canrelay the received information to a mobile device of the recipient, suchas to the recipient's smartphone.

In response to the press of the doorbell button, the platform emits achime sound from the platform and sends a notification to therecipient's smartphone. The notification can include identifyinginformation for the delivery person, such as identifying informationthat was received from the mobile device of the delivery person or froma computer of an employer of the delivery person, a live photograph ofthe delivery person that is taken by the platform, etc. Even though therecipient is not home, using his smartphone, he acknowledges thenotification and chooses to bring up a video feed from a camera of theplatform. The recipient recognizes that there is a delivery person atthe door and uses his smartphone to initiate a two way real-time audioconnection with the platform, which outputs the audio via a speaker ofthe platform. The recipient greets the delivery person and is told thatthere is as package that needs to be signed for. The recipient uses anapplication on his smartphone to sign for the package and sends hiselectronically captured signature to a computer system of the deliveryservice or to the delivery person's mobile device.

The recipient remotely unlocks the door by use of his smartphone, whichsends a message to the platform instructing the platform to unlock, thedeadbolt of the door management system, which accordingly unlocked thedoor. The recipient, also using his smartphone, asks the delivery personto leave the package just inside the entryway of the home. The deliveryperson opens the door and drops off the package inside the home andcloses the door. The video feed continues to run, and the camera of theplatform is able to send video of the delivery person as he opens thedoor and delivers the package. The recipient sees that the package wasdelivered and remotely locks the door.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more embodiments are illustrated by way of example in the figuresof the accompanying drawings, in which like references indicate similarelements.

FIGS. 1A and 1B are each an illustration of an environment in which anelectronic lock is used to restrict access to a door, consistent withvarious embodiments.

FIG. 2 is a system diagram illustrating a platform that includes ab-lock, a biometric data device, and a mobile device, consistent withvarious embodiments.

FIG. 3 is a block diagram illustrating an embodiment of an electroniclock that includes a personal data device, consistent with variousembodiments.

FIG. 4A is a flow diagram illustrating an example process to establishan owner or administrator of an electronic lock, consistent with variousembodiments.

FIG. 4B is a flow diagram illustrating an example process to add anadministrator or an authorized user of an electronic lock, consistentwith various embodiments.

FIG. 5 is a system diagram illustrating a platform that includes ab-lock, a biometric data device, a mobile device, and a server,consistent with various embodiments.

FIG. 6 is a block diagram illustrating an embodiment of an electroniclock that communicates with a server, consistent with variousembodiments.

FIG. 7A is a flow diagram illustrating an example process, that involvesa server, to establish an owner or administrator of an electronic lock,consistent with various embodiments.

FIG. 7B is a flow diagram illustrating an example process, that includesa server, to add an administrator or an authorized user of an electroniclock, consistent with various embodiments.

FIGS. 8A and 8B are activity diagrams each illustrating a differentexample process for managing access to a physical property with accesscontrolled by an electronic lock, consistent with various embodiments.

FIG. 9 is an illustration of a user interface for a resource managementplatform for managing access to shared resources, consistent withvarious embodiments.

FIGS. 10A and 10B are activity diagrams illustrating an example processfor managing and enabling access to a virtual resource, consistent withvarious embodiments.

FIG. 11 is an exploded view illustrating the relationship of variouscomponents of an electronic lock, consistent with various embodiments.

FIG. 12 is an illustration of a front view of an electronic lock with arotating cover with the cover positioned to expose a keyhole, consistentwith various embodiments.

FIG. 13 is an illustration of a front view of an electronic lock with arotating cover with the cover positioned to expose a fingerprintscanner, consistent with various embodiments.

FIG. 14 is an illustration of a front view of an electronic lock with arotating cover, consistent with various embodiments.

FIG. 15 is an illustration of an angled view of an electronic lock thatshows both exterior facing and interior lacing portions of the b-lock,consistent with various embodiments.

FIG. 16 is an illustration of an angled view of an electronic lock thatshows a rotating base and a battery pod that has been removed,consistent with various embodiments.

FIG. 17 is a second illustration of an angled view of an electronic lockthat shows a rotating base and a battery pod that has been removed,consistent with various embodiments.

FIG. 18 is an illustration of an angled view of an electronic lock thatincludes a battery pod mounted on a rotating base, consistent withvarious embodiments.

FIG. 19 is a cut-away view of a battery pod, consistent with variousembodiments.

FIG. 20 is a high-level block diagram showing internal electronics of anelectronic lock, consistent with various embodiments.

FIG. 21 is an illustration of an outside face of a door managementplatform that includes a keypad and a doorbell, consistent with variousembodiments.

FIGS. 22A-C are flow diagrams illustrating examples of processes tomanage access to an area protected by a door management platform,consistent with various embodiments.

FIG. 23 is a now diagram illustrating example processes where anelectronic lock takes security-related actions based on security-relatedsensor data, consistent with various embodiments.

FIG. 24 is a block diagram illustrating an example of a processingsystem in which at least some operations described herein can beimplemented, consistent with various embodiments.

DETAILED DESCRIPTION

FIG. 1A is an illustration of an environment in which an electronic lockis used to restrict access to a door, consistent with variousembodiments. The electronic lock of the embodiment of FIG. 1A is ab-lock. While the following discussion involves a b-lock, much of thediscussion is applicable to other types of electronic locks, such as apassword lock or a voice recognition lock, among others. B-lock 101Aincludes key hole 103A, biometric authentication device 105A, anddeadbolt 106A. B-lock 101A is being used to lock door 107A, which is adoor of a building, in order to restrict access to the building. In theembodiment of FIG. 1A, biometric data device 105A is a fingerprintscanner. A biometric data device is a device that can obtain biometricdata of an individual that can be used to verify the identity of theindividual.

Returning to FIG. 1A b-lock 101A in the embodiment of FIG. 1A canvalidate a first time user in two ways. Other embodiments of a b-lockcan validate a first time user in various other ways. The first methodvalidates an administrator based on a security key obtained with apurchase of a b-lock. When user 104 purchased b-lock 101A, the packagingfor b-lock 101A included a security key, which is a string ofcharacters, such as alphanumeric characters or other symbols. User 104installs a b-lock application on mobile device 102A, which is an Androidsmart phone in this example, and enters the security key into the b-lockapplication. User 104 then uses mobile device 102A to wirelessly send asignal to b-lock 101A that includes the security key. Upon receipt andvalidation of the security key, b-lock 101A allows user 104 to scan hisfinger using biometric data device 105A, and to register his fingerprintdata so that user 104 can be verified to be an administrator of b-lock101A. Examples of mobile devices include smart phones, tablets, portablemedia devices, wearable devices, laptops, and other portable computers.

The second method validates an administrator based on a physical key.When user 104 purchased b-lock 101A, the packaging for b-lock 101Aincluded a physical key, which fits in key hole 103A and unlocks b-lock101A. When user 104A inserts the physical key into key hold 103A andopens b-lock 101A, b-lock 101A allows user 104 to scan his finger usingbiometric data device 105A, and to register his fingerprint data as thefingerprint data of an administrator of b-lock 101A. In someembodiments, when user 104 installs a b-lock application on mobiledevice 102A, the b-lock application includes a security key that can beused to establish that user 104 is an administrator of b-lock 101A.

After the fingerprint data of user 104 is registered by b-lock 101A,user 104 no longer needs mobile device 102A, or any other mobile device,to open b-lock 101A. To open b-lock 101A, user 104 simply scans hisfinger using biometric, data device 105A. B-lock 101A determines thathis fingerprint data matches the registered fingerprint data of anadministrator of b-lock 101A, and opens deadbolt 106A to allow user 104to open door 107A and enter the building.

FIG. 1B is an illustration of an environment in which an electroniclock, such as b-lock 101B, is used to restrict access to a door,consistent with various embodiments. While the following discussioninvolves a b-lock, much of the discussion is applicable to other typesof electronic locks, such as a password lock or a voice recognitionlock, among others. The embodiment of FIG. 1B illustrates b-lock 101B,which includes key hole 103B and deadbolt 106B. B-lock 101B is beingused to lock door 107B, which is a door of a building, in order torestrict access to the building.

Similar to b-lock 101A, b-lock 101B can validate a first time user intwo ways. The first method validates an administrator based on asecurity key obtained during a purchase of a b-lock. Similar to theprocess described above for b-lock 101A, user 104 installs a b-lockapplication on mobile device 102B, which is an iPhone smart phone inthis example, and enters a security key that was obtained when theb-lock was purchased into the b-lock application. User 104 then usesmobile device 102B to wirelessly send a signal to b-lock that includesthe security key. Upon receipt and validation of the security key,b-lock allows user 104 to scan his finger using a fingerprint scanner ofmobile device 102B. The b-lock application wirelessly sends thefingerprint data to b-lock 101B, and b-lock 101B registers thefingerprint data so that user 104 can be verified to be an administratorof b-lock 101B.

The second method validates an administrator based on a physical key.When user 104 purchased b-lock 101B, the packaging for b-lock 101Bincluded a physical key, which fits in key hole 103B and unlocks b-lock101B. When user 104 inserts the physical key into key hole 103B andopens b-lock 101B, b-lock 101B allows user 104 to scan his finger usinga fingerprint scanner of or coupled to mobile device 102B. The b-lockapplication wirelessly sends the fingerprint data to b-lock 101B, andb-lock 101B registers the fingerprint data so that user 104 can beverified to be an administrator of b-lock 101B.

In some embodiments, b-lock 101B does not include a biometric datadevice. In these embodiments, a mobile device, such as mobile device102B, can be used to capture biometric data, such as fingerprint data,and to send the biometric data to b-lock 101B, where b-lock 101Bvalidates the fingerprint data and unlocks deadbolt 106B upon validationof the fingerprint data. In other embodiments, such as the b-lockembodiment of FIGS. 12, 13, and 14, the external facing face plate ofb-lock 101B rotates. When in a first position, as is illustrated in FIG.1B, key hole 103B can be accessed by user 104. When in a second position(not shown), such as when rotated 180 degrees relative to the positionof FIG. 1B, the opening of the face plate enables a biometric datadevice to be accessible. In some of these embodiments, a biometric datadevice of b-lock 101B can be used to obtain biometric data of user 104,such as fingerprint data of user 104. B-lock 101B can validate thefingerprint data and unlock deadbolt 106B upon validation of thefingerprint data.

FIG. 2 is a system diagram illustrating a platform that includes ab-lock, a biometric data device, and a mobile device, consistent withvarious embodiments. B-lock 201 can be, b-lock 101A of FIG. 1A, b-lock101B of FIG. 1B, b-lock 301 of FIG. 3, b-lock 601 of FIG. 6, b-lock 1100of FIG. 11, b-lock 2001 of FIG. 20, door management platform 2100 ofFIG. 21, etc. Mobile device 202 can be, e.g., mobile device 102A of FIG.1A, mobile device 102B of FIG. 1B, a mobile device executing mobile/webapplication 602A or 602B of FIG. 6, etc. Biometric data device 203 canbe, e.g., biometric data device 105A of FIG. 1A, a biometric data deviceof or coupled to mobile device 102B, such as a fingerprint scanner of orcoupled to mobile device 102B, biometric data device 307 of FIG. 3,biometric data device 607A, 607B, or 607C of FIG. 6, fingerprint scanner1305 of FIG. 13, etc.

FIG. 3 is a block diagram illustrating an embodiment of an electroniclock that includes a personal data device, consistent with variousembodiments. In some embodiments, the electronic lock is a b-lock, andthe personal data device is a biometric scanner, with which a user caninput personal data, such as biometric data of a biometricallyidentifiable part of his body. In other embodiments, the electronic lockis a password lock, and the personal data device is a keypad, touchpad,microphone, etc., with which a user can input personal data, such as apassword or pass phrase. In yet other embodiments, the electronic lockis a voice recognition lock, and the personal data device is amicrophone into which a user can provide personal data, such as a sampleof his voice. In some embodiments, personal data is identifyinginformation that can be used to establish an identity of an individual.While the following discussion involves a b-lock, much of the discussionis applicable to other types of electronic, locks, such as a passwordlock or a voice recognition lock, among others.

B-lock 301 of the embodiment of FIG. 3 can be, for example, b-lock 101Aof FIG. 1A, b-lock 101B of FIG. 1B, b-lock 601 of FIG. 6, b-lock 1100 ofFIG. 11, b-lock 2001 of FIG. 20, or door management platform 2100 ofFIG. 21. B-lock 301 includes physical lock 308. As will be appreciatedby a person of ordinary skill in the art, physical lock 308 includessome components that are similar to those of a standard lock for aparticular application. For example, a b-lock for a particularapplication of locking a door of a building can include some componentssimilar to those of a standard lock to lock a door of a building. Thecomponents can include, for example, a dead bolt, mechanical parts tocause the dead bolt to move and lock/unlock a door, a key hole/cylinderinto which a key can be inserted to lock/unlock a door, etc.

As a second example, a b-lock for a particular application of locking adoor of a safe can include some components similar to those of astandard lock to lock a door of a safe. The components can include, forexample, a combination or security code entry mechanism, multiple deadbolts, each of which extend from the door and enter the door frame ofthe safe to secure the safe door, mechanical parts to cause the deadbolts to move and lock/unlock the safe door, etc. As a third example, ab-lock for a particular application of locking a door of a car caninclude some components similar to those of a standard lock to lock adoor of a car. The components can include, for example, a latch to latchthe car door closed, a key hole/cylinder into which a key can beinserted to lock/unlock the car door, a wireless receiver and aprocessing unit to receive a wireless signal (that includes a securitycode), to validate the security code, and to unlock/lock the car doorupon validation of the security code, etc.

As discussed above, various embodiments of b-lock 301 can be used tolock any of various doors, such as a door on a building, a door on acar, a door on a safe, a door on a cabinet, etc. B-lock 301 can beunlocked and/or locked based on validation of biometric data, which isobtained by biometric data device 307. Biometric data device 307 is adevice that can obtain data of a biometrically identifiable object wherethe data can be used to identify the biometrically identifiable object.Examples of biometrically identifiable objects include a finger, a hand,an iris, a face, etc. Examples of biometric data devices include afingerprint scanner, a hand scanner, an iris scanner, a face scanner, acamera, etc. In some embodiments, biometric data device 307 is notintegrated in a b-lock, but rather is integrated in or coupled to amobile device, such as a mobile device that is executing mobile/webapplication 302.

Biometric data device 307, which is a personal data device, can obtainbiometric data of a user, and can send the biometric data tomicrocontroller 304. Microcontroller 304 can have a local memory thatstores various information, such as security keys, biometricinformation, access details, logs of user interaction, associated usagetimestamps, etc. Microcontroller 304 can keep a record of owner and/oradministrator information for b-lock 301. In some embodiments, eachb-lock has a single registered owner. In some of these embodiments, inaddition to having a single registered owner, each b-lock can have oneor more administrators. An owner can authorize a user to be anadministrator. Both owners and administrators can authorize a user to beable to unlock/lock a b-lock.

When a new user indicates a request to open b-lock 301 by scanning hisfingerprint using biometric data device 307, the request is sent tomicrocontroller 304. Microcontroller 304 compares biometric dataobtained by biometric data device 307 from the new user againstregistered user data that is stored in local memory, which can benon-volatile memory. If the biometric data matches a registered userthat is authorized to open b-lock 301, microcontroller 304 signalsmechanical motor 306 to actuate the deadbolt of physical lock 308 inorder to open b-lock 301.

Power source 305 provides power to b-lock 301, and can operate on abattery energy source, a wired power outlet, etc. For example, powersource 305 can be a rechargeable battery.

B-lock 301 can include light emitting diodes (LEDs), a display, etc. toindicate the lock/unlock status of b-lock 301 to users. Physical lock308 can include a knob for manually locking/unlocking b-lock 301 that isaccessible from the inside of the door on which b-lock 301 is mounted.Physical lock 308 can also include a key hole/cylinder that isaccessible from the outside of the door on which b-lock 301 is mounted,and into which a user can insert a physical key to lock/unlock b-lock301.

In various embodiments, wireless transmitter/receiver 303 cancommunicate via any of various technologies, such as a cellular network,a short-range wireless network, a wireless local area network (WLAN)etc. The cellular network can be any of various types, such as codedivision multiple access (CDMA), time division multiple access (TDMA),global system for mobile communications (GSM), long term evolution(LTE), 3G, 4G, etc. The short-range wireless network can also be any ofvarious types, such as Bluetooth, Bluetooth low energy (BLE), near iscommunication (NFC), etc. The MILAN can similarly be any of varioustypes, such as the various types of IEEE 802.11 networks, among others.In some embodiments, wireless transmitter/receiver 303 can also oralternately communicate via a wired connection, such as via internetprotocol (IP) messages sent over a wired Ethernet network. In someembodiments, wireless transmitter/receiver 303 can communicate with aserver, such as server 609 of FIG. 6.

Microcontroller 304 can maintain a log of entries and exits and can sendthe log information via wireless communication facilitated by wirelesstransmitter/receiver 303 to, for example, a b-lock application runningon a mobile device, such as mobile/web application 302. Microcontroller304 can log when a user opens b-lock 301 with a physical key, and canshare this log information with the lock owner and/or administrator(s).Logs of b-lock 301 being locked and/or unlocked through the use of aphysical key can, for example, inform the owner of events such asunauthorized access into a space (e.g., a burglary). In someembodiments, to voltage output of mechanical motor 306 is monitored by acircuit of b-lock 301 in order to sense when physical lock 308 ismanually locked and/or unlocked using a physical key. In someembodiments, a capacitive/optical sensor of b-lock 301 can track theopening and closing of the door. B-lock 301 can be equipped with othersensors that track vibrations, temperature, etc. B-lock 301 can also beequipped with a display, touch sensors, and/or a camera to enablecommunication to and/or from users.

In some embodiments, biometric data device 307 can communicate with bothmicrocontroller 304 and mobile/web application 302. Mobile/webapplication 302 can be a mobile or a web application that runs on, forexample, a mobile device such as mobile device 102A of FIG. 1A or mobiledevice 102B of FIG. 1B. In some embodiments, biometric data device 307is not part of b-lock 301, but is rather part of or coupled to a mobiledevice. FIG. 6 provides an block diagram illustrating how a biometricdata device, such as biometric data device 607A, can be part of orcoupled to a mobile device executing a mobile/web application, such asmobile/web application 602A which can be executed on a mobile device.Returning to FIG. 3, in some embodiments, biometric data device 307,rather than microcontroller 304, validates the biometric data, such asby comparing the biometric data to stored biometric data of users thatare authorized to unlock/lock b-lock 301. The stored biometric data canbe stored, for example, in a database. The stored biometric data canreside locally on microcontroller 304, can reside on biometric datadevice 307, or can reside at another location that is accessible viawireless transmitter/receiver 303. If a user is verified as being,authorized to lock/unlock b-lock 301 at the time of the verification,b-lock 301 will lock or unlock the door/gate on which b-lock 301 ismounted.

In some embodiments, mobile/web application 302 can help users of b-lock301 to organize and manage access to a protected resource, such as ahouse, a car, a safe, etc. The log information can help inform theowners and/or administrators how the resource is accessed. B-lock 301can also be applied to an object which has a lock mechanism, but not adoor for restricting access to the object, such as a computer or a boat.For example, b-lock 301 can be used as a lock mechanism for the computeror the boat. An owner and/or administrator of b-lock 301 can utilizemobile/web application 302 to authorize an individual to be able tolock/unlock b-lock 301 for any period of time.

FIG. 4A is a flow diagram illustrating an example process to establishan owner or administrator of an electronic lock, such as b-lock 101A ofFIG. 1A, b-lock 101B of FIG. 1B, b-lock 301 of FIG. 3, b-lock 601 ofFIG. 6, b-lock 1100 of FIG. 11, b-lock 2001 of FIG. 20, or doormanagement platform 2100 of FIG. 21, consistent with variousembodiments. To facilitate locking or unlocking an electronic lock basedon personal data, an owner or administrator of the electronic lock canbe established. The electronic, lock receives data that establishes thata user is an owner or administrator of the electronic lock (step 405).For example, b-lock 301 can receive the data via wirelesstransmitter/receiver 303. Any of a variety of methods can be utilized toestablish that a user is an owner or administrator of an electroniclock. In a first example, a security code that is unique to a particularelectronic lock is delivered to a user in association with a purchase ofthe electronic lock by the user, such as via product packaging or viaregistering the electronic lock at a website. When the security key isdelivered via product packaging, the user, for example, obtains adocument from the package that contains the security key. When thesecurity key is delivered via a website, the user inputs a string, suchas an alphanumeric string that contains the serial number of theelectronic lock, at the website, such as by use of a desktop computer.The website can display the security key or send the security key to theuser, such as via email or text message.

Once the user has the security key, the user can use the security key toestablish that he is an owner or administrator of the electronic lock inany of several ways. For example, the user can download from a websiteand install on a mobile device an electronic, lock application, which isan application associated with an electronic lock. A mobile device, suchas mobile device 102A or 102B, can download and install an electroniclock application, such as mobile/web application 302. The user canlaunch the electronic lock application, and can input the security codevia the electronic lock application. In some embodiments, when theelectronic lock application is installed on the mobile device, theelectronic lock application includes a security key.

The electronic, lock application can communicate with the electroniclock either wirelessly or via a wired connection, and can send thesecurity key to the electronic lock. For example, mobile device 102A ofFIG. 1A or 102B of FIG. 1B can send the security key to b-lock 301 ofFIG. 3 via a wireless or wired connection with wirelesstransmitter/receiver 303. The security key can be sent via an encryptedmessage, and b-lock 301, such as via microcontroller 304, can unencryptthe message to obtain the unencrypted security key. B-lock 301 caninclude non-volatile storage, such as a magnetic floppy or hard disk, amagnetic-optical disk, an optical disk, a flash memory such as NANDflash memory or NOR flash memory, a read-only memory (ROM) such as aCD-ROM, a programmable read-only memory such as EPROM or EEPROM, amagnetic or optical card, or another form of non-volatile storage.B-lock 301, such as via microcontroller 304, can access security keyrelated data from the non-volatile storage, and can use the security keyrelated data to verify that the security key is valid for b-lock 301.Upon validation of the security key, b-lock 301 establishes that theuser is an administrator or owner of b-lock 301.

As another example of using the security key to establish that a use isan owner or administrator of an electronic lock, such as b-lock 301, thesecurity key can be input at b-lock 301. B-lock 301 can include an inputmechanism, such as a keypad, a touchpad, a microphone and associatedvoice recognition, or other input capability, and the user can input thesecurity key using the input mechanism, which can be sent tomicrocontroller 304. B-lock 301, such as via microcontroller 304, canaccess security key related data from non-volatile storage, and can usethe security key related data to verify that the security key is validfor b-lock 301. Upon validation of the security key, b-lock 301establishes that the user is an administrator or owner of b-lock 301.

A second example of a method to establish that a user is anadministrator of an electronic lock uses a physical key that is keyed toa particular electronic lock. The user can use the physical key toestablish that he is an owner or administrator of the electronic lock byusing the key to unlock, for example, b-lock 301. Microcontroller 304determines that b-lock 301 has been unlocked by use of a physical key,and, accordingly, establishes that the user is an administrator or ownerof b-lock 301.

Once an electronic lock establishes that a user is an administrator orowner of the electronic lock, the personal data of the user isregistered. The personal data can be obtained in any of various ways. Inembodiments where an electronic lock, as b-lock 301 includes a personaldata device, such as biometric data device 307, the personal data devicecan be used to obtain personal data of the user, such as biometric dataof the user, a password of pass phrase for the user, a voice sample ofthe user, etc. In some embodiments, such as the embodiment of FIG. 6, aspersonal data device of or coupled to a mobile device, such as biometricdata device 607A or 607B, which can be integrated in or coupled to amobile device that is executing, respectively, mobile/web application602A or can be used to obtain personal data of the user. An electroniclock, such as b-lock 301, can receive the personal data of the user(step 410), and can register the personal data (step 415). Registeringpersonal data includes storing the data or a representation of the datain memory, such as non-volatile storage, and associating the personaldata with a role or permission related to b-lock 301. For example,b-lock 301 can receive fingerprint data of a user who has beenestablished to be an administrator or owner of b-lock 301. B-lock 301can store the personal data in memory, and can associate the personaldata with an owner role, an administrator role, with b-lock relatedpermissions, etc. An owner or administrator can be, for example,authorized to unlock or lock b-lock 301 at any time.

At a later point in time, a second user attempts to unlock b-lock 301.The second user uses a personal data device to obtain second personaldata, which in this example is the second user's biometric data. Thesecond user uses a personal data device, for example, biometric datadevice 307 or a biometric data device of or coupled to a mobile deviceof the second user, to obtain second personal data. Biometric datadevice 307 or the mobile device of the second user send the personaldata to b-lock 301, where the personal data is received (step 420). Atstep 425, b-lock 301, such as via microcontroller 304, compares thesecond personal data to the personal data of step 415 to determinewhether the second user is an owner or administrator of b-lock 301. Atstep 430, b-lock 301 determines that the second user and the user ofstep 405 are a same user, and accordingly also determines that thesecond user is an owner or administrator of b-lock 301. Based on thevalidation that the second user is an owner or administrator of b-lock301, b-lock 301 unlocks the locking mechanism of physical lock 308 (step435), such as by microcontroller 304 sending a signal to mechanicalmotor 306 to cause mechanical motor 306 to unlock b-lock 301. A lockingmechanism is an assembly of moving parts that enables a door, gate, lid,drawer, or the like in which the locking mechanism is installed to besecured in a closed position. In some embodiments, a locking mechanismconsists of a bolt or series of bolts propelled and withdrawn by anassembly of moving parts. In some embodiments, a motor moves parts of alocking mechanism to propel or withdraw a bolt or series of bolts inorder to secure or unsecure door, gate, lid, drawer, or the like inwhich the locking mechanism is installed.

FIG. 4B is a flow diagram illustrating an example process to add anadministrator or an authorized user of an electronic lock, such asb-lock 101A of FIG. 1A, b-lock 101B of FIG. 1B, b-lock 301 of FIG. 3,b-lock 601 of FIG. 6, b-lock 1100 of FIG. 11, b-lock 2001 of FIG. 20, ordoor management platform 2100 of FIG. 21, consistent with variousembodiments. To facilitate adding an administrator or an authorized userof an electronic lock, the electronic lock can initially have an owneror administrator established, such as via the process of FIG. 4A. Theowner or administrator can authorize an addition of an authorized useror an additional administrator.

An electronic lock, such as b-lock 301 of FIG. 3, verifies that a useris an owner or administrator of the electronic lock (step 455). Thisverification can be accomplished in any of various ways. For example,when the user is established to be an administrator or owner of theelectronic lock, such as at step 405 of FIG. 4A, b-lock 301 of FIG. 3,or another device, can send first security data to a mobile device ofthe user to enable the mobile device to be identifiable. Messages sentby the mobile device to b-lock 301 can include second security data thatenables b-lock 301 to verify that the message is from the mobile deviceof the user. The second security data can be verified to be the same as,derived from, associated with, etc., the first security data. Once theidentity of the mobile device is established via validation of thesecond security data, and the second security data is validated to beassociated with an owner or administrator of the electronic lock, anymessages sent from the mobile device can be validated as being from anowner or administrator of the electronic lock.

Once the user is validated to be an owner or administrator of b-lock301, the user can initiate a process to add a new administrator orauthorized user. An administrator is able to manage an electronic lock,for example, by adding or deleting authorized users or otheradministrators. In some embodiments, only an owner can changeroles/permissions of an administrator, such as adding a newadministrator or deleting an existing administrator. The user can enablea second user to register as an administrator or an authorized user ofb-lock 301 by causing b-lock 301 or mobile/web application 302 to send amessage to the second user. For example, the user can use an electronic,lock application running on his mobile device to add a second user. Theuser can enter any of the email address, mobile phone number, etc. ofthe second user, and the electronic, lock application can send a messagethat includes a security key to the second user via email, text, etc.The security key can be recognized by b-lock 301 as grantingadministrator or authorized user permissions to the second user. Thesecond user, such as by running an electronic lock application that hasaccess to the security key on his mobile device, or by logging into awebsite into which the security key can be input, can cause the securitykey to be sent to b-lock 301. B-lock 301 can validate the security keyand, based on the security key, determine that the second user hasadministrator or authorized used permissions.

At step 465, which is similar to step 410 of FIG. 1A, b-lock 301receives the personal data of the second user, and registers thepersonal data (step 470, which is similar to step 415). At a later pointin time, a third user attempts to unlock b-lock 301. The third user usesa personal data device to obtain third personal data, which in thisexample is the third user's biometric data. The third user usesbiometric data device 307, or a biometric data device of or coupled to amobile device of the third user, to obtain third personal data.Biometric data device 307 or the mobile device send the personal data tob-lock 301, where the personal data is received (step 475, which issimilar to step 420). At step 480, which is similar to step 425, b-lock301, such as via microcontroller 304, compares the third personal datato the personal data of step 470 to determine whether the second user isan administrator or authorized user of b-lock 301. At step 485, which issimilar to step 430, b-lock 301 determines that the third user and theuser of step 470 are the same user. Based on the validation that thethird user is an administrator or authorized user of b-lock 301, b-lock301 unlocks the locking mechanism of physical lock 308 (step 490, whichis similar to step 435).

FIG. 5 is a system diagram illustrating a platform that includes ab-lock, a biometric data device, a mobile device, and a server,consistent with various embodiments. B-lock 501 can be, e.g., b-lock101A of FIG. 1A, b-lock 101B of FIG. 1B, b-lock 301 of FIG. 3, b-lock601 of FIG. 6, b-lock 1100 of FIG. 11, b-lock 2001 of FIG. 20, doormanagement platform 2100 of FIG. 21, etc. Mobile device 502 can be,e.g., mobile device 102A of FIG. 1A, mobile device 102B of FIG. 1B, amobile device executing mobile/web application 602A or 602B, etc.Biometric data device 503 can be, e.g., biometric data device 105A ofFIG. 1A, a biometric data device of or coupled to mobile device 102B,biometric, data device 307 of FIG. 3, biometric data device 607A, 607B,or 607C of FIG. 6, fingerprint scanner 1305 of FIG. 13, etc. Server 504can be e.g., server 609 of FIG. 6, server 2009 of FIG. 20, etc. Theplatform of FIG. 5 can be used, for example, to manage access tophysical (e.g., house, office, car, etc.) or virtual (e.g., bankaccount, website, etc.) properties based on biometric data. The platformcan use biometric data to eliminate the need for users to carry, forexample, physical keys, account specific authentication tokens, etc.

FIG. 6 is a block diagram illustrating an embodiment of an electroniclock that communicates with a server, consistent with variousembodiments. The electronic lock of the embodiment of FIG. 6 is b-lock601. B-lock 601, wireless transmitter/receiver 603, microcontroller 604,power source 605, mechanical motor 606, and physical lock 608 are,respectively, substantially similar to b-lock 301, wirelesstransmitter/receiver 303, microcontroller 304, power source 305,mechanical motor 306, and physical lock 308 of FIG. 3. In someembodiments, b-lock 601 includes a biometric data device, such asbiometric data device 607C, while in other embodiments, b-lock 601 doesnot include a biometric data device. In some embodiments, regardless asto whether a b-lock includes a biometric data device, biometric data ofa user can be obtained by a remote device, such as a biometric datadevice that is part of or coupled to a mobile device.

For example, in some embodiments, regardless as to whether b-lock 601includes biometric data device 607C, biometric data of a user can beobtained by biometric data device 607A or 607B that is part of orcoupled to, respectively, a first mobile device that is executingmobile/web application 602A or a second mobile device that is executingmobile/web application 602B. Either mobile/web application 602A or 602Bcan send the biometric data to b-lock 601. For example, mobile/webapplication 602A or 602B can send the biometric data to wirelesstransmitter/receiver 603, which can relay the biometric data tomicrocontroller 604. Further, b-lock 601 can communicate with server 609via wireless transmitter/receiver 603.

In some embodiments, server 609 is a cloud server. For example, server609 can be a server that is a shared cloud computing resource. In someembodiments, server 609, or any computing device that can communicatewith other computing devices via a network, can store data using cloudstorage. For example, server 609 can store data using storage that ispart of a shared could computing resource.

FIG. 7A is a flow diagram illustrating an example process, that involvesa server, to establish an owner or administrator of an electronic lock,consistent with various embodiments. The electronic lock of theembodiment of FIG. 7A is a b-lock, such as b-lock 101A of FIG. 1A,b-lock 101B of FIG. 1B, b-lock 301 of FIG. 3, b-lock 601 of FIG. 6,b-lock 1100 of FIG. 11, b-lock 2001 of FIG. 20, or door managementplatform 2100 of FIG. 21. To facilitate locking or unlocking anelectronic lock based on personal data, an owner or administrator of theelectronic lock can be established. A server, such as server 609 orserver 2009, receives data that establishes that a user is anadministrator of the electronic lock (step 705). As is discussed abovein the description of FIG. 4A, any of a variety of methods can beutilized to establish that a user is an administrator of an electroniclock, and to enable the user to obtain a security key for the electroniclock.

As is discussed above in the description of FIG. 4A, once the user hasthe security key, the user can use the security key to establish that heis an owner or administrator of the electronic lock in any of severalways. For example, the user can download from a website and install on amobile device an electronic lock application. A mobile device, such asmobile device 102A or 102B can download and install mobile/webapplication 602A, which can be an electronic lock application. The usercan launch the electronic lock application, and can input the securitycode via the electronic lock application. The electronic lockapplication can communicate with the server either wirelessly or via awired connection, and can send the security key to the server. Forexample, mobile device 102A of FIG. 1A or 102B of FIG. 1B can send thesecurity key to server 609. Server 609 can include non-volatile storage,such as a magnetic floppy or hard disk, a magnetic-optical disk, anoptical disk, a flash memory such as NAND flash memory or NOR flashmemory, a read-only memory (ROM) such as a CD-ROM, a programmableread-only memory such as EPROM or EEPROM, a magnetic or optical card, oranother firm of non-volatile storage. Server 609 can access security keyrelated data from the non-volatile storage, and can use the security keyrelated data to verify that the received security key is valid forb-lock 601. Upon validation of the security key, server 609 establishesthat the user is an administrator or owner of b-lock 601.

Once a server establishes that a user is an administrator or owner of anelectronic lock, the personal data of the user is registered. As isdiscussed above in the description of FIG. 4A, the personal data can beobtained in any of various ways. In the embodiment of FIG. 7A, the useruses biometric data device 607A, which is part of or coupled to a mobiledevice that is running mobile/web application 602A, to obtain personaldata of the user. Server 609 can receive the personal data of the user(step 710), and can register the personal data (step 715). Registeringpersonal data includes storing the data or a representation of the datain memory, such as non-volatile storage, and associating the personaldata with a role or permission related to b-lock 601. For example,server 609 can receive fingerprint data of a user who has beenestablished to be an administrator or owner of b-lock 601. Server 609can store the personal data in memory, and can associate the personaldata with an owner or administrator role, can associate the personaldata with b-lock 601 related permissions, etc.

At a later point in time, a second user attempts to unlock b-lock 601.The second user uses a personal data device to obtain second personaldata, which in this example is the second user's biometric data. Thesecond user uses, for example, biometric data device 607B, which is partof or coupled to a mobile device executing mobile/web application 602B,to obtain the second personal data. Biometric data device 607B sends thesecond personal data to mobile/web application 602B, which in turn sendsthe personal data to server 609, where the personal data is received(step 720). At step 725, server 609 compares the second personal data tothe personal data of step 715 to determine whether the second user is anowner or administrator of b-lock 601. At step 730, server 509 determinesthat the second user and the user of step 705 are a same user, andaccordingly also determines that the second user is an owner oradministrator of b-lock 601. Based on the validation that the seconduser is air owner or administrator of b-lock 601, which can becommunicated to b-lock 601 by server 609 when server 609 accomplishesthe validation, b-lock 601 unlocks the locking mechanism of physicallock 608 (step 735), such as by microcontroller 604 sending a signal tomechanical motor 606 to cause mechanical motor 606 to unlock b-lock 601.

FIG. 7B is a flow diagram illustrating an example process, that includesa server, to add an administrator or an authorized user of an electroniclock, consistent with various embodiments. The electronic lock of theembodiment of FIG. 7B is a b-lock, such as b-lock 101A of FIG. 1A,b-lock 101B of FIG. 1B, b-lock 301 of FIG. 3, b-lock 601 of FIG. 6,b-lock 1100 of FIG. 11, b-lock 2001 of FIG. 20, or door managementplatform 2100 of FIG. 21. To facilitate adding an administrator or anauthorized user of an electronic lock, the electronic lock can initiallyhave an owner or administrator established, such as via the process ofFIG. 7A. The owner or administrator can authorize an addition of anauthorized user or an additional administrator.

A server, such as server 609 of FIG. 6, verifies that a user is an owneror administrator of an electronic lock, such as b-lock 601 (step 755).As is discussed above in the description of FIG. 4B, this verificationcan be accomplished in any of various ways. For example, when the useris established to be an administrator or owner of the electronic lock,such as at step 705 of FIG. 7A, server 609 of FIG. 6 can send firstsecurity data to a mobile device of the user, such as a mobile devicerunning mobile/web application 602A, to enable the mobile device to beuniquely identifiable. Messages sent by the mobile device to b-lock 601or server 609 can include second security data that enables b-lock 601or server 609 to verify that the message is from the mobile device ofthe user. The second security data can be the same as the first securitydata, can be generated based on the first security data, etc. Once theidentity of the mobile device is established via validation of thesecond security data, and the second security data is validated to beassociated with an owner or administrator of b-lock 601, any messagessent from the mobile device can be validated as being from an owner oradministrator of b-lock 601.

As a second example, server 609 can have access to a list of ownersand/or administrators for b-lock 601. Each user, including each ownerand/or administrator, can have an account at server 609, with the user'sstatus as an owner or administrator of b-lock 601 being available viathe account profile. When the user logs into the account, server 609 canverify that the user is an owner or administrator of b-lock 601 via theuser's account profile.

Once the user is validated to be an owner or administrator, the user caninitiate a process to add a new administrator or authorized user. Anadministrator is able to manage an electronic lock, for example, byadding or deleting authorized users or other administrators. The usercan enable a second user to register as an administrator or anauthorized user of b-lock 601 by causing server 609 send a message tothe second user. For example, the user can use an electronic lockapplication running on his mobile device to add a second user. The usercan enter the email address, mobile phone number, etc. of the seconduser, and the electronic, lock application can send a message thatincludes a security key to the second user via email, text, etc. Thesecurity key can be recognized by b-lock 601 or server 609 as grantingadministrator or authorized user permissions to the second user. Thesecond user, such as by running an electronic lock application that hasaccess to the security key on his mobile device, or by logging into awebsite into which the security key can be input, can cause the securitykey to be sent to b-lock 601 or server 609. B-lock 601 or server 609 canvalidate the security key and, based on the security key, recognize thatthe security key grants administrator or authorized used rights to thesecond user.

At step 765, which is similar to step 710 of FIG. 7A, server 609 canreceive the personal data of the second user, and can register thepersonal data (step 770, which is s to step 715). At a later time, athird user attempts to unlock b-lock 601. The third user uses a personaldata device, which in this example is a biometric scanner, to obtainthird personal data, which in this example is the third user's biometricdata. The third user uses, for example, biometric data device 607B toobtain third personal data. Biometric data device 607B sends the thirdpersonal data to mobile/web application 602B, which in turn sends thethird personal data to server 609, where the personal data is received(step 775, which is similar to step 720). At step 780, which is similarto step 725, server 609 compares the third personal data to the personaldata of step 770 to determine whether the second user is anadministrator or authorized user of b-lock 601. At step 785, which issimilar to step 730, server 609 determines that the third user and theuser of step 770 are a same user. Based on the validation that the thirduser is an administrator or authorized user of b-lock 601, which can becommunicated to b-lock 601 by server 609 when server 609 accomplishesthe validation, b-lock 601 unlocks the locking mechanism of physicallock 608 (step 790, which is similar to step 735).

FIG. 8A is an activity diagram illustrating an example process formanaging access to a physical property with access controlled by anelectronic lock, consistent with various embodiments. The electroniclock of the example of FIG. 8A is b-lock 601. The description of theexample process of FIG. 8A will refer to the embodiment and labels ofFIG. 6. Using, for example, the process of FIG. 7A, a user who is apurchaser of an electronic lock can register himself as an owner and/oradministrator of the electronic lock. The user can download anelectronic lock application, such as mobile/web application 602A, on hismobile device and can execute the electronic lock application. Theelectronic lock application can display a user interface that enables anadministrator, such as the user, to authorize a new user to unlock anelectronic lock, such as b-lock 601 (step 820). To authorize the newuser to unlock the electronic lock, the new user can be registered as anauthorized user. An authorized user is a user that is authorized tounlock or lock an electronic lock during one or more periods of time.

For example, an authorized user can be authorized to lock and/or unlockan electronic lock at any time, Monday through Friday from 9:00 am to5:00 pm, on the first Monday of every month, today from 4:00 pm to 6:00pm, at any time between noon today to noon one week from today, etc.Once registered as an authorized user, the authorized user can lockand/or unlock the electronic lock during the period(s) of time that heis authorized to lock and/or unlock the electronic lock.

Being able to grant access to a physical property without having toprovide any physical item, such as a physical key, is useful to avariety of people who want to grant access to a physical property. Suchan ability can be useful to, for example, a property owner who rents hishouse using an online lodging website, an apartment dweller who wants toenable a cleaning person to enter his house when a cleaning isscheduled, a car owner who wants to lend his car to his friend for aperiod of time, etc. In each of these cases, rather than having todeliver a physical key to the renter, cleaning person, or friend, theaccess granting person can authorize the renter, cleaning person, orfriend to be able to lock, and unlock the electronic lock during thedesired period of time. For example, the property owner can authorizethe renter to be able to lock and unlock the electronic lock on the doorof the house during the period of time that the renter rents the house.The apartment dweller can authorize the cleaning person to be able tolock and unlock the electronic lock on the door of his apartment duringthe scheduled cleaning time. The car owner can authorize his friend tobe able to lock and unlock the door of the car during the period of timethat he has decided to loan the car to his friend. Another embodiment ofan electronic lock can be used to enable the friend to be able to startthe car during the period of time that the car owner wants to loan thecar to the friend.

The user can use the user interface to manage access to a physicalproperty or object with access controlled by an electronic lock. Using auser interface of an application, such as interface 900 of FIG. 9 whichis a user interface of mobile/web application 602A, a user can manageaccess to physical properties, such as his home, a storage facility, hisoffice, his car, etc. Interface 900 can be an interface to a resourcemanagement platform for managing access to shared resources. To manageaccess to his home, which in this example has access controlled byb-lock 601, the user can touch the “Manage” icon of user interface 900that is associated with his home. A second level user interface isdisplayed to enable the user to input contact information for a new userthat he wants to grant access to his home. The user can input, forexample an email address, a phone number of a mobile device, an IPaddress, etc. of the new user. Mobile/web application 602A sends amessage that indicates a request to register the new user as anauthorized user of b-lock 601 to a server, such as server 609 (step805). The message can include contact information of the new user, aswell as an indication of one or more periods of time when the new useris authorized to lock and/or unlock b-lock 601.

Server 609 verifies that the message is from an administrator of b-lock601, and, based on the verification, sends a digital code to the newuser to enable the user to register as an authorized user of b-lock 601.The digital code can include, for example, an encrypted security key.The digital code can be sent via an email to the email address of thenew user, via a text message to the phone number of the new user, via amessage sent to an IP address of the new user, etc. Once the digitalcode is received by the new user, mobile/web application 602B can obtainthe digital code and can obtain the security key (step 830). The newuser can be registered as an authorized user of b-lock 601 when, forexample, the new user sends the security key to b-lock 601, and b-lock601 verifies the security key.

Mobile/web application 602B sends a signal to a personal data device,such as biometric data device 607B, to cause biometric data device 607Bto obtain personal data of the new user. Biometric data device 607B canbe part of or coupled to a mobile device that is running mobile/webapplication 602B. For example, biometric data device 607B can be anintegrated fingerprint scanner of a mobile device that is runningmobile/web application 602B, can be a fingerprint scanner that isplugged into a connector, such as a micro-USB or Lightning connector, ofa mobile device that is running mobile/web application 602B, etc. Insome embodiments, the new user can use biometric data device 607A orbiometric data device 607 to obtain personal data of the new user. Inresponse to the signal, biometric data device 607B obtains personal dataof the new user, such as by obtaining fingerprint data of the new user(step 870). Biometric data device 607B sends the personal data tomobile/web application 602B, where the personal data is received (step845).

Mobile/web application 602B sends the digital code to b-lock 601 toenable the new user to register as an authorized user of b-lock 601(step 835). B-lock 601 validates the digital code, such as byunencrypting the digital code to obtain and validate a security key(step 860). Mobile/web application 602B sends the personal data tob-lock 601 (step 850). Sending the personal data can include sending arepresentation of the personal data, for example, sending a digitalrepresentation of a fingerprint. After verifying the digital code andreceiving the personal data, b-lock 601 registers the new user as anauthorized user by storing the personal data in storage, such asnon-volatile memory (step 865). Storing the personal data enables thenew user to be identified as an authorized user by comparing personaldata that is received in the future to the stored personal data.Mobile/web application 602B further sends information as to the period,or periods when the new user is authorized to lock and/or unlock b-lock601. B-lock 601 associates the personal data with the received period orperiods when the new user is authorized to lock and/or unlock b-lock601.

In some embodiments, mobile/web application 602B sends the personal datato server 609 (step 855), where the data is received (step 815). Server609 sends a message to mobile/web application 602A that indicates thatthe new user was registered as an authorized user of b-lock 601 (step825). In some embodiments, server 609, rather than b-lock 601, comparesreceived personal data to stored personal data of an authorized user todetermine whether the received personal data matches the stored personaldata. In some embodiments, server 609 stores personal data of authorizedusers for one or more electronic locks. If an electronic lock breaksdown and needs to be replaced, the new electronic lock can populate datafor authorized users by obtaining the personal data and other associateddata of the authorized users of the broken electronic lock.

In some embodiments, software updates can be pushed to a device with anapplication installed, such as a mobile device with mobile/webapplication 602A or 602B installed. Software updates can further bepushed to a computing device with an application installed, such as adesktop computer with a web application installed. Software updates canadditionally be pushed to an electronic lock. For example, server 609can cause a software update to be applied to a mobile device that isexecuting mobile/web application 602A 602B, or can cause an update to beapplied to b-lock 601. The software update can be sent to b-lock 601 viaa network with which wireless transmitter/receiver 603 can communicate,such as a Wi-Fi network of a physical property for which b-lock 601 isbeing used to restrict access, or can be sent from any of mobile webapplication 602A or 602B to b-lock 601, such as via wirelesstransmitter/receiver 603, or can be sent via any other compatible way.

FIG. 8B is an activity diagram illustrating a second example process formanaging access to a physical property with access controlled by anelectronic lock, consistent with various embodiments. The electroniclock of FIG. 8B is b-lock 601. The process of FIG. 8B is similar to theprocess of FIG. 8A, with one point of difference being that, in someembodiments, a personal data device of an electronic lock is used toobtain personal data of a new user. The description of the exampleprocess of FIG. 8B will refer to the embodiment and labels of FIG. 6.Steps 821, 806, 811, 831, and 836 are, respectively, substantiallysimilar to steps 820, 805, 810, 830, and 835 of FIG. 8A. At step 862,b-lock 601 validates the digital code received at step 836, such as byunencrypting the digital code to obtain a security key and validatingthe security key. B-lock 601 sends a signal to a personal data device,such as biometric data device 607C, to cause biometric data device 607Cto obtain personal data of a new user (step 842). In response to thesignal, biometric data device 607C obtains personal data of the newuser, such as by obtaining fingerprint data of the new user (step 872).Biometric data device 607C sends the personal data to b-lock 601, wherethe personal data received (step 847). B-lock 601 relays the personaldata to mobile/web application 602B, where the personal data is received(step 875).

After verifying the digital code and receiving the personal data, b-lock601 registers the new user as an authorized user, such as by storing thepersonal data in storage (step 866). Storing the personal data enablesthe new user to be identified as an authorized user by comparingpersonal data that is received in the future to the stored personaldata. Mobile/web application 602B can further send to b-lock 601information as to a period or periods when the new user is authorized tolock and/or unlock b-lock 601. B-lock 601 associates the personal datawith the received period or periods when the new user is authorized tolock and/or unlock b-lock 601.

In some embodiments, mobile/web application 502B sends the personal datato server 609, where the personal data is received (step 816). Server609 sends a message to mobile/web application 602A that indicates thatthe new user was registered as an authorize user of b-lock 601 (step826).

FIG. 9 is an illustration of a user interface for a resource managementplatform for managing access to shared resources, consistent withvarious embodiments. As discussed above, in some embodiments, a resourcemanagement platform is used to manage access to physical resources, suchas homes, offices, cars, etc., that use an electronic lock to restrictaccess to the physical resource.

In some embodiments, a resource management platform is used to manageaccess to virtual resources, and in other embodiments, to manage accessto both physical resources and virtual resources. A virtual resource canbe, for example, a hank account, a credit union account, a checkingaccount, a payment card account (e.g., a credit card account, a debitcard account, an automated teller machine (ATM) card account, a giftcard account, a stored value card account, etc.), a credit account, etc.

A user can create a profile at the resource management platform, canidentify each virtual resource that he desires to share with anotherperson, and can input information that enables the platform to accesseach virtual resource, such as a login ID and password for each virtualresource. The user can use interface 900 of the resource managementplatform to manage access to, for example, his home, which in thisexample has access controlled by an electronic lock, and his credit cardaccount. The user can touch the “Manage” icon of user interface 900 thatis associated with a virtual resource, such as his credit card account.

A second level of user interface can be displayed, and the user canidentify a new user with whom he wants to share the virtual resource.The user can provide contact information for the new user, such as anemail address of the new user, or a phone number or IP address of acomputing device of the new user, such as a mobile device of the newuser, etc. The resource management platform can send a message to thenew user to enable the new user to register with the resource managementplatform.

The new user can use, for example, his mobile device to obtain personaldata, such as biometric data of a biometrically identifiable part of hisbody, and can send the personal data to the resource managementplatform, where the platform can store the personal data for futurevalidation of the new user. The user can further identify the resourcethat he is going to share with the new user, and any accessrestrictions, such as one or more periods of time that the new user isauthorized to utilize the shared resource, or restrictions on his accessto the virtual resource, such as being limited to withdraw a maximumamount each day from the user's checking account, or being limited tocharge a maximum amount each day using a payment account of the user.

When the new user attempts to access a virtual resource that the usershared with the new user, the resource management platform can send amessage to the new user's mobile device that prompts the mobile deviceto obtain personal data of the new user. The resource managementplatform can obtain and validate the personal data of the new user.Based on this validation, the resource management platform can use, forexample, the stored login ID and password of the virtual resource thatthe user shared with the new user to enable the new user to obtainaccess to the virtual resource.

FIG. 10A is an activity diagram illustrating an example process formanaging access to a virtual resource, consistent with variousembodiments. Steps 1035, 1005, 1010, 1045, 1050, 1065, 1055, and 1015are, respectively, substantially similar to steps 820, 805, 810, 830,840, 870, 845, and 815 of FIG. 8A, with one point of difference beingthat the steps of FIG. 10A that are related to authorizing a user toaccess an online account are, in the associated step of FIG. 8, relatedto authorizing, a user to access an electronic lock. In someembodiments, server 1009, mobile/web application 1002A, mobile/webapplication 1002B, and biometric data device 1007 are, respectively,server 609, mobile/web application 602A, mobile/web application 602B,and biometric data device 607B of FIG. 6.

At step 1060, mobile/web application 1002B sends a response digital codeto server 1009. In some embodiments, the response digital code is thesame as the digital code received at step 1045. In other embodiments,the response digital code is a security code generated by mobile/webapplication 1002B based on the digital code received at step 1045. Whengenerated based on the digital code received at step 1045, the responsedigital code can be verified, such as by server 1009, to be a securitycode that was generated based the digital code received at step 1045.Mobile/web application 1002B sends the response digital code to server1009 (step 1060), where the response digital code is received (step1020). Server 1009 verities the response digital code (step 1025), suchas by verifying that the response digital code is the same as thedigital code that was sent to mobile/web application or 1002B at step1010, by verifying that that the response digital code was generatedbased on the digital code that was sent to mobile/web application 1002Bat step 1010, etc.

Upon receipt of the personal data of step 1015, and based on theverification of p 1025 of the response digital code, server 1009registers the personal data to enable the ser to be identified as anauthorized user of the online account (step 1030). The personal data canbe registered, for example, by storing the personal data in storage thatcan be accessed by server 1009, and associating the personal data withthe user. Registering the personal data enables the user to beidentified as an authorized user by comparing personal data that isreceived in the future to the registered personal data. Server 1009sends a message that indicates that the user was registered as anauthorized user of the online account to mobile/web application 1002A,where the message is received (step 1040).

FIG. 10B is an activity diagram illustrating an example process forenabling access to a virtual resource, consistent with variousembodiments. Steps 1041, 1056, 1046, and 1006 are, respectively,substantially similar to steps 1050, 1065, 1055, and 1015 of FIG. 10A.At step 1036, mobile/web application 1002B displays a user interfacethat enables a user to request access to a shared online account, suchas an online account of another person. The user can identify aparticular online account in any of various ways. For example, the usercan indicate the online account he wants to access by selecting aparticular online account from a list of online accounts for which hehas registered as an authorized user. As a second example, the user caninput identifying information for the account, such as a website anduser name that can be used to access the account.

Mobile/web application 1002B generates a digital code (step 1051). Thedigital code can enable a message, such as a message that indicates arequest to access an online account, to be verified as being authentic.The digital code of step 1051 can be generated based on, e.g., thedigital code received at step 1045. Mobile/web application 1002B sendsthe digital code to server 1009, where the digital code is received(step 1016). At step 1011, server 1009 verifies the personal datareceived at step 1006. The personal data can be verified by comparingthe personal data against reference personal data for the user, such asby comparing the personal data to personal data that was stored inassociation with step 1030. At step 1021, server 1009 verifies thedigital code received at step 1016.

Upon verification of the personal data and the digital code, server 1009enables the user to access the online account (step 1026). For example,server 1009 can act as an intermediary between mobile/web application1002B and a server that hosts the online account, for example, an onlineaccount server. Server 1009 can use the online account owner's login IDand password to login to the online account server. The user, viamobile/web application 1002B, can request certain actions for the onlineaccount, such as obtaining an account balance, transferring moneybetween the online account and an account of the user, etc. Server 1009,acting as an intermediary, can cause the requested actions to happen andcan report the result of the action back to mobile/web application1002B. Server 1009 can send a message to mobile/web application 1002A tonotify the administrator of the online account that the user accessedthe online account (step 1031).

FIG. 11 is an exploded view illustrating the relationship of variouscomponents of an electronic, lock, consistent with various embodiments.The electronic lock of the embodiment of FIG. 11 is a b-lock. B-lock1100, which in the example of FIG. 11 is mounted in door 1140, includesoutside facing cover 1105, circuit board housing 1110, sensors 1115,motor assembly 1120, deadbolt 1125, rotating base 1130, and battery pod1135. B-lock 1100 can be used to lock, for example, an exterior door ofa house. As is illustrated in FIG. 15, the components on one side ofdoor 1140, such as outside facing cover 1105, face the outside world.The components on the other side of door 1140, such as battery pod 1135,face the interior of the house.

As is shown in FIG. 14, outside facing cover 1105 can be rotated. Forexample, as is illustrated in FIG. 12, outside facing cover 1105 can berotated to a first position that exposes lock cylinder/keyhole 1205.While in the first position, a user can insert a physical key into lockcylinder/keyhole 1205, and can turn the key in a first direction toextend deadbolt 1125 and lock, door 1140, or can turn the key in asecond direction to retract deadbolt 1125 and unlock door 1140.

The user can further rotate outside facing cover 1105 to expose one ormore other components of b-lock 1100. For example, in FIG. 13 the userhas rotated outside facing cover 1105 to a second position that exposesfingerprint scantier 1305. Fingerprint scanner 1305 is a device that canobtain personal data, such as a user's fingerprint data, that can beused to identify a finger of a user. While in this second position, theuser can place his finger on fingerprint scanner 1305. B-lock 1100, suchas via fingerprint scanner 1305, can obtain the user's fingerprint data.If b-lock 1100 verifies dun the users fingerprint data matchesfingerprint data of an authorized user of b-lock 1100, b-lock 1100 candetermine, such as via a processor coupled to circuit board housing1110, to lock or unlock b-lock 1100.

In various embodiments, outside facing cover 1105 can be rotated toexpose any of various components. For example, outside facing cover 1105can be rotated to expose a charging port (not pictured). The chargingport can be any of various types of connectors. For example, thecharging port can be compatible with an industry standard connector,such as a USB connector, a micro-usb connector, a Lightning connector,etc., can be a custom or proprietary connector, can be a puzzleconnector, etc. The charging, port can be used to charge a battery ofb-lock 1100. For example, in a situation where the user does not have aphysical key that he can insert in lock cylinder/keyhole 1205 to unlockb-lock 1100, the user may need to rely upon being able to unlock b-lock1100 based on a biometric scan of his finger. If a battery of b-lock1100 were discharged, the user may not be able to unlock b-lock 1100using his finger. For example, if battery 1905 of FIG. 19 weredischarged, motor assembly 1120 may not be able to obtain enough powerfrom battery 1905 to provide sufficient mechanical force to movedeadbolt 1125.

In a situation where b-lock 1100 is not able to unlock door 1140 due tobattery 1905 being discharged, the user can rotate outside facing cover1105 to expose a charging port, for example, a micro-usb port that canbe used to charge battery 1905 and/or to substantially immediately powerb-lock 1100. The user can use, e.g., a micro-usb cable connected to apower source to recharge battery 1905 and/or to substantiallyimmediately power b-lock 1100. The user can connect the USB connector ofthe micro-usb cable to a power source, such as a USB port of a laptopcomputer, a USB port of a portable battery pack, etc. The user canconnect the micro-usb connector of the micro-usb cable to the exposedmicro-usb port of b-lock 1100. Once the connections are made, electricalcurrent can flow from the power source to battery 1905 and can rechargebattery 1905, and/or can flow to the various components of b-lock 1100,such as to the components inside circuit board housing 1110, to thecomponents of sensors 1115, and to the components of motor assembly1120.

In embodiments where the charging port immediately or substantiallyimmediately powers b-lock 1100, the user can immediately orsubstantially immediately use his finger to cause b-lock 1100 to unlockdoor 1140. In embodiments where the charging port can be used to chargebattery 1905, but not to additionally power b-lock 1100, once battery1905 is sufficiently recharged, the user can use his finger to causeb-lock 1100 to unlock door 1140.

In some embodiments, the charging port has only a direct connection tothe charging circuits and there is no data connection to the digitalcomponents of b-lock 1100, such as to microcontroller 304, 604, or 2004.By isolating the charging port from the data connections of digitalcomponents of b-lock 1100, security is increased by isolating thedigital components and associated software from tampering via thecharging port.

Circuit board housing 1110 is a housing that includes a circuit board,such as a circuit board that includes a processing system of b-lock1100. The processing system can include, for example, micro-controller304 and wireless transmitter/receiver 303 of FIG. 3, micro-controller604 and wireless transmitter/receiver 603 of FIG. 6, or processingsystem 2000 of FIG. 20, among other components. Sensors 1115 can includeany of various sensors, such as a camera, a microphone, an audio sensor,an accelerometer, a pressure sensor, a location sensor, a globalpositioning system (GPS) sensor, a temperature sensor, a humiditysensor, a magnetic field sensor, an electric field sensor, a lightsensor, an infrared light sensor, or a proximity sensor, among othersensors.

Motor assembly 1120 is a motor assembly that provides mechanical forceto extend and retract deadbolt 1125. For example, when a user's identityhas been validated based on personal data of the user and b-lock 1100determines to unlock door 1140, motor assembly 1120 can retract deadbolt1125 to unlock the door.

Rotating base 1130 is a base that can be manually rotated to lock orunlock deadbolt 1125. Battery pod 1135 can be mounted on or otherwisemechanically coupled to rotating base 1130, as is illustrated in FIGS.16 and 18. Notch 1910 of FIG. 19 can be used to mechanically couplebattery pod 1135 to rotating base 1130, such as by locking battery pod1135 to rotating base 1140, as is illustrated in FIG. 18. As isillustrated in FIG. 15, battery pod 1135 and rotating base 1130, onwhich battery pod 1135 is mounted, are interior facing components. Toopen door 1140 from the inside of, for example, a house that includesdoor 1140, a user can rotate rotating base 1130 by grabbing, androtating battery pod 1135, which is mechanically coupled to rotatingbase 1130. Battery pod 1135 can provide force to rotate rotating base1130.

Battery pod 1135 is a battery pod for holding batteries. Battery 1905 ofbattery pod 1135 can be electrically connected to b-lock. 1100, forexample, by a wire that connects battery 1905 with an electricalconnector, such as electrical connector 1705 of FIG. 17. A battery thatpowers b-lock 1100, such as battery 1905, can be any type of battery,such as a rechargeable battery, a non-rechargeable battery, etc. FIG. 19shows a cross section of battery pod 1135, and shows the placement ofbattery 1905 inside of battery pod 1135. A user can detach battery pod1135 from rotating base 1130, and can remove battery 1905, which can bea single battery or multiple batteries. The user can replace battery1905 with a new battery or, when battery 1905 is a rechargeable battery,can remove battery 1905 to recharge the battery. In some embodiments,battery pod 1135 includes a charging port, similar to the charging portdiscussed above, that enables a user to recharge battery 1905 from, forexample, the inside of a house for which b-lock 1100 is being used torestrict access.

FIG. 20 is a high-level block diagram showing internal electronics of anelectronic lock, consistent with various embodiments. The electroniclock can be a door management platform, such as the door managementplatform of FIG. 21. The embodiment of FIG. 20 includes b-lock 2001,mobile/web application 2002, wireless transmitter/receiver 2003,micro-controller (MCU) 2004, power source 2005, mechanical motor 2006,biometric authentication device 2007, physical lock 2008, server 2009,output device 2010, input device 2011, charge connector 2012, externalpower source 2013, and sensor 2014.

The embodiment of FIG. 20 can be broken into a grouping ofsub-components that incorporates the standard structure of conventionaldoor locks with moving parts to lock/unlock the door. The door can beany door, such as a door on a building, a door on a car, a door on asafe, a door on a cabinet, etc. Rather than solely relying on physicalkeys to actuate physical lock 2008, which can be e.g. deadbolt 1125 ofFIG. 11, b-lock 2001 includes mechanical motor 2006, which can be a DCmotor. Microcontroller (MCU) 2004 can control mechanical motor 2006 andcan cause mechanical motor 2006 to open or close physical lock 2008.Mechanical motor 2006 can have associated gears in order to generate therequired torque to move physical lock 2008. MCU 2004 can have a localmemory that stores any of digital keys, biometric information, accessdetails, logs of user interactions, or associated usage timestamps. MCU2004 can keep a record of owner or administrator information.

In some embodiments, b-lock 2001 has a single registered owner and hasmultiple administrators. When a user requests for access via thebiometric, authentication device 2007, which can be fingerprint scanner1305 of FIG. 13, the request can be sent to MCU 2004, which is insideb-lock 2001. MCU 2004 can compare the data received from biometricauthentication device 2007 to the registered personal data in localmemory. If a match is found, the data is deemed valid and MCU 2004signals mechanical motor 2006 to actuate physical lock 2008 to open thedoor.

When output device 2010 is a speaker, MCU 2004 can also send a signal tothe speaker to cause the speaker to emit a sound indicating a successfulauthentication. When a match is not found, the data is deemed not validand MCU 2004 can send a signal to the speaker to cause the speaker toemit a sound indicating an unsuccessful authentication attempt. Thespeaker can additionally or alternately he used for a variety ofpurposes. For example, MCU 2004 can send a signal to the speaker thatcauses the speaker to emit any of various sounds based on any of variousoccurrences, conditions, etc. The speaker can emit various sounds toindicate, e.g., that the b-lock was successfully locked or unlocked, orthat a security mode of the b-lock has been activated, such as via theuser's mobile device or a web site, or that valid or invalid biometricdata was received by the b-lock, or that a valid or invalid uniqueidentifier was received by the b-lock, etc. Examples of security modesinclude that the b-lock is locked or unlocked, that the b-lock is set ornot set to emit an alarm via output device 2010, etc.

Output device 2010 can be any of various output devices that enableinformation to be communicated to a user. For example, output device2010 can be a speaker, a light emitting diode (LED) or other lightsource, an LED display, a liquid crystal display (LCD), etc.

Input device 2011 can be any of various input devices that enable a userto communicate information to b-lock 2001. For example, input device2011 can be a keypad, a camera, a microphone, etc. A user can use thekeypad to input a password, passphrase, etc. When input device 2011 is acamera, the camera can recognize the face or some other identifiablebody part of a user, can recognize physical gestures that a user usesfor communication, etc. When input device 2011 is a microphone, a usercan speak commands, passwords, pass phrases, etc., which the microphonecan receive, and which speech or voice recognition can be used tounderstand the words spoken, identify the user, etc.

Power source 2005 can operate based on a battery energy source, a wiredpower outlet, etc. For example, power source 2005 can be based on arechargeable battery. Charge connector 2012 can be charge connector 2135of FIG. 21, and can be used to, charge a rechargeable battery of b-lock2001, to provide power to b-lock 2001, etc. For example, a user can plugone end of a USB to micro-usb cable into an external power source 2013,such as a portable battery pack, a portable computing device, etc., andcan plug the other end of the cable into charge connector 2012. Externalpower source 2013 can provide power to charge a rechargeable batterythat is part of power source 2005, to directly power the electronics ofb-lock 2001, etc.

The lock and unlock status of b-lock 2001 can be presented to the usersvia output device 2010, such as by a distinctive sound emitted from aspeaker, a specific color or flashing pattern of an LED, an icon ormessage displayed by an LCD, etc. The capability to manually lock andunlock the gate from inside can be maintained through a knob, such asbattery pod 1135 of FIG. 11 mounted on rotating base 1130. Users canalso use a physical key to lock or unlock b-lock 2001 from the outside,such as by inserting, a key into lock cylinder 1205 of FIG. 12.

MCU 2004 can maintain logs of all entries and exits and can transfer theinformation to a mobile app via wireless communication facilitated bywireless transmitter/receiver 2003 (e.g. Bluetooth, Bluetooth Low Energy(BLE), Wi-Fi, etc.). In the event that as user opens the door with aphysical key, this event can be logged and shared with the lock owner.The logs of the door opening and closing through the use of physical keycan inform the owner of events such as unauthorized access into a space(e.g. a burglary). A sensing function to determine when physical lock2008 is manually opened or closed, can be implemented by tracking the DCmotor output signal change as the bolt of physical lock 2008 is manuallyactuated. Alternatively, a sensor in b-lock 2001, such as sensor 2014,which can be a capacitive/optical sensor, can track the opening andclosing of physical lock 2008.

An electronic lock, such as b-lock 2001, can be equipped with othersensors, such as sensor 2014, which can track vibrations, temperature,etc. Sensor 2014 can be sensors 1115 of FIG. 11, and can include any ofvarious sensors, such as a camera, a microphone, an audio sensor, anaccelerometer, a pressure sensor, a location sensor, a globalpositioning system (GPS) sensor, a temperature sensor, a humiditysensor, a magnetic field sensor, an electric field sensor, a lightsensor, an infrared light sensor, or a proximity sensor, among othersensors.

The biometric authentication device 2007 consists of a biometric sensor(e.g. fingerprint, iris, facial pattern, etc.) that collects data from auser. Biometric authentication device 2007 can communicate with bothb-lock 2001 and the mobile/web application 2002, which can be on amobile device of the user, via wires or a wireless communicationstandard. Biometric authentication device 2007 can capture the user'sbiometric data and compare the data to the database of users with accessto that specific gate. The database of biometric data can reside locallyon the MCU 2004 or on server 2009, which can be a cloud server. If theuser has access to the gate at that time, b-lock 2001 would unlock thegate/door.

Mobile/web application 2002 helps owners and/or administrators of thegate system to organize and manage access to a protected resource. Thelog information can help inform the owners/administrators how theresource is accessed. Examples of a protected resource utilizing accesscontrol can includes: the entrance to a house or door of a car. Accesscontrol can also he applied to objects which have lock mechanisms suchas a computers or vehicles. The owner and/or administrators of eachb-lock can grant access to other individuals for any period of time viathe mobile/web application.

FIGS. 22A-C are flow diagrams illustrating examples of processes tomanage access to an area protected by a door management platform,consistent with various embodiments. The processes of FIGS. 22A-C willbe explained in conjunction with the door management platform of FIG.21, which is an illustration of an outside face of a door managementplatform that includes a keypad and a doorbell, consistent with variousembodiments.

The door management platform of the embodiment of FIG. 21, doormanagement platform 2100, includes camera 2105, doorbell button 2110,keypad 2115, microphone 2020, lock cylinder 2125, speaker 2130, andcharge connector 2035. Output device 2010 of FIG. 20 can include speaker2130. Input device 2011 of FIG. 20 can include any of camera 2105,doorbell button 2110, keypad 2115, or microphone 2120, among others.Sensor 2014 of FIG. 20 can include any of camera 2105, doorbell button2110, keypad 2115, or microphone 2120, among others. Door managementplatform 2100 can be an electronic lock.

In some embodiments, keypad 2115 is a virtual keypad displayed by atouchscreen display and doorbell button 2110 is a virtual buttondisplayed by the touchscreen display. In some embodiments, doormanagement platform 2100 includes a capacitive sensor to detect a touchof a button of the keypad. In some embodiments, door management platform2100 includes a force sensor to detect a touch of a button of thekeypad. In some embodiments, keypad 2115 is a mechanical keypad.

A door management platform, such as door management platform 2100, canenable a person, such as an administrator of the door managementplatform, to remotely manage access to an area that is protected by thedoor management platform. For example, when a door management platformis installed on an entrance door of a home or business, the doormanagement platform can enable a person, such as an administrator of thedoor management platform, to remotely manage access to the inside of thehome or business by use of a mobile device or other connected device,such as a computer.

The area that is protected by the door management platform can be, forexample, the inside of an object where access to the inside of theobject is restricted by an apparatus, such as door, gate, lid, drawer,etc., that can be secured in a closed position, and in which the doormanagement platform is installed. As another example, the area can be afenced in area to which access is restricted by a gate a) that is partof a fence that bounds a portion of the fenced in area, and b) in whichthe door management platform is installed. The object can be a house,building, automotive vehicle, airplane, safe, container, cabinet, etc.The door management platform can protect the area by locking theapparatus, the gate, etc. in a closed position, thereby restrictingaccess to the area.

In addition to enabling delivery of packages, groceries, merchandise,etc. inside a home, business, or other area that is protected by a doorwhere access is managed by a door management platform, the doormanagement platform can enable service people, such as a cable repairperson, a house keeper, a dog walker, etc., to enter thehouse/business/etc. to provide their service.

In some embodiments, a door management platform has an applicationsprogramming interface (API) that enables developers to createapplications that interface with the platform. For example, a deliveryservice company can develop an application that can communicate with adoor management platform. The communication can be via any of variouscommunication standards and protocols, such as via a short distancewireless communication standard, examples of which include Bluetooth andBluetooth low energy, via a local area wireless network, examples ofwhich include a Wi-Fi network and an Institute of Electrical andElectronics Engineers (IEEE) 802.11 network, via a cellular network,examples of which include 3G, 4G, Long Term Evolution (LTE), etc.

An application developed by, e.g., a delivery service company can enablea mobile device of a delivery service person to communicate with a doormanagement platform. The mobile device can send identifying informationfor the delivery person and other information to the platform, which canrelay the identifying information to, for example, the home owner thatowns the home protected by the door management platform. The identifyinginformation can include, e.g., a photo of the person, the person's name,employee badge number, etc. The mobile device can further sendinformation or data that enables the recipient device to verify that theinformation is from the delivery service company. With the identifyinginformation verified to be from the delivery service company, and with avisual verification of the delivery person via a camera of the doormanagement platform, the home owner can be confident of the identity andauthenticity of the delivery person. The mobile device can further sendadditional information, such as a tracking number of the delivery, thecontents of the delivery, etc.

Companies other than delivery service companies can also developapplications that communicate with the door management platform. Forexample, a house cleaning company, a dog walking service, etc. candevelop an application that runs on a mobile device of a cleaning,person, dog walker, etc. When the cleaning person, dog, walker, etc.arrives at a home, the mobile device can communicate with the doormanagement platform and send a bill for the cost of the service (e.g.,the house cleaning service, the dog walking service) to the platform,which the platform relays to the home owner. The home owner can use hissmartphone to pay for the service, which the platform can relay to themobile device of the person providing the service. As a second example,a mobile device of a cable repair person can communicate with the doormanagement platform, and can provide, for example, an estimated durationfor the repair, and can provide updates as the repair progresses.

In one example, a grocery delivery person is to deliver groceries to ahouse, and approaches a door protected by a door management platform,such as door 2140 that is protected by door management platform 2100.The grocery delivery person uses his mobile device to communicate withplatform 2100, and the platform sends a message to the home owner'ssmartphone notifying him of the grocery delivery. The platform sends oneor more photos of the house or instructions that enable the grocerydelivery person to correctly identify the door.

For example, when the door is on the side of the house, the doormanagement platform can send a series of photos, a video, writteninstructions, recorded instructions, etc., that direct the grocerydelivery person to the door on the side of the house. The mobile deviceof the delivery person, or a computer of the delivery service company,can send, via the mobile device of the delivery person or via theInternet, a photo of the delivery person to the door management platform(step 2225). When the photo is sent to the door management platform, theplatform can relay the photo to the home owner.

The home owner initiates a live video stream from camera 2105 to hissmartphone (step 2210), and, in some embodiments, uses the photo of thedelivery person to verify the identity of the delivery person. The ownercan use his smartphone to send a message to the door management platformthat causes the door management platform to lock or unlock a lockingmechanism of the door management platform. This enables the deliveryperson to open the door/gate/etc. in which the door management platformis installed, and to deliver the goods to the area that is protected bythe door management platform.

In some cases, a delivery is being made by a delivery person that doesnot have a mobile device. The delivery person presses doorbell button2110. The door management platform sends a message that the deliveryperson activated the doorbell button to the home owner (step 2205).

In some cases, the delivery person enters data at keypad 2115. The datacan be information that identifies the delivery service for which thedelivery person is making the delivery. An electronic, lock company thatsells electronic lock 2100 can maintain a database that enables adelivery company, as well as other types of companies or entities, toregister with the electronic lock company. The database can be stored atcloud storage provided by a cloud storage service, can be stored at acomputer of the electronic lock company, etc. The electronic lockcompany can assign the delivery company a unique code that can be usedto identify the company, and can similarly assign unique codes to otherregistered companies/entities.

The database can include the unique code and contact information for thedelivery company, as well as secure communication information thatenables a computer of or associated with the electronic lock company tosecurely communicate with a computer of the delivery company. The securecommunication information can include, for example, an IP address, URL,etc. of or associated with a computer of the delivery company. Thedatabase can further contain registration information of purchasers ofelectronic locks. For example, the database can include contactinformation for a person, company, etc. that purchased an electroniclock, along with an address were the electronic lock is installed.

The data entered at keypad 2115 can include the unique code for thedelivery company for which the delivery person is making a delivery.Electronic lock 2100 can send the code to a computer of the electroniclock company, where the code is received (step 2250). The electroniclock computer can, based on the unique code, determine the deliverycompany and, based on the secure communication information, send asecure message to a computer of the delivery company (step 2255). Themessage can enable the computer of the electronic lock company to verifywhether the delivery company has a delivery scheduled at the addresswhere electronic lock 2100 is installed for that day and time.

For example, the message can include commands or information that causeor trigger a query of a database of the delivery service company. Thequery can determine whether a delivery is scheduled at that time/date atthe address where the electronic lock is installed. The electronic lockcompany computer can receive information that indicates a delivery (step2260) from the delivery company computer, such as results of thedatabase query, to message confirming that a delivery is scheduled atthat time/date, etc. The delivery company computer can further sendidentifying information of the delivery person. In some embodiments, thedata that indicates that a delivery is scheduled is the identifyinginformation. The electronic lock company computer can send theidentifying information to the home owner (step 2265). The home ownercan be the person to whom the electronic lock is registered (e.g., theowner). In some embodiments, the electronic lock is administered by anadministrator, who can be a person authorized by the home owner toadminister the electronic lock.

The home owner, based on the notification of step 2205, the video ofstep 2210, or the message of step 2265, can use his smartphone toinitiate a two way audio link between the smartphone and the doormanagement platform by use of microphone 2120 and speaker 2130 (step2215). This enables the home owner and the delivery person to have areal-time two way conversation. The home owner can identify the deliveryperson based on the identifying information of step 2225 or step 2265.The home owner asks the delivery person to open the door and deliver thegroceries inside the door, and uses his smartphone to send a message toplatform 2100 that causes platform 2100 to unlock the door (step 2230).Once the door unlocks, the delivery person opens the door and places thegroceries inside the door. As the delivery is happening, camera 2105 cancontinue to stream live video and the home owner can monitor the grocerydelivery person to make sure he doesn't do anything inappropriate.

Once the delivery is complete, the home owner uses his smartphone toelectronically capture his signature acknowledging delivery of thegroceries. In some embodiments, the smartphone sends the electronicallycaptured signature to door management platform 2100, which relays thesignature data to the mobile device of the grocery delivery person. Insome embodiments, the smartphone sends the electronically capturedsignature to a computer of the grocery delivery company for recordstorage.

When the home owner gets home, he can unlock door management platform2100 in any of several ways. For example, he can insert a key in lockcylinder 2125 to unlock the platform, he can type in a security codeusing keypad 2115, he can use his smartphone to unlock the platform,etc. In some embodiments, door management platform 2100 is a biometriclock, and the home owner can unlock door management platform 2100 uponverification of his biometric data.

In some embodiments, door management platform 2100 includes facialrecognition functionality. In one example, a person approaches doormanagement platform 2100, and camera 2105 captures an image of the faceof the person. The facial recognition functionality recognizes the faceas being a face of an authorized user (e.g., a user who is authorized tounlock the door management platform), and unlocks the door managementplatform to enabled the authorized user to open the door.

In some embodiments, door management platform 2100 includes speechrecognition functionality. In one example, a person approaches doormanagement platform 2100, and microphone 2120 captures audio of theperson's voice. The speech recognition functionality recognizes thevoice as being a voice of an authorized user, and unlocks the doormanagement platform to enabled the authorized user to open the door.

In some embodiments, a door management platform is able to communicatewith an autonomous vehicle (step 2215). In one example, an autonomousvehicle is delivering, an item to a home owner at the home owner's home.The autonomous vehicle communicates with the door management platform,and the door management platform authenticates the autonomous vehicle(step 2240). For example, the door management platform verifies that theautonomous vehicle is a vehicle of a delivery service, and that theautonomous vehicle is making a delivery to the home of the home owner.In response to the authentication, the door management platform unlocksthe locking mechanism to enable the autonomous vehicle to deliver theitem inside the doorway of the home (step 2245).

FIG. 23 is a flow diagram illustrating example processes where anelectronic lock takes security-related actions based on security-relatedsensor data, consistent with various embodiments. The process of FIG. 23can be executed by an electronic lock, such as b-lock 101A of FIG. 1A,b-lock 101B of FIG. 1B, b-lock 301 of FIG. 3, b-lock 601 of FIG. 6,b-lock 1100 of FIG. 11, b-lock 2001 of FIG. 20, door management platform2100 of FIG. 21, etc.

Some embodiments of an electronic lock have a sensor. For example,b-lock 1100 of FIG. 11 includes sensors 1115 and b-lock 2001 includessensor 2104. A sensor is a device that responds to a physical stimulusand transmits a resulting signal. Examples of physical stimuli includeheat, light, sound, pressure, magnetism, an electric field, or motion,among others. A signal from a sensor can be used to determine a measureof a physical stimulus, such as the temperate of the environment of thesensor, the intensity, wavelength, etc. of light, the volume, pitch,etc. of a sound, a measure of the pressure, a measure of the strength,direction, etc. of a magnetic or electric field, a proximity of anobject/person/etc. to the sensor, an acceleration of the sensor, aparticular location of the sensor, vibrations, etc.

An electronic lock can take an action based on sensor data of a sensorof the electronic lock. Sensor data can be, for example, the signal thatis transmitted by a sensor as the sensor responds to a physicalstimulus. In some embodiments, an electronic lock takes asecurity-related action based on security-related data of a sensor ofthe electronic lock. Security-related sensor data or a security-relatedaction is data or an action related to controlling or restricting accessto an area protected by the electronic lock. An example of an area thatis protected by an electronic lock is the inside of an object whoseaccess is controlled or restricted by an apparatus, such as door, gate,lid, drawer, etc., that can be secured and locked in a closed positionby an electronic lock that is coupled to the apparatus. The object canbe a house, building, automotive vehicle, airplane, safe, container,cabinet, etc. The electronic lock can protect the area, e.g., by lockingthe apparatus in a closed position, thereby restricting access to thearea.

A second example of an area that is protected by an electronic lock is afenced in area to which access is restricted by a gate that is part of afence that bounds a portion of the fenced in area, and that can besecured and locked in a closed position by an electronic lock that iscoupled to the gate.

In some embodiments, the sensor is a motion sensor and thesecurity-related sensor data is data from the motion sensor. The motionsensor data is security-related because it can indicate motion of adoor/gate/etc. to which the electronic lock is coupled, and motion ofthe door/gate/etc. can indicate that the door/gate/etc. is being openedto allow access to an area to which access is restricted by thedoor/gate/etc., that a person is attempting, to break through thedoor/gate/etc., that a person is knocking on the door/gate/etc., etc.

In an example, a motion sensor of an electronic lock transmits motionsensor data to a processor of the electronic lock during acharacterization period during which motion of a door/gate/etc. to whichthe electronic lock is coupled is deemed to be normal/typical. Theelectronic lock, or a computer with which the electronic lock cancommunicate, analyzes and characterizes the motion sensor data from thecharacterization period (step 2305). The characterization can include,for example, determining a maximum rate of acceleration, a maximum speedof movement, a range of motion, etc.

After the characterization period, the electronic lock or the computerdetermine that motion sensor data indicates a possible security-relatedissue. For example, the motion sensor data can indicate an accelerationthat is more than a pre-determined amount above a maximum rate ofacceleration observed during the characterization period, which canindicate that a person may be trying to break through the door, that aphysical altercation may be happening resulting in the door beingslammed, etc. When the motion sensor data indicates a possiblesecurity-related issue, such as an acceleration more than apre-determined amount above a maximum rate of acceleration observedduring the characterization period, the electronic lock or the computercan send a message that indicates a possible security-related issue(step 2310). The message can be sent to an owner or administrator of theelectronic lock, to a third-party, such as a security company, to thepolice, etc. The pre-determined amount can be zero or any other value.

In some embodiments, the sensor is a proximity sensor and thesecurity-related sensor data is data from the proximity sensor. Theproximity sensor data is security-related because it can indicate that aperson is near a door and may attempt to break through the door, that adoor is in a closed or open position based on the proximity to a doorframe in which the door is installed, etc.

In an example, a proximity sensor is able to detect when adoor/gate/etc. that includes an electronic lock is open, and is able todetect when people pass by the door/gate/etc. and into or out of an areathat is protected by the electronic lock. The electronic lock or acomputer with which the electronic lock can communicate are able to useproximity sensor data to count the number of people that pass by theelectronic lock (step 2315). The electronic lock or the computer canfurther maintain a count of the people that pass by the electronic lockto enter or exit the protected area, and can maintain a count of thepeople that are in the protected area. The electronic lock or thecomputer can send a message to an owner or administrator of the lock, toa third party, etc., that indicates any of these counts (step 2320).

In another example, the electronic lock or the computer is able todetect when a door/gate/etc. is closed based on the proximity sensordata (step 2325). For example, when an electronic lock is coupled to adoor, the electronic lock or the computer can determine, based on theproximity data, that the door is adjacent to a door frame in which adoor is installed. The electronic lock can further determine theposition of a locking mechanism of the electronic lock, and candetermine if the locking mechanism is locked or unlocked. When the dooris closed, and the locking mechanism is unlocked, the electronic lockcan lock the locking mechanism (step 2330), such that the door is lockedin a closed position where it restricts entry into an area that isprotected by the electronic lock.

In some embodiments, the sensor is a motion sensor or a microphone. Themotion sensor data and the microphone data are security-related becauseeither can indicate that someone is knocking on the door. When thesensor is a motion sensor, a processor of the electronic lock or acomputer with which the electronic lock can communicated can determine,based on the motion sensor data, that a person is knocking on the door(step 2335). When the sensor is a microphone, the processor or computercan determine, based on microphone data that indicates sounds that areindicative of someone knocking on the door, that a person is knocking onthe door. Based on a determination that a person is knocking on thedoor, the electronic lock or the computer can send a signal to awirelessly connected light bulb that causes the light bulb to illuminatean area near the electronic lock (step 2340). For example, the lightbulb can illuminate the area in front of the door, can illuminate anarea inside of the house that contains the door, etc.

An electronic lock can take any of various security-related actionsbased on security-related sensor data. For example, when a proximitysensor of the electronic lock indicates that a person is within apredetermined distance of the sensor, the electronic lock can initiate avideo stream to an administrator/owner of the electronic lock using acamera of the electronic lock, can initiate an audio stream to theadministrator/owner using a microphone author speaker of the electroniclock, etc. The administrator/owner can use the video stream to see whatis going on near the door, and can use a two-way audio stream to talk toa person that is near the electronic lock.

In another example, when security-related sensor data indicates aspossible security-related issue, the electronic lock or a computer withwhich the electronic lock can communicate can cause a signal to be sentto a speaker of the electronic lock, to cause the speaker to emit analarm sound. In yet another example, when security-related sensor dataindicates a possible security-related issue, the electronic lock or thecomputer can cause a signal to be sent that causes a camera of theelectronic lock to begin recording or taking images, for example, tocapture an image or video of a burglar who is attempting to break intoan area protected by the electronic lock.

FIG. 24 is a high-level block diagram showing as processing system,consistent with various embodiments, in which at least some operationsrelated to the disclosed technology can be implemented. The embodimentof FIG. 24 can represent, for example, b-lock 101A or 101B, b-lock 201,b-lock 301, wireless transmitter/receiver 303, micro controller 304,biometric data device 307, b-lock 501, b-lock 601, wirelesstransmitter/receiver 603, micro controller 604, biometric data device607A, 607B, or 607C, server 609, the computing device on whichmobile/web application 302, 602A, or 602B is executed, server 1009, thecomputing device on which mobile/web application 1002A or 1002B isexecuted, biometric data device 1007, b-lock 1100, b-lock 2001,microcontroller 2004, wireless transmitter receiver 2003, biometric datadevice 2007, server 2009, the computing device on which mobile/webapplication 2002 is executed, or door management platform 2100, amongothers. Any of these processing systems may include two or moreprocessing devices such as represented in FIG. 24, which may be coupledto each other via a network or multiple networks. A network can bereferred to as a communication network.

In the illustrated embodiment, the processing system 2400 includes oneof more processors 2402, memory 2404, a communication device 2406, andone or more input/output (I/O) devices 2408, all coupled to each otherthrough an interconnect 2410. In some embodiments, each device is amodule in a device that includes the module, as well as other modules.The interconnect 2410 may be or include one or more conductive traces,buses, point-to-point connections, controllers, adapters and/or otherconventional connection devices. Each processor 2402 may be or include,for example, one or more general-purpose programmable microprocessors ormicroprocessor cores, microcontrollers, application specific integratedcircuits (ASICs), programmable gate arrays, or the like, or acombination of such devices. The processor(s) 2402 control the overalloperation of the processing device 2400. Memory 2404 may be or includeone or more physical storage devices, which may be in the form of randomaccess memory (RAM), read-only memory (ROM) (which may be erasable andprogrammable), flash memory, miniature hard disk drive, or othersuitable type of storage device, or a combination of such devices.Memory 2404 may store data and instructions that configure theprocessor(s) 2402 to execute operations in accordance with thetechniques described above. The communication device 2406 may be orinclude, for example, an Ethernet adapter, cable modem, Wi-Fi adapter,cellular transceiver, Bluetooth transceiver, or the like, or acombination thereof. Depending on the specific nature and purpose of theprocessing device 2400, the I/O devices 2408 can include devices such asa display (which may be a touch screen display), audio speaker,keyboard, mouse or other pointing device, microphone, camera, etc.

Unless contrary to physical possibility, it is envisioned that (i) themethods/steps described above may be performed in any sequence and/or inany combination, and that (ii) the components of respective embodimentsmay be combined in any manner.

The techniques introduced above can be implemented by programmablecircuitry programmed/configured by software and/or firmware, or entirelyby special-purpose circuitry, or by a combination of such forms. Suchspecial-purpose circuitry (if any) can be in the form of, for example,one or more application-specific integrated circuits (ASICs),programmable logic, devices (PLDs), field-programmable gate arrays(FPGAs), etc.

Software or firmware to implement the techniques introduced here may bestored on a machine-readable storage medium and may be executed by oneor more general-purpose or special-purpose programmable microprocessors.A “machine-readable medium”, as the term is used herein, includes anymechanism that can store information in a form accessible by a machine(a machine may be, for example, a computer, network device, cellularphone, personal digital assistant (PDA), manufacturing tool, any devicewith one or more processors, etc.). For example, a machine-accessiblemedium includes recordable/non-recordable media (e.g., read-only memory(ROM); random access memory (RAM); magnetic disk storage media; opticalstorage media; flash memory devices; etc.), etc.

Note that any and all of the embodiments described above can be combinedwith each other, except to the extent that it may be stated otherwiseabove or to the extent that any such embodiments might be mutuallyexclusive in function and/or structure.

Although the present invention has been described with reference tospecific exemplary embodiments, it will be recognized that the inventionis not limited to the embodiments described, but can be practiced withmodification and alteration within the spirit and scope of the appendedclaims. Accordingly, the specification and drawings are to be regardedin an illustrative sense rather than a restrictive sense.

We claim:
 1. A door management platform, for remotely managing access toan area, comprising: a processor; a memory coupled to the processor; awireless communication interface coupled to the processor; a microphonecoupled to the processor; a speaker coupled to the processor; a cameracoupled to the processor; a locking mechanism; and a motor coupled tothe processor and to the locking mechanism, wherein the door managementplatform is configured to send, via the wireless communicationinterface, a real-time stream of video acquired by the camera to a firstcomputing device of an administrator of the door management platform toenable the administrator to see a person requesting access to an areaprotected by the door management platform, wherein the door managementplatform is configured to provide, via the wireless communicationinterface, a two-way real-time audio connection between the doormanagement platform and the first computing device of the administratorto enable the administrator and the person requesting access to be ableto verbally communicate, the two-way real-time audio connection beingfacilitated by the microphone and the speaker, wherein the doormanagement platform is configured to lock or unlock the door managementplatform in response to a message received from the first computingdevice of the administrator after the administrator verifies, based onthe real-time video stream or the real-time audio connection, anidentify of the person requesting access, the message indicating to lockor unlock the door management platform, wherein a first server isconfigured to receive access identifying information originating atleast in part from a mobile device of the person requesting access, andwherein after the receipt of the access identifying information, thefirst server is configured to communicate with a second server, whereinthe second server is configured to transfer money between a user accountand an online account, and wherein the door management platform isconfigured to lock or unlock in response to a message received from thesecond server, wherein the door management platform is configured tocommunicate with the mobile device of the person requesting access,wherein the door management platform is configured to receive, from thefirst computing device of the administrator, an electronic signaturethat is to be captured by the first computing device to acknowledgedelivery of an item, and wherein the door management platform isconfigured to send the electronic signature to the mobile device of theperson requesting access.
 2. The door management platform of claim 1,further comprising: a doorbell button coupled to the processor, whereinthe door management platform is configured to send a notification ofactivation of the doorbell button to the first computing device of theadministrator in response to the doorbell button being activated bybeing pressed by the person requesting access, and wherein configurationof the door management platform to provide the real-time video streamand the real-time audio connection includes being configured to providethe real-time video stream and the real-time audio connection inresponse to said notification of activation.
 3. The door managementplatform of claim 1, wherein the door management platform is configuredto communicate with the mobile device of the person requesting access,wherein the door management platform is configured to receive, via themobile device, personal data of the person requesting access, and tosend the personal data to the first computing device of theadministrator.
 4. The door management platform of claim 3, wherein thepersonal data includes a photo, of the person requesting access, thatthe administrator can use to identify the person requesting access, thephoto being an electronic copy of a photo that is stored at a server ofan employer of the person requesting access.
 5. The door managementplatform of claim 1, wherein the door management platform is configuredto communicate with the mobile device of the person requesting access,wherein the door management platform is configured to communicate withthe mobile device of the person requesting access via any of a shortdistance wireless communication standard, a local area wireless network,or a cellular network.
 6. The door management platform of claim 1,further comprising a motion sensor, wherein the motion sensor isconfigured to indicate a detection of motion to the first computingdevice when the motion sensor detects motion.
 7. The door managementplatform of claim 1, further comprising a proximity sensor.
 8. The doormanagement platform of claim 1, wherein the access identifyinginformation comprises a package tracking number.
 9. The door managementplatform of claim 1, wherein the mobile device is configured tocommunicate with the door management platform to identify a packagetracking number.
 10. The door management platform of claim 1, whereinthe second server is configured to receive a delivery acknowledgementsignal from the door management platform.
 11. The door managementplatform of claim 1, wherein the mobile device is configured to send asignal that enables the door management platform to verify that thesignal is from a delivery service company.
 12. The door managementplatform of claim 1, wherein the first server is associated with a firstcompany and the second server is associated with a second company. 13.The door management platform of claim 12, wherein the first company is adoor management platform company and the second company is a deliverycompany.
 14. A door management platform comprising: a processor; amemory coupled to the processor; a communication interface coupled tothe processor; an input device coupled to the processor; an outputdevice coupled to the processor; a locking mechanism; and a motorcoupled to the processor and to the locking mechanism, wherein the doormanagement platform is configured to send, via the communicationinterface, data to a first computing device of an administrator of thedoor management platform to enable the administrator to verify anidentity of a person requesting access to an area protected by the doormanagement platform, wherein the door management platform is configuredto enable two-way real-time communication, via the communicationinterface, between the door management platform and the first computingdevice of the administrator to enable the administrator and the personrequesting access to be able to communicate, the two-way real-timecommunication being facilitated by the input device and the outputdevice, wherein the door management platform is configured to lock orunlock the door management platform in response to a message from thefirst computing device of the administrator that indicates to lock orunlock the door management platform, wherein a first server isconfigured to receive access identifying information originating atleast in part from a device of the person requesting access, and whereinafter the receipt of the access identifying information, the firstserver is configured to communicate with a second server, wherein thesecond server is configured to transfer money between a user account andan online account, and wherein the door management platform isconfigured to lock or unlock in response to a message received from thesecond server, wherein the door management platform is configured tocommunicate with a mobile device of the person requesting access,wherein the door management platform is configured to receive, from thefirst computing device of the administrator, a signature that is to beelectronically captured by the first computing device to acknowledgedelivery of an item, and wherein the door management platform isconfigured to send the signature to the mobile device of the personrequesting access.
 15. The door management platform of claim 14, whereinthe door management platform is configured to communicate with a mobiledevice of the person requesting access via any of a short distancewireless communication standard, a local area wireless network, or acellular network.
 16. The door management platform of claim 14, whereinthe input device and the output device are a same device, the samedevice being a touch screen display, wherein the door managementplatform includes a doorbell function that includes a doorbell iconbeing displayed on the touch screen display, and wherein the doormanagement platform is configured to send a notification to the firstcomputing device of the administrator in response to the touchscreendisplay being touched by the person requesting access while the doorbellicon is being displayed.
 17. The door management platform of claim 14,wherein the input device is a keypad, wherein the door managementplatform is configured to unlock the door management platform inresponse to a security code being entered at the keypad.
 18. The doormanagement platform of claim 14, wherein the input device is atouch-screen display, wherein the touch-screen display is configured todisplay a virtual keypad, and wherein the door management platform isconfigured to unlock the door management platform in response to asecurity code being entered at the touch-screen display while thevirtual keypad is being displayed at the touch-screen display.
 19. Thedoor management platform of claim 14, wherein the input device is acamera, wherein the door management platform is configured to recognizean image, captured by the camera, of a face of a person, and wherein thedoor management platform is configured to unlock the door managementplatform in response to the image of the face of the person beingrecognized as being the face of an authorized user of the doormanagement platform.
 20. The door management platform of claim 14,wherein the input device is a microphone, wherein the door managementplatform is configured to recognize a voice of a person captured by themicrophone, and wherein the door management platform is configured tounlock the door management platform in response to the voice of theperson being recognized as being a voice of an authorized user of thedoor management platform.
 21. The door management platform of claim 14,wherein the input device is a biometric sensor, and wherein the doormanagement platform is configured to unlock the door management platformwhen biometric data that is obtained by the biometric sensor matchesbiometric data of an authorized user of the door management platform.22. The door management platform of claim 14, wherein the doormanagement platform is configured to receive a photo taken by a mobiledevice of the person requesting access and to send the photo to thefirst computing device of the administrator to enable the administratorto identify the person requesting access, and wherein the message fromthe first computing device is received after the photo is sent to thefirst computing device of the administrator and is based on the photo.23. The door management platform of claim 14, further comprising amotion sensor, wherein the motion sensor is configured to indicate adetection of motion to the first computing device when the motion sensordetects motion.
 24. The door management platform of claim 14, furthercomprising a proximity sensor.
 25. The door management platform of claim14, wherein the access identifying information comprises a packagetracking number.
 26. The door management platform of claim 14, whereinthe device of the person requesting access is configured to communicatewith the door management platform to identify a package tracking number.27. The door management platform of claim 14, wherein the second serveris configured to receive a delivery acknowledgement signal from the doormanagement platform.
 28. The door management platform of claim 14,wherein the device of the person requesting access is configured to senda signal that enables the door management platform to verify that thesignal is from a delivery service company.
 29. The door managementplatform of claim 14, wherein the first server is associated with afirst company and the second server is associated with a second company.30. The door management platform of claim 29, wherein the first companyis a door management platform company and the second company is adelivery company.