System and method for signifying intent for lock operation

ABSTRACT

A lock device is configured to receive a credential from a mobile device. The lock device is configured to monitor the distance between the mobile device and the lock device. The lock device is configured to detect an intent action by a user of the mobile device and unlock the lock device if the mobile device is within a predetermined distance from the lock device and the intent action is an approved intent action.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of U.S. Provisional PatentApplication No. 62/006,801 filed on Jun. 2, 2014, the contents of whichare hereby incorporated by reference in their entirety.

BACKGROUND

The present application generally relates to operation of a lock, andmore particularly relates to unlocking a lock or access control devicewith a mobile device. Locks may be unlocked in various ways. Someexisting systems have various shortcomings relative to certainapplications. Accordingly, there remains a need for furthercontributions in this area of technology.

BRIEF SUMMARY

One embodiment of the present invention is directed to a unique systemand method for controlling operation of a lock. Other embodimentsinclude apparatuses, systems, devices, hardware, methods, andcombinations for controlling operation of a lock. Further embodiments,forms, features, aspects, benefits, and advantages of the presentapplication shall become apparent from the description and figuresprovided herewith.

BRIEF DESCRIPTION OF THE FIGURES

The description herein makes reference to the accompanying figureswherein like reference numerals refer to like parts throughout theseveral views, and wherein:

FIG. 1 is a schematic block diagram of an exemplary system;

FIG. 2 is a schematic block diagram of an exemplary computing device;and

FIG. 3 is a schematic flow diagram of an exemplary process for unlockinga lock device.

DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS

For the purposes of promoting an understanding of the principles of theinvention, reference will now be made to the embodiments illustrated inthe drawings and specific language will he used to describe the same. Itwill nevertheless be understood that no limitation of the scope of theinvention is thereby intended, any alterations and further modificationsin the illustrated embodiments, and any further applications of theprinciples of the invention as illustrated therein as would normallyoccur to one skilled in the art to which the invention relates arecontemplated herein.

The present application is generally directed to signifying intent foroperating a lock device or an access control device. FIG. 1 illustratesa system 100 including a lock device 102, a mobile device 104, and adoor 106. The lock device 102 is located on or near the door 106 tocontrol access to the area protected by the door 106. The system 100 isconfigured as an access control system. However, in other embodiments,the system 100 may be a payment system, a transportation system, or anyother type of access control system known to those having skill in theart.

The lock device 102 may be an electronic lock, a reader, a paymentterminal, and/or any other type of device that can communicate with themobile device 104. The lock device 102 may include a transceiver 108 tocommunicate with a transceiver 110 of the mobile device 104 via acommunication protocol such as, for example, Bluetooth, near fieldcommunication (NFC), Wi-Fi, and other communication protocols. The lockdevice 102 may also include a lock mechanism 103 such as, for example, alatch, a bolt, and the like that is used to lock and unlock the lockdevice 102 for restricting access to the door 106. The lock device 102may also include an accelerometer 105 to detect an intent action. Theintent action may be used, among other information, by the lock device102 to determine whether the lock device 102 should unlock the lockmechanism 103 so that the user of the mobile device 104 may have accessto the area protected by the door 106.

The mobile device 104 may be a smartphone, a mobile phone, a tabletcomputer, a watch, smartcard, and/or any other device capable oftransmitting a credential 112 to the lock device 102. The credential 112is capable of indicating to the lock device 102 from a relatively greatdistance (e.g., several meters) that a user of the mobile device 104 isauthorized to access the area protected by the door 106 such as, forexample, when the lock device 102 and the mobile device 104 pair withone another via Bluetooth communication. The credential 112 may be aunique number, a unique identifier, a personal identification number(PIN), an address and/or any other type of information that uniquelyidentifies the mobile phone 104. In one example, the mobile device 104may transmit the credential 112 to the lock device 102 in order for themobile device 104 and the lock device 102 to be paired together using,for example, Bluetooth communication. In this example, the credential112 constitutes unique information that facilitates pairing orwirelessly connecting the mobile device 104 and the lock device 102.

In one embodiment, as a user is located relatively close to the door106, the lock device 102 automatically unlocks the lock mechanism 103.The lock device 102 may connect with the mobile device 104 from arelatively long range (>10 m) to determine that the credential 112 isapproaching the lock device 102. The lock device 102 can determine thatthe mobile device 104 is approaching by analyzing the radio signalstrength (e.g., received signal strength indicator (RSSI)) received atthe lock device 102 or at higher abstracted levels such as Apple'siBeacon technology.

In some circumstances, a user could walk past a door not intending tounlock the door or lock device such as, for example, when the user islocated inside a house and a stranger is located outside of the house.The lock device 102 may use the accelerometer 105 to detect or identifyan intent action from a user. The intent action indicates to the lockdevice 102 to unlock the lock mechanism 103 once the lock device 102detects or recognizes the user has approached the door 106.

The accelerometer 105 in the lock device 102 may detect the intentaction by the user of the mobile device 104. For example, when the useris located close to the door 106, the lock device 102 may unlock thelock mechanism 103 when the accelerometer 105 detects an intent action(e.g., a specific vibration signature) such as the rotation of a leveron the door 106. Any one or combination of intent actions (e.g.,specific vibration signatures) could be sensed such as, for example,rotating a knob or lever on the lock device 102 or the door 106,pressing a thumb-piece on the lock device 102, kicking the door 106,knocking on the door 106, and/or bumping a car key fob to the door 106,among other vibrations or intent actions.

This technique may be used for approaching the door 106 from either theoutside or inside. In some cases, the user may approach the door 106 andbe located near it, but may change their mind and stay by the door 106to talk to a neighbor or change direction and move away. For thesecases, it may not be desirable to allow the lock device 102 to foreverbe looking for the intent action. This circumstance may be addressed inat least two ways: (1) an intent time window could be constructed sothat if the user arrives at the door 106 and does not perform the intentaction within a specific amount of time, then the intent action will notbe recognized by the lock device 102 to unlock; or (2) the distancebetween the mobile device 104 and the lock device 102 could be monitoredso that if the user is detected as moving away from the door 106, thenany intent action will not be recognized by the lock device 102 tounlock.

Additionally, there are at least two ways to address situations where astranger approaches the door 106 from the outside and the userapproaches the door 106 from the inside. In one embodiment, the system100 could be designed with a lockout feature where if one or more intentactions (e.g., certain signatures) are detected at the door 106 beforethe credential 112 arrives at the door 106, then the lock device 102would ignore the intent action(s) even if the credential 112 comes tothe door 106 shortly afterwards. In one example, a stranger comes to thedoor 106 and knocks. The knock is sensed by the accelerometer 105, butbecause there is no credential 112 near lock device 102, the lock device102 disables any response or ignores the intent action. Then, if theuser inside hears the knock and approaches the door 106 with the mobiledevice 104 and credential 112, any further intent actions by thestranger will be ignored or not recognized as an intent action for thelock device 102 to unlock.

In another embodiment, the lock device 102 may be configured to requiretwo or more intent actions to signify intent within a predeterminedtimeframe of one another. For example, the lock device 102 could beconfigured such that the user normally bumps his or her knuckle to thedoor 106 and then rotates the lever within two (2) seconds. A strangeron the outside would have to do this specific action to gain access.

In some embodiments, the detection of signatures yields applicationusage data for doors that have a thumb-piece on the outside of the doorand a lever on the inside of the door, which could inform the system ifingress or egress is occurring.

FIG. 2 is a schematic block diagram of a computing device 200. Thecomputing device 200 is one example of a lock device and/or mobiledevice that may be utilized in connection with the lock device 102and/or the mobile device 104 shown in FIG. 1. Computing device 200includes a processing device 202, an input/output device 204, memory206, and operating logic 208. Furthermore, computing device 200communicates with one or more external devices 210.

The input/output device 204 allows the computing device 200 tocommunicate with the external device 210. For example, the input/outputdevice 204 may be a transceiver, network adapter, network card,interface, or a port (e.g., a USB port, serial port, parallel port, ananalog port, a digital port, VGA, DVI, HDMI, FireWire, CAT 5, or anyother type of port or interface). The input/output device 204 may becomprised of hardware, software, and/or firmware. It is contemplatedthat the input/output device 204 will include more than one of theseadapters, cards, or ports.

The external device 210 may be any type of device that allows data to beinputted or outputted from the computing device 200. For example, theexternal device 210 may be a mobile device, lock device, a readerdevice, equipment, a handheld computer, a diagnostic tool, a controller,a computer, a server, a processing system, a printer, a display, analarm, an illuminated indicator such as a status indicator, a keyboard,a mouse, or a touch screen display. Furthermore, it is contemplated thatthe external device 210 may be integrated into the computing device 200.It is further contemplated that there may be more than one externaldevice in communication with the computing device 200.

Processing device 202 can be a programmable type, a dedicated, hardwiredstate machine; or a combination of these; and it can further includemultiple processors, Arithmetic-Logic Units (ALUs), Central ProcessingUnits (CPUs), Digital Signal Processors (DSPs), or the like. Processingdevices 202 with multiple processing units may utilize distributed,pipelined, and/or parallel processing. Processing device 202 may bededicated to performance of just the operations described herein or maybe utilized in one or more additional applications. In the depictedform, processing device 202 is of a programmable variety that executesalgorithms and processes data in accordance with operating logic 208 asdefined by programming instructions (such as software or firmware)stored in memory 206. Alternatively or additionally, operating logic 208for processing device 202 is at least partially defined by hardwiredlogic or other hardware. Processing device 202 can be comprised of oneor more components of any type suitable to process the signals receivedfrom input/output device 204 or elsewhere, and provide desired outputsignals. Such components may include digital circuitry, analogcircuitry, or a combination of both.

Memory 206 may be of one or more types, such as a solid-state variety,electromagnetic variety, optical variety, or a combination of theseforms. Furthermore, memory 206 can be volatile, nonvolatile, or acombination of these types, and some or all of memory 206 can be of aportable variety, such as a disk, tape, memory stick, cartridge, or thelike. In addition, memory 206 can store data that is manipulated by theoperating logic 208 of processing device 202, such as datarepresentative of signals received from and/or sent to input/outputdevice 204 in addition to or in lieu of storing programming instructionsdefining operating logic 208, just to name one example. As shown in FIG.2, memory 206 may be included with processing device 202 and/or coupledto the processing device 202.

FIG. 3 illustrates a schematic flow diagram of an exemplary process 300for unlocking a lock device. Operations illustrated for all of theprocesses in the present application are understood to be exemplaryonly, and operations may be combined or divided, and added or removed,as well as re-ordered in whole or in part, unless explicitly stated tothe contrary.

Process 300 begins with operation 302 in which the lock device 102monitors for a mobile device 104 to connect to wirelessly such as, forexample, via Bluetooth communication. It is contemplated that in someembodiments, the mobile device 104 may be monitoring for a lock device102 to connect to over Bluetooth communication or another protocol.

Process 300 proceeds from operation 302 to operation 304. At operation304, during the setup of the wireless connection or after the connectionis established between the lock device 102 and the mobile device 104,the mobile device 104 transmits a credential 112 to the lock device 102.In some embodiments, the mobile device 104 may transmit the credential112 to the lock device 102 as part of the pairing or connecting process.In other embodiments, the mobile device 104 may transmit the credential112 to the lock device 102 after the two devices are connected orpaired.

Process 300 proceeds from operation 304 to operation 306. At operation306, the lock device 102 determines whether the credential 112 is validor authenticates the credential 112. For example, the lock device 102may determine whether the credential 112 represents a piece of uniqueinformation so that the lock device 102 and the mobile device 104 may bepaired (e.g., via Bluetooth) or otherwise form a wireless connection.The lock device 102 may also receive the credential 112 after aconnection is established and look up in a database whether thecredential 112 has sufficient rights to access the door 106. If thecredential 112 is approved, process 300 proceeds to operation 308. Ifthe credential 112 is not approved, process 300 proceeds to operation302 where the lock device 102 monitors for a mobile device 104.

At operation 308, the lock device 102 may use the accelerometer 105 tomonitor or detect an intent action (e.g., a particular vibrationsignature) by the user. One or more types of intent actions may bedetected such as rotating a lever on the lock device 102 or door 106,pressing a thumb-piece on the lock device 102, kicking the door 106,knocking on the lock device 102 or door 106, bumping a car key fob tothe door 106, and/or any other action that the accelerometer 106 maydetect. Once the intent action has been received, process 300 proceedsfrom operation 308 to operation 310. It is contemplated that if nointent action is received within a certain amount of time and/or themobile device 104 moves away from the lock device 102, process 300 mayproceed back to operation 302.

At operation 310, the lock device 102 determines whether the intentaction detected is a valid or approved intent action. The lock device102 may have a list of valid or approved intent actions that the lockdevice 102 uses to compare to the intent action detected by theaccelerometer 105. It is contemplated that the lock device 102 monitorsor analyzes data from the accelerometer 105 to determine whether a validintent action occurred.

Process 300 proceeds from operation 310 to operation 312. At operation312, the lock device 102 determines whether one or more intent action(s)were received within a predetermined timeframe from receipt of thecredential 112, For example, if the lock device 102 received thecredential 112 from the mobile device 104 When the mobile device 104 wasseveral meters from lock device 102, it may take a user a few secondswalk up to the door 106 and perform an intent action. However, if theuser stands near the door 106 for a prolonged period of time withoutperforming an intent action, this may indicate that the user does notwish to access the area protected by the door 106. If the intent actionwas received within the timeframe, process 300 proceeds from operation310 to operation 312. If the intent action was not received within thetimeframe, then process 300 will proceed to operation 302.

At operation 314, the lock device 102 may determine whether one or moreother criteria are met before deciding whether to unlock the lockmechanism 103. For example, the lock device 102 may ensure that thecredential 112 was received before the intent action. In someembodiments, if the lock device 102 receives an intent action before themobile device 104 approaches the door 106, all subsequent intent actionsmay be ignored for a period of time.

In another example, if the lock device 102 does not sense the mobiledevice 104 approach relatively close to the door 106 before detectingthe intent action, the lock device 102 may ignore or disable recognizingintent actions for a period of time.

In yet another example, the lock device 102 may ensure that the mobiledevice 104 does not come closer to the lock device 102 and then movefurther away from the lock device 102, which may in turn indicate thatthe user does not wish to access the area protected by the door 106.

In another example, the lock device 102 may be configured to require twoor more intent actions to signify intent within a predeterminedtimeframe of one another.

Other types of criteria, are also contemplated. If the other criteriaare satisfied, process 300 proceeds from operation 314 to operation 316.If the other criteria. are not satisfied, process 300 proceeds fromoperation 314 to operation 302.

At operation 316, the lock device 102 unlocks the lock mechanism 103 toallow the user of the mobile device 104 access to the area protected bythe door 106.

It is contemplated that in some embodiments, the mobile device 104 maybe considered to be the credential 112.

While the invention has been illustrated and described in detail in thedrawings and foregoing description, the same is to be considered asillustrative and not restrictive in character, it being understood thatonly certain exemplary embodiments have been shown and described andthat all changes and modifications that come within the spirit of theinventions are desired to be protected.

In reading the claims, it is intended that when words such as “a,” “an,”“at least one,” or “at least one portion” are used there is no intentionto limit the claim to only one item. unless specifically stated to thecontrary in the claim. When the language “at least a portion” and/or “aportion” is used the item can include a portion and/or the entire itemunless specifically stated to the contrary.

1. A method, comprising: receiving, with a lock device, a credentialfrom a mobile device; monitoring, with the lock device, a distance ofthe mobile device from the lock device; detecting, with the lock device,an intent action by a user of the mobile device; and unlocking the lockdevice if the mobile device is within a predetermined distance from thelock device and the intent action is an approved intent action.
 2. Themethod of claim 1, wherein the lock device and the mobile devicecommunicate via Bluetooth communication.
 3. The method of claim 1,wherein the mobile device is a smartphone.
 4. The method of claim 1,wherein the credential must be received by the lock device before theintent action is detected by the lock device in order for the lockdevice to unlock.
 5. The method of claim 1, wherein the credential mustbe received and the intent action must be detected within apredetermined timeframe.
 6. The method of claim 1, wherein the lockdevice includes an accelerometer structured to detect the intent actionof the user.
 7. The method of claim 1, wherein the intent actionincludes at least one of rotating a lever, pressing a thumbpiece on thelock device, kicking a door, knocking on the door, and bumping a car keyfob to the door.
 8. The method of claim 1, further comprising: ignoringall subsequent intent actions for a period of time if a first intentaction was received by the lock device before the credential.
 9. Themethod of claim 1, wherein the lock device is structured to require twoor more intent actions within a predetermined period of time to unlock.10. An apparatus, comprising: a lock device configured to receive acredential from a mobile device, monitor a distance between the mobiledevice and the lock device, detect an intent action by a user of themobile device, and unlock a lock mechanism of the lock device if themobile device is within a predetermined distance from the lock deviceand the intent action is an approved intent action.
 11. The apparatus ofclaim 10, wherein the lock device and the mobile device communicate viaBluetooth communication.
 12. The apparatus of claim 10, wherein thecredential must be received by the lock device before the intent actionis detected by the lock device in order for the lock device to unlock.13. The apparatus of claim 10, wherein the credential must be receivedand the intent action must be detected within a predetermined timeframe.14. The apparatus of claim 10, wherein the lock device includes anaccelerometer structured to detect the intent action of the user. 15.The apparatus of claim 10, wherein the intent action includes at leastone of rotating a lever, pressing a thumbpiece on the lock device,kicking a door, knocking on the door, and bumping a car key fob to thedoor.
 16. The apparatus of claim 10, wherein the lock device is furtherconfigured to ignore all subsequent intent actions for a period of timeif a first intent action was received by the lock device before thecredential.
 17. The apparatus of claim 10, wherein the lock device isstructured to require two or more intent actions within a predeterminedperiod of time to unlock.
 18. A system, comprising: a smartphone; and alock device configured to receive a credential from the smartphone,monitor a distance between the smartphone and the lock device utilizinga received signal strength indicator, detect an intent action by a userof the smartphone utilizing an accelerometer, and unlock a lockmechanism of the lock device if the smartphone is within a predetermineddistance from the lock device and the intent action is an approvedintent action.
 19. The system of claim 18, wherein the intent actionincludes at least one of rotating a lever, pressing a thumbpiece on thelock device, kicking a door, knocking on the door, and bumping a car keyfob to the door.
 20. The system of claim 18, Wherein the smartphone isthe credential.