Door lock system with one or more virtual fences

ABSTRACT

An intelligent door lock system is coupled to a door at a dwelling. A sensor is at the dwelling. The sensor is coupled to a drive shaft of a lock device to assist in locking and unlocking a lock of a lock device at the door. The lock device is coupled to the sensor and includes a bolt. An engine, an energy source and a memory are coupled together. A camera is coupled to or part of the intelligent door lock system. The camera is configured to define a safe zone in the dwelling in which an occupant, and a non dwelling occupant third person is allowed into the dwelling.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the priority benefit of all of the following:U.S. Provisional Patent Application No. 62/481,797, filed Apr. 5, 2017,a Continuation in part of patent application Ser. No. 15/497,327 filedApr. 26, 2017, which is a Continuation in part of patent applicationSer. No. 15/463,022, filed Mar. 20, 2017, which is a Continuation inpart of patent application Ser. No. 15/410,845, filed Jan. 20, 2017,which is a Continuation of patent application Ser. No. 15/066,210, filedMar. 10, 2016, which is a Continuation of patent application Ser. No.14/205,608, filed Mar. 12, 2014, which is a U.S. Provisional PatentApplication No. 61/800,937, filed Mar. 15, 2013, which is a U.S.Provisional Patent Application No. 61/801,335, filed Mar. 15, 2013,which is a U.S. Provisional Patent Application No. 61/801,294, filedMar. 15, 2013, which is a Continuation of patent application Ser. No.14/205,783, filed Mar. 12, 2014, which is a Continuation of patentapplication Ser. No. 14/205,973, filed Mar. 12, 2014, which is aContinuation of patent application Ser. No. 14/206,536, filed Mar. 12,2014, which is a Continuation of patent application Ser. No. 14/206,619,filed Mar. 12, 2014, which is a Continuation of patent application Ser.No. 14/207,833, filed Mar. 13, 2014, which is a Continuation of patentapplication Ser. No. 14/207,882, filed Mar. 13, 2014, which is aContinuation of patent application Ser. No. 14/208,947, filed Mar. 13,2014, which is a Continuation of patent application Ser. No. 14/208,182,filed Mar. 13, 2014, which is a Continuation of patent application Ser.No. 14/212,569, filed Mar. 14, 2014, which is a Continuation-In-Part ofpatent application Ser. No. 14/321,260, filed Jul. 1, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/321,000, filedJul. 1, 2014, U.S. Provisional Patent Application No. 62/036,971, filedAug. 13, 2014, U.S. Provisional Patent Application No. 62/036,979, filedAug. 13, 2014, U.S. Provisional Patent Application No. 62/036,989, filedAug. 13, 2014, U.S. Provisional Patent Application No. 62/036,991, filedAug. 13, 2014, U.S. Provisional Patent Application No. 62/036,993, filedAug. 13, 2014, which is a Continuation-In-Part of patent applicationSer. No. 14/459,054, filed Aug. 13, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/461,177, filedAug. 15, 2014, which is a Continuation-In-Part of patent applicationSer. No. 14/465,513, filed Aug. 21, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/465,527 filedAug. 21, 2014, which is a Continuation-In-Part of patent applicationSer. No. 14/469,127, filed Aug. 26, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/469,186, filedAug. 26, 2014, which is a Continuation-In-Part of patent applicationSer. No. 14/471,414, filed Aug. 28, 2014, which is aContinuation-In-Part of patent application Ser. No. 14/471,470, filedAug. 28, 2014, which is a Continuation-In-Part of patent applicationSer. No. 14/622,054, filed Feb. 13, 2015, which is aContinuation-In-Part of patent application Ser. No. 14/622,192, filedFeb. 13, 2015, which is a Continuation-In-Part of patent applicationSer. No. 14/622,578, filed Feb. 13, 2015, which is aContinuation-In-Part of patent application Ser. No. 14/622,396, filedFeb. 13, 2015, which is a Continuation-In-Part of patent applicationSer. No. 14/622,654, filed Feb. 13, 2015, which is a Continuation ofpatent application Ser. No. 14/730,848, filed Jun. 4, 2015, which is aContinuation-In-Part of patent application Ser. No. 14/731,092, filedJun. 4, 2015, which is a Continuation-In-Part of patent application Ser.No. 14/732,290, filed Jun. 5, 2015, which is a Continuation-In-Part ofpatent application Ser. No. 14/796,994, filed Jul. 10, 2015, which is aContinuation of patent application Ser. No. 15/065,657, filed Mar. 9,2016, which is a Continuation-In-Part of patent application Ser. No.15/066,091, filed Mar. 10, 2016.

FIELD OF THE INVENTION

This invention relates generally to door lock systems, and moreparticularly to an intelligent door lock system coupled to or includinga camera configured to define a safe zone in which an occupant, a nondwelling occupant third person and the like, is allowed into thedwelling.

DESCRIPTION OF THE RELATED ART

Existing security systems for homes and commercial properties featuremultiple video camera connected to a security box. The security boxcontains electronics to convert analog video and optional audio inputsto digital and performs audio and video compression by a System-On-Chip(SoC) processor, which then stores the results on a hard disk. Thesystem could be programmed for continuous recording in a loop, recordingupon a trigger caused by external alarm and scene change threshold, ortimed scheduled recording. The cameras are connected by cabling andvideo is transmitted as analog to the main system. Such cabling makes itdifficult to install the multiple cameras inside and outside a residenceor commercial because of routing of such long cabling between a dwellinguser, resource owner, or end-user, resource owner, or end-useraccessible box and cameras. Such a system provides 240 frames-per-secondcapture, which is divided by multiple cameras. For an 8-camera system,each camera video is captured at 240/8, or 30 fps, but captureresolution is usually low at CIF resolution (350×240). Such a securitybox can display captured video live from cameras or from hard disk on amonitor or TV, and dwelling user, resource owner, or end-user, resourceowner, or end-user functions are controlled by front-panel buttons or aninfrared remote-control unit (RCU). This means such a security box mustbe located near a TV and be visible for RCU operation. Such a systemalso provides means for remote viewing over internet, and can also sendemail messages with some snap shots of video when an alarm triggeroccurs. However, there is much vulnerability in such a system. Ifinternet is not working at the time of intrusion because phone orinternet cables are externally cut, then no such email could be send.Thief can easily remove or damage the whole security box which removesall security data.

Another existing video security systems use networked security basedwhere multiple camera units are connected to a PC or laptop computerover local area network or wide-area network. For example, 9 wirelesscamera units can connect to a PC computer using Ethernet wires or 802.11wireless communications. Each camera unit contains video camera, videocompression, and network interface in this case. Existing systems useJPEG or MPEG-2 or MPEG-4 systems, but in the future this will probablyextend to advanced H.264 video compression standard as well in newdesigns. If there is no local computer, it is also possible to connectthe cameras to a router connected to a WAN gateway, so that multiplesecurity video channels could be streamed to a remote PC or laptop. Theremote PC or laptop could perform remote viewing or recording of one ormultiple channels on its hard disk storage. One of the disadvantages ofsuch a security system is that if internet access deliberatelyinterrupted at the time of a security event, then it is not possible tostream the data for the event to the remote PC for recording.

If the PC is located locally, then it could easily be removed by theperpetrators. Furthermore, such a system requires continuous stream ofmultiple video streams over local and wide area networks, which places aconsiderably load on such networks, thus causing unreliable operationsand slowing other network activity. Cabled systems using Ethernetcabling also require difficult cabling of multiple camera units. Unitsconfigured to use 802.11 g systems contend bandwidth collisions withother systems, cordless phone, wireless microwaves, and other wirelesscommunication systems on a limited number of channels. Thus, it becomesdifficult and unreliable to transfer plurality of live compressed videostream in real-time without interruptions. However, such systems consumeenergy.

There is a need for an intelligent door lock system. There is a furtherneed for an improved intelligent door lock system.

SUMMARY

An object of the present invention is to provide an intelligent doorlock system coupled to or including a camera configured to define a safezone in a dwelling in which an occupant, a non dwelling occupant thirdperson and the like, is allowed into a dwelling.

Another object of the present invention is to provide an intelligentdoor lock system coupled to or including a camera configured to define asafe zone in a dwelling delimited by one or more virtual fences.

A further object of the present invention is to provide an intelligentdoor lock system coupled to or including a camera configured to define asafe zone in a dwelling delimited by one or more virtual fences that inthe event the one or more virtual fences are broken, different alertscan be activated.

A further object of the present invention is to provide an intelligentdoor lock system coupled to or including a camera configured to define asafe zone in a dwelling delimited by one or more virtual fences that inthe event the one or more virtual fences are broken, different alertscan be activated.

Still another object of the present invention is to provide anintelligent door lock system coupled to or including a camera configuredto define a safe zone in a dwelling delimited by one or more virtualfences that when breached can provide notification to an occupant'smobile device, vocal warning, a communication with authorities, and thelike.

Yet another object of the present invention is to provide an intelligentdoor lock system coupled to or including a camera configured to define asafe zone in a dwelling delimited by one or more virtual fences that candefine multiple concentric zones.

Another object of the present invention is to provide an intelligentdoor lock system coupled to or including a camera configured to define asafe zone in a dwelling delimited by one or more virtual fencesconfigured to track a dwelling occupant, a non-occupant granted accessto the dwelling by the occupant, including but not limited to a deliveryperson, housekeeper and the like.

A further object of the present invention is to provide an intelligentdoor lock system coupled to or including a camera configured to define asafe zone in a dwelling delimited by one or more virtual fences thatwhen broken allows tracking of a movement as either towards a door oraway from the door of the dwelling

Still another object of the present invention is to provide anintelligent door lock system coupled to or including a camera configuredto define a safe zone in a dwelling delimited by one or more virtualfences, where breaking a first fence 814 can result in a vocal warning,breaking a second fence can result in an alarm being activated, andbreaking a third fence can result in a call to authorities.

These and other objects of the present invention are achieved in anintelligent door lock system coupled to a door at a dwelling. A sensoris at the dwelling. The sensor is coupled to a drive shaft of a lockdevice to assist in locking and unlocking a lock of a lock device at thedoor. The lock device is coupled to the sensor and includes a bolt. Anengine, an energy source and a memory are coupled together. A camera iscoupled to or part of the intelligent door lock system. The camera isconfigured to define a safe zone in the dwelling in which an occupant,and a non dwelling occupant third person is allowed into the dwelling.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A is an exploded view of a mounting assembly of an intelligentdoor lock device that can be used with the present invention.

FIG. 1B illustrates various embodiments of a positioning sensing devicecoupled to a drive shaft.

FIG. 1C illustrates one embodiment of a door lock device that can beused for retrofitting with an embodiment of an intelligent door lockdevice of the present invention.

FIG. 1D illustrates coupling of a positioning sensing device with adrive shaft of a door lock device.

FIG. 1E illustrates one embodiment of an intelligent door lock system ofthe present invention with an off-center drive.

FIG. 1F illustrates a wireless bridge that can be used in one embodimentof the present invention.

FIG. 1G illustrates one embodiment of elements coupled to a circuit inone embodiment of the present invention, including a haptic device.

FIGS. 2A-C illustrate embodiments of front and back surfaces of a maincircuit that can be used and included in the intelligent door lockdevice of the present invention.

FIGS. 2D-F illustrate an embodiment of non-wire, direct connectionbetween PCBAs in one embodiment of the present invention, with positionof a PCBA in intelligent door lock device.

FIGS. 3A-B illustrate embodiments of LED lighting that can be used withthe present invention.

FIGS. 4A-D illustrate one embodiment of a faceplate and views of ahousing that can be used with the present invention.

FIGS. 5A and B illustrate the rotation range, with a minimized slotlength of a faceplate lock that can be used in one embodiment of thepresent invention.

FIGS. 6A and B illustrate hook slots that can be used with the presentinvention.

FIGS. 7A through E illustrate one embodiment of a mount, with attachmentto the mounting plate that can be used with the present invention.

FIGS. 8A-B illustrate embodiments of the present invention where magnetsare utilized.

FIGS. 9A-E illustrate embodiments of the present invention with winglatches.

FIGS. 10A-C and FIGS. 11A-D illustrate further details of wing latchingthat is used in certain embodiments of the present invention.

FIGS. 12A-D illustrate embodiments of battery contacts that can be usedwith the present invention.

FIGS. 13A and B illustrate embodiments of a motor and gears in oneembodiment of the present invention.

FIG. 14 illustrates an embodiment of the plurality of motion transferdevice, including but not limited to gears, used in one embodiment ofthe present invention.

FIGS. 15A-B illustrate an embodiment of a speaker mounting.

FIGS. 15C-D illustrate an embodiment of an accelerometer FPC serviceloop.

FIG. 16 illustrates one embodiment of a back-end associated with theintelligent door lock system.

FIG. 17 is a diagram illustrating an implementation of an intelligentdoor lock system.

FIGS. 18A and B illustrate one embodiment of the present invention witha front view and a back view of a door with a bolt and an intelligentdoor lock system.

FIG. 19 illustrates more details of an embodiment of an intelligent doorlock system of the present invention.

FIG. 20 illustrates one embodiment of the present invention showing aset of interactions between an intelligent door lock system, a mobile orcomputer and an intelligent door lock system back-end.

FIG. 21A-21G are examples of a dwelling user, resource owner, orend-user, resource owner, or end-user interface for an owner of abuilding that has an intelligent door lock system in one embodiment ofthe present invention.

FIGS. 22A-22E are examples of a dwelling user, resource owner, orend-user, resource owner, or end-user interface for a guest of an ownerof a building that has an intelligent door lock system in one embodimentof the present invention.

FIGS. 23A and B illustrate one embodiment of an intelligent door locksystem with an empty extension and extension gear adapters.

FIG. 24 illustrates one embodiment of a mobile device that is used withthe intelligent door lock system.

FIGS. 25A-E represent a logical diagram of a Cloud lock access servicesInfrastructure in accordance with one embodiment of the presentinvention.

FIG. 26 illustrates one embodiment of inputs and outputs.

FIG. 27 shows one embodiment of a flowchart illustrating an example of aprocess for tracking signal strength.

FIG. 28 is a flowchart illustrating another example of a process fortracking signal strength.

FIG. 29 illustrates one embodiment of a triangulation algorithm forlocation estimation that can be used with the bridge.

FIG. 30 illustrates one embodiment of a K-nearest neighbor averagingalgorithm for location estimate that can be used with the bridge.

FIG. 31 illustrates one embodiment for triangulation where a smallestm-polygon algorithm is used for location estimate

FIG. 32 an overview of the selfloc algorithm to fuse three informationsources 1, 2 and 3.

FIG. 33 illustrates one embodiment of a dwelling user, resource owner,or end-user security system of the present invention.

FIG. 34 illustrates one embodiment of a dwelling user, resource owner,or end-user security system of the present invention that includes anauthorization sensing device (motion detection device).

FIG. 35 illustrates one embodiment of a Bluetooth/WiFi bridge of thepresent invention.

FIG. 36 illustrates one embodiment of the intelligent door lock systemserver and/or cloud based server that provides access to a dwellinguser, resource owner, or end-user.

FIG. 37 is a diagram illustrating operation of an automatic unlock inone embodiment of the present invention.

FIG. 38 illustrates one embodiment of security system coupled to a doorlock system.

FIG. 39 illustrates one embodiment of the intelligent door lock systemwith a magnetometer.

FIG. 40 illustrates one embodiment of a magnetometer reader with a doorbeing opened.

FIGS. 41A-D illustrate one embodiment of a calculated door angel Q usingtwo sensor readings.

FIG. 42 illustrates one embodiment of an intelligent door lock systemwith a magnet placed on a door frame.

FIG. 43 illustrate one embodiment of combining ajar and lock statusinformation to evaluate if a dwelling is secured.

FIG. 44 illustrates one embodiment of the intelligent door lock systemwith a wide view camera.

FIGS. 45 and 46 illustrate one embodiment of the intelligent door locksystem configured to define a safe zone in which an occupant, a nondwelling occupant third person and the like, is allowed into thedwelling.

DETAILED DESCRIPTION

As used herein, the term engine refers to software, firmware, hardware,other component that can be used to effectuate a purpose, servingcomputing and the like. The engine will typically include softwareinstructions that are stored in non-volatile memory (also referred to assecondary memory). When the software instructions are executed, at leasta subset of the software instructions can be loaded into memory (alsoreferred to as primary memory) by a processor. The processor thenexecutes the software instructions in memory. The processor may be ashared processor, a dedicated processor, or a combination of shared ordedicated processors. A typical program will include calls to hardwarecomponents (such as I/O devices), which typically requires the executionof drivers. The drivers may or may not be considered part of the engine,but the distinction is not critical.

As used herein, the term database is used broadly to include any knownor convenient means for storing data, whether centralized ordistributed, relational or otherwise.

As used herein a mobile device includes, but is not limited to, a cellphone, such as Apple's iPhone®, other portable electronic devices, suchas Apple's iPod Touches®, Apple's iPads®, and mobile devices based onGoogle's Android® operating system, and any other portable electronicdevice that includes software, firmware, hardware, or a combinationthereof that is capable of at least receiving the signal, decoding ifneeded, exchanging information with a server to verify information.Typical components of mobile device may include but are not limited topersistent memories like flash ROM, random access memory like SRAM, acamera, a battery, LCD driver, a display, a cellular antenna, a speaker,a Bluetooth® circuit, and WWI circuitry, where the persistent memory maycontain programs, applications, and/or an operating system for themobile device. A mobile device can be a key fob A key fob which can be atype of security token which is a small hardware device with built inauthentication mechanisms. It is used to manage and secure access tonetwork services, data, provides access, communicates with door systemsto open and close doors and the like.

As used herein, the term “computer” or “mobile device or computingdevice” is a general purpose device that can be programmed to carry outa finite set of arithmetic or logical operations. Since a sequence ofoperations can be readily changed, the computer can solve more than onekind of problem. A computer can include of at least one processingelement, typically a central processing unit (CPU) and some form ofmemory. The processing element carries out arithmetic and logicoperations, and a sequencing and control unit that can change the orderof operations based on stored information. Peripheral devices allowinformation to be retrieved from an external source, and the result ofoperations saved and retrieved.

As used herein, the term “Internet” is a global system of interconnectedcomputer networks that use the standard Internet protocol suite (TCP/IP)to serve billions of users worldwide. It is a network of networks thatconsists of millions of private, public, academic, business, andgovernment networks, of local to global scope, that are linked by abroad array of electronic, wireless and optical networking technologies.The Internet carries an extensive range of information resources andservices, such as the inter-linked hypertext documents of the World WideWeb (WWW) and the infrastructure to support email. The communicationsinfrastructure of the Internet consists of its hardware components and asystem of software layers that control various aspects of thearchitecture, and can also include a mobile device network, e.g., acellular network.

As used herein, the term “extranet” is a computer network that allowscontrolled access from the outside. An extranet can be an extension ofan organization's intranet that is extended to users outside theorganization that can be partners, vendors, and suppliers, in isolationfrom all other Internet users. An extranet can be an intranet mappedonto the public Internet or some other transmission system notaccessible to the general public, but managed by more than one company'sadministrator(s). Examples of extranet-style networks include but arenot limited to:

LANs or WANs belonging to multiple organizations and interconnected andaccessed using remote dial-up

LANs or WANs belonging to multiple organizations and interconnected andaccessed using dedicated lines

Virtual private network (VPN) that is comprised of LANs or WANsbelonging to multiple organizations, and that extends usage to remoteusers using special “tunneling” software that creates a secure, usuallyencrypted network connection over public lines, sometimes via an ISP

As used herein, the term “Intranet” is a network that is owned by asingle organization that controls its security policies and networkmanagement. Examples of intranets include but are not limited to:

A LAN

A Wide-area network (WAN) that is comprised of a LAN that extends usageto remote employees with dial-up access

A WAN that is comprised of interconnected LANs using dedicatedcommunication lines

A Virtual private network (VPN) that is comprised of a LAN or WAN thatextends usage to remote employees or networks using special “tunneling”software that creates a secure, usually encrypted connection over publiclines, sometimes via an Internet Service Provider (ISP)

For purposes of the present invention, the Internet, extranets andintranets collectively are referred to as (“Network Systems”).

For purposes of the present invention, Bluetooth LE devices andperipheral devices are Bluetooth low energy devices, marketed asBluetooth Smart.

For purposes of the present invention, “third party access to a dwellinguser, resource owner, or end-user, which can be programmatic” isauthorized access to the dwelling user, resource owner, or end-user, andcan be secured access, granted by an occupant or owner or end-user ofthe dwelling user, resource owner, or end-user. In one embodiment theaccess is access via an intelligent door lock system as describedherein. In one embodiment the third party secured access to the dwellinguser, resource owner, or end-user, which can by programmatic, is grantedby the occupant or owner, or end-dwelling user, resource owner, orend-user of a dwelling user, resource owner, or end-user to a serviceprovider, that can be multi-tiered, and used for only one time, multipletimes, recurring times, set times, changeable times, and can berevocable, and the like. In one embodiment the access is a securedaccess, and in one embodiment it is authenticated with authorizationprovided to access the dwelling user, resource owner, or end-user via alock of an intelligent door lock system, and it can include authorizedresetting of the lock.

For purposed of the present invention, the term “service provider” meansorganizations and individuals that provide services for a dwelling user,resource owner, or end-user or occupant at a dwelling user, resourceowner, or end-user. The services provided can include, any maintenanceof the dwelling user, resource owner, or end-user, delivery and thepick-up of items to and from a dwelling user, resource owner, orend-user, services related to dwelling user, resource owner, orend-users and dwelling user, resource owner, or end-user occupants,including but not limited to craftspeople, housekeeping services,laundry and dry-cleaning, skilled laborers, unskilled laborers deliverypeople, childcare, housekeeping, hairstyling & barbering, makeup andbeauty, laundry and dry-cleaning, pet sitting, pet training, funeralservices, pet grooming, tailoring, delivery of packages and other itemsfrom delivery companies, the U.S. Post Office, the delivery of householditems including groceries and the like. A service provider can be anindividual, an organization, including but not limited to one with morethan a single person such as a corporation, a DBA, partnership, and thelike with multiple layers of management and multiple layers of providersfrom a CEO down to a an individual that performs an actual activity atthe dwelling user, resource owner, or end-user. An occupant or owner orend-user of a dwelling user, resource owner, or end-user can grant theservice provider access to a corporation or organization, which cangrant access to its employees, contractors, consultants, and the like,all of which can be revoked by the corporation or organization relativeto the a person given dwelling user, resource owner, or end-user access,maintain records in a database regarding dwelling user, resource owner,or end-user access dates, times, and the like, all of which can beaudited, videoed, monitored and maintained by the service providerand/or the occupant or owner or end-user of the dwelling user, resourceowner, or end-user, which can revoke at any times access to the dwellinguser, resource owner, or end-user.

In one embodiment of the present invention a dwelling user, resourceowner, or end-user security system 11A is provided with a camera coupledto a WiFi/BTLE a cellular/BTLE bridge 11 or more generally a long rangenetworking/low power short range networking bridge 11.

In one embodiment the present invention provides an improved dwellinguser, resource owner, or end-user security system.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11 and wireless camera.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a camerasystem which is fully wireless, powered by batteries, and has theperformance and endurance necessary to ensure a dwelling user, resourceowner, or end-user's entry is properly secured.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11 and wireless camera (10C), where the camera can be activatevia any internet connected device.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11, wireless camera and a sensor.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that can include a WiFibridge 11, a wireless camera 10C, and a sensor selected from at leastone of a doorbell, occupancy sensor, entry keypad, touch sensor,pressure sensor, mobile device phone, Keyfob/card and sensor. In oneembodiment wireless camera 10C and a motion detection device 10G areintegrated as one unit, or are at least in communication with eachother.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11 and a wireless camera 10C that does not need a communicationcable or external power.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11 and a battery powered wireless camera.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11, a wireless camera 10C and an intelligent door lock system 10.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11, a wireless camera 10C and an intelligent door lock system 10that is configured to confirm delivery of items to the dwelling user,resource owner, or end-user.

In one embodiment the present invention provides a dwelling user,resource owner, or end-user security system 11A that includes a WiFibridge 11, a wireless camera 10C and an intelligent door lock system 10that is configured to allow entrance into the dwelling user, resourceowner, or end-user of a person delivering item to the dwelling user,resource owner, or end-user.

The specific embodiments of the dwelling user, resource owner, orend-user security system 11A of the present invention are discussedhereafter.

The Intelligent Lock

Referring to FIG. 1A in one embodiment the door lock system 10 includesa vibration/tapping sensing device 11 configured to be coupledintelligent lock system 10. In one embodiment the intelligent door locksystem 10 is in communication with a mobile device that includes avibration/taping sensing device to lock or unlock a door associated withthe intelligent door lock system 10.

In one embodiment the vibration/tapping sensing device 11 sensesknocking on the door and locks or unlocks the door. In one embodimentthe vibration/tapping sensing device 11 is not included as part of theactual intelligent door lock system. In one embodiment thevibration/tapping sensing device 11 is coupled to the drive shaft 14. Itwill be appreciated that the vibration/tapping sensing device 11 can becoupled to other elements of the intelligent door lock system 10. Thevibration/tapping sensing device detects vibration or knocking appliedto a door that is used to unlock or lock the intelligent door locksystem 10. This occurs following programming the intelligent door locksystem 10. The programming includes a user's vibration code/pattern, andthe like. Additionally, a dwelling user, resource owner, or end-user,resource owner, or end-user can give a third person a knock code/patternto unlock the intelligent door lock system of the door. The knocking isone that is recognized as having been defined by a user of the door locksystem as a means to unlock the door. The knocking can have a variety ofdifferent patterns, tempos, duration, intensity and the like.

The vibration/tapping sensing device 11 detects oscillatory motionresulting from the application of oscillatory or varying forces to astructure. Oscillatory motion reverses direction. The oscillation may becontinuous during some time period of interest or it may beintermittent. It may be periodic or nonperiodic, i.e., it may or may notexhibit a regular period of repetition. The nature of the oscillationdepends on the nature of the force driving it and on the structure beingdriven.

Motion is a vector quantity, exhibiting a direction as well as amagnitude. The direction of vibration is usually described in terms ofsome arbitrary coordinate system (typically Cartesian or orthogonal)whose directions are called axes. The origin for the orthogonalcoordinate system of axes is arbitrarily defined at some convenientlocation.

In one embodiment, the vibratory responses of structures can be modeledas single-degree-of-freedom spring mass systems, and many vibrationsensors use a spring mass system as the mechanical part of theirtransduction mechanism.

In one embodiment the vibration/tapping sensing device 11 can measuredisplacement, velocity, acceleration, and the like.

A variety of different vibration/tapping sensing devices 11 can beutilized, including but not limited to accelerometers, optical devices,electromagnetic and capacitive sensors, contact devices, transducers,displacement transducers, piezoelectric sensors, piezoresistive devices,variable capacitance, servo devices, audio devices where transfer of thevibration can be gas, liquid or solid, including but not limited tomicrophones, geo-phones, and the like.

Suitable accelerometers include but are not limited to: Piezoelectric(PE); high-impedance output; Integral electronics piezoelectric (IEPE);low-impedance output Piezoresistive (PR); silicon strain gauge sensorVariable capacitance (VC); low-level, low-frequency Servo force balance;and the like.

The vibration/tapping sensing device 11 can be in communication with anintelligent door lock system back-end 68, via Network Systems, as morefully described hereafter.

In one embodiment, the intelligent door lock system 10 is configured tobe coupled to a structure door 12, including but not limited to a house,building and the like, window, locked cabinet, storage box, bike,automobile door or window, computer locks, vehicle doors or windows,vehicle storage compartments, and the like. In one embodiment, theintelligent door lock system 10 is coupled to an existing drive shaft 14of a lock device 22 already installed and is retrofitted to all or aportion of the lock device 22, which includes a bolt/lock 24. In anotherembodiment, the intelligent door lock system 10 is attached to a door12, and the like, that does not have a pre-existing lock device. FIG. 1Billustrates door lock elements that can be at an existing door, toprovide for the mounting of the intelligent door lock system 10 with anexisting lock device 22.

FIG. 1B illustrates door lock elements that can be at an existing door,to provide for the mounting of the intelligent door lock system 10 withan existing lock device 22.

FIG. 1B illustrates one embodiment of a lock device 22 that can bepre-existing at a door 10 with the intelligent door lock system 10retrofitted to it. Components of the lock device 22 may be included withthe intelligent door lock device 10, as more fully discussed hereafter.

In one embodiment, the intelligent door lock system 10 includes apositioning sensing device 16, a motor 38, an engine/processor 36 with amemory and one or more wireless communication devices 40 coupled to acircuit 18. The motor 38 converts any form of energy into mechanicalenergy. As a non-limiting example, three more four wirelesscommunications devices 40 are in communication with circuit 18. In oneembodiment the vibration sensing device can be included with thepositioning sensing device.

In one embodiment, the intelligent door lock system 10 is provided withthe position sensing device 16 configured to be coupled to the driveshaft 14 of the lock device 22. The position sensing device 16 sensesposition of the drive shaft 14 and assists in locking and unlocking thebolt/lock 24 of the lock device 22. The engine 36 is provided with amemory. The engine 36 is coupled to the positioning sensing device 16. Acircuit 18 is coupled to the engine 36 and an energy source 50 iscoupled to the circuit. A device 38 converts energy into mechanicalenergy and is coupled to the circuit 18, positioning sensing device 16and the drive shaft 14. Device 38 is coupled to the energy source 50 toreceive energy from the energy source 50, which can be via the circuit18.

In one embodiment, the intelligent door lock system 10 includes any orall of the following, a face plate 20, ring 32, latches such as winglatches 37, adapters 28 coupled to a drive shaft 14, one or moremounting plates 26, a back plate 30, a power sensing device 46, energysources, including but not limited to batteries 50, and the like.

In one embodiment (see FIG. 1C), the intelligent door lock system 10retrofits to an existing lock device 22 already installed and in placeat a door 12, and the like. The existing lock device 12 can include oneor more of the following elements, drive shaft 14, a lock device 22 withthe bolt/lock 24, a mounting plate 26, one or more adapters 28 fordifferent lock devices 22, a back plate 30, a plurality of motiontransfer devices 34, including but not limited to, gears 34, and thelike.

In one embodiment, the memory of engine/processor 36 includes states ofthe door 12. The states are whether the door 12 is a left handed mounteddoor, or a right handed mounted door, e.g., opens from a left side or aright side relative to a door frame. The states are used with theposition sensing device 16 to determine via the engine/processor 36 ifthe lock device 22 is locked or unlocked.

In one embodiment, the engine/processor 36 with the circuit 18 regulatesthe amount of energy that is provided from energy source 50 to the motor38. This thermally protects the motor 38 from receiving too much energyand ensures that the motor 38 does not overheat or become taxed.

FIG. 1D illustrates various embodiments of the positioning sensingdevice 16 coupled to the drive shaft 14.

A variety of position sensing devices 16 can be used, including but notlimited to, accelerometers, optical encoders, magnetic encoders,mechanical encoders, Hall Effect sensors, potentiometers, contacts withticks, optical camera encoders, and the like.

As a non-limiting example, an accelerometer 16, well known to thoseskilled in the art, detects acceleration. The accelerometer 16 providesa voltage output that is proportional to a detected acceleration.Suitable accelerometers 16 are disclosed in, U.S. Pat. Nos. 8,347,720,8,544,326, 8,542,189, 8,522,596. EP0486657B1, EP 2428774 A1,incorporated herein by reference.

In one embodiment, the position sensing device 16 is an accelerometer16. Accelerometer 16 includes a flex circuit coupled to theaccelerometer 16. The accelerometer reports X, Y, and X axis informationto the engine/processor 36 of the drive shaft 14. The engine/processor36 determines the orientation of the drive shaft 14, as well as doorknocking, bolt/lock 24 position, door 12 close/open (action) sensing,manual key sensing, and the like, as more fully explained hereafter.

Suitable optical encoders are disclosed in U.S. Pat. Nos. 8,525,102,8,351,789, and 8,476,577, incorporated herein by reference.

Suitable magnetic encoders are disclosed in U.S. Publication20130063138, U.S. Pat. No. 8,405,387, EP2579002A1, EP2642252 A1,incorporated herein by reference.

Suitable mechanical encoders are disclosed in, U.S. Pat. No. 5,695,048,and EP2564165A2, incorporated herein by reference.

Suitable Hall Effect sensors are disclosed in, EP2454558B1 andEP0907068A1, incorporated herein by reference.

Suitable potentiometers are disclosed in, U.S. Pat. No. 2,680,177,EP1404021A3, CA2676196A1, incorporated herein by reference.

In various embodiments, the positioning sensing device 16 is coupled tothe drive shaft 14 by a variety of means, including but not limited tothe adapters 28. In one embodiment, the position sensing device 16 usesa single measurement, as defined herein, of drive shaft 14 positionsensing which is used to determine movement in order the determine thelocation of the drive shaft 14 and the positioning sensing device 16.The exact position of the drive shaft 14 can be measured with anothermeasurement without knowledge of any previous state. Single movement,which is one determination of position sensing, is the knowledge ofwhether the door 12 is locked, unlocked or in between. One advantage ofthe accelerator is that one can determine position, leave if off, comeback at a later time, and the accelerometer 16 will know its currentposition even if it has been moved since it has been turned off. It willalways know its current position.

In one embodiment, the positioning sensing device 16 is directly coupledto the drive shaft 14, as illustrated in FIG. 1D. Sensing position ofthe positioning sensing device 16 is tied to the movement of the driveshaft 14. In one embodiment with an accelerometer 16, the accelerometer16 can detect X, Y and Z movements. Additional information is thenobtained from the X, Y, and Z movements. In the X and Y axis, theposition of the drive shaft 14 is determined; this is true even if thedrive shaft 14 is in motion. The Z axis is used to detect a variety ofthings, including but not limited to, door 12 knocking, picking of thelock, break-in and unauthorized entry, door 12 open and closing motion.If a mobile device 201 is used to open or close, the processor 36determines the lock state.

In one embodiment, the same positioning sensing device 16 is able todetect knocks by detecting motion of the door 12 in the Z axis. As anon-limiting example, position sensing is in the range of counter andclock wise rotation of up to 180 degrees for readings. The maximumrotation limit is limited by the position sensing device 16, and moreparticularly to the accelerometer cable. In one embodiment, the resultis sub 1° resolution in position sensing. This provides a higherlifetime because sampling can be done at a slower rate, due to knowingthe position after the position sensing device 16 has been turned offfor a time period of no great 100 milli seconds. With the presentinvention, accuracy can be enhanced taking repeated measurements. Withthe present invention, the positioning sensing device 16, such as theaccelerometer, does not need to consume additional power beyond what theknock sensing application already uses.

In one embodiment, the position sensing device 16 is positioned on thedrive shaft 14, or on an element coupled to the drive shaft 14. In oneembodiment, a position of the drive shaft 14 and power sensing deviceand/or a torque limited link 38 are known. When the position of thedrive shaft 14 is known, it is used to detect if the bolt/lock 24 of adoor lock device 22 is in a locked or unlocked position, as well as adepth of bolt/lock 24 travel of lock device 22, and the like. Thisincludes but is not limited to if someone, who turned the bolt/lock 24of lock device 22 from the inside using the ring 32, used the key toopen the door 12, if the door 12 has been kicked down, attempts to pickthe bolt/lock 24, bangs on the door 12, knocks on the door 12, openingand closing motions of the door 12 and the like. In various embodiments,the intelligent door lock system 10 can be interrogated via hardware,including but not limited to a key, a mobile device 201, a computer, keyfob, key cards, personal fitness devices, such as Fitbit®, nike fuel,jawbone up, pedometers, smart watches, smart jewelry, car keys, smartglasses, including but not limited to Google Glass, and the like.

During a power up mode, the current position of the drive shaft 14 isknown.

Real time position information of the drive shaft 14 is determined andthe bolt/lock 24 of lock device 22 travels can be inferred from theposition information of the drive shaft 14. The X axis is a directionalong a width of the door 12, the Y axis is in a direction along alength of a door 12, and the Z axis is in a direction extending from asurface of the door 12.

In one embodiment, the accelerometer 16 is the knock sensor. Knockingcan be sensed, as well as the number of times a door 12 is closed oropened, the physical swing of the door 12, and the motion the door 12opening and closing. With the present invention, a determination is madeas to whether or not someone successfully swung the door 12, if the door12 was slammed, and the like. Additionally, by coupling the positionsensing device 16 on the moveable drive shaft 14, or coupled to it, avariety of information is provided, including but not limited to, if thebolt/lock 24 is stored in the correct orientation, is the door 12properly mounted and the like.

In one embodiment, a calibration step is performed to determine theamount of drive shaft 14 rotations to fully lock and unlock thebolt/lock 24 of lock device 22. The drive shaft 14 is rotated in acounter-counter direction until it can no longer rotate, and the same isthen done in the clock-wise direction. These positions are then storedin the engine memory. Optionally, the force is also stored. A command isthen received to rotate the drive shaft 14 to record the amount ofrotation. This determines the correct amount of drive shaft 14 rotationsto properly lock and unlock the lock device 22.

In another embodiment, the drive shaft 14 is rotated until it does notmove anymore. This amount of rotation is then stored in the memory andused for locking and unlocking the lock device 22.

In another embodiment, the drive shaft 14 is rotated until it does notmove anymore. However, this may not provide the answer as to full lockand unlock. It can provide information as to partial lock and unlock.Records from the memory are then consulted to see how the drive shaft 14behaved in the past. At different intervals, the drive shaft 14 isrotated until it does not move anymore. This is then statisticallyanalyzed to determine the amount of drive shaft 14 rotation for fulllocking and unlocking. This is then stored in the memory.

In one embodiment, the engine/processor 36 is coupled to at least onewireless communication device 40 that utilizes audio and RFcommunication to communicate with a wireless device, including but notlimited to a mobile device/key fob 210, with the audio used tocommunicate a security key to the intelligent door lock system 10 fromthe wireless device 210 and the RF increases a wireless communicationrange to and from the at least one wireless communication device 40. Inone embodiment, only one wireless communication device 40 is used forboth audio and RF. In another embodiment, one wireless communicationdevice 40 is used for audio, and a second wireless communication device40 is used for RF. In one embodiment, the bolt/lock 22 is included inthe intelligent door lock system 10. In one embodiment, the audiocommunications initial set up information is from a mobile device/keyfob 210 to the intelligent door lock system 10, and includes at leastone of, SSID WiFi, password WiFi, a Bluetooth key, a security key anddoor configurations.

In one embodiment, an audio signal processor unit includes an audioreceiver, a primary amplifier circuit, a secondary amplifier circuit, acurrent amplifier circuit, a wave detection circuit, a switch circuitand a regulator circuit. In one embodiment, the audio receiver of eachsaid audio signal processor unit is a capacitive microphone. In oneembodiment, the switch circuit of each audio signal processor unit isselected from one of a transistor and a diode. In one embodiment, theregulator circuit of each audio signal processor unit is a variableresistor. In one embodiment, the audio mixer unit includes a leftchannel mixer and a right channel mixer. In one embodiment, theamplifier unit includes a left audio amplifier and a right audioamplifier. In one embodiment, the Bluetooth device includes a soundvolume control circuit with an antenna, a Bluetooth microphone and avariable resistor, and is electrically coupled with the left channelmixer and right channel mixer of said audio mixer unit. Additionaldetails are in U.S. Publication US20130064378 A1, incorporated fullyherein by reference.

In one embodiment, the faceplate 20 and/or ring 32 is electricallyisolated from the circuit 18 and does not become part of circuit 18.This allows transmission of RF energy through the faceplate 20. Invarious embodiments, the faceplate and/or ring are made of materialsthat provide for electrical isolation. In various embodiments, thefaceplate 20, and/or the ring 32 are at ground. As non-limitingexamples, (i) the faceplate 20 can be grounded and in non-contact withthe ring 32, (ii) the faceplate 20 and the ring 32 are in non-contactwith the ring 32 grounded, (iii) the faceplate 20 and the ring can becoupled, and the ring 32 and the faceplate 20 are all electricallyisolated from the circuit 18. In one embodiment, the ring 32 is theouter enclosure to the faceplate 20, and the bolt/lock 24 and lockdevice 22 is at least partially positioned in an interior defined by thering 32 and the faceplate 20.

In one embodiment, the lock device 22 has an off center drive mechanismrelative to the outer periphery that allows up to R displacements from acenter of rotation of the bolt/lock 24 of lock device 22, where R is aradius of the bolt/lock 24, 0.75 R displacements, 0.5 R displacements,and the like, as illustrated in FIG. 1E. The off center drive mechanismprovides for application of mechanical energy to the lock device 22 andbolt/lock 22 off center relative to the outer periphery.

As illustrated in FIG. 1F in one embodiment, a wireless communicationbridge 41 is coupled to a first wireless communication device 40 thatcommunicates with Network Systems via a device, including but notlimited to a router, a 3G device, a 4G device, and the like, as well asmobile device 210. The wireless communication bridge 41 is also coupledto a second wireless communication device 40 that is coupled to theprocessor 38, circuit 18, positioning sensing device 16, motor 38 andthe lock device 22 with bolt/lock 24, and provides for more localcommunication. The first wireless communication device 40 is incommunication with the second wireless communication device 40 viabridge 41. The second wireless communication device 40 provides localcommunication with the elements of the intelligent door lock system 10.In one embodiment, the second communication device 45 is a Bluetoothdevice. In one embodiment, the wireless communication bridge 41 includesa third wireless communication device 40. In one embodiment, thewireless communication bridge 41 includes two wireless communicationdevices 40, e.g., and third and fourth wireless communication devices40. In one embodiment, the wireless communication bridge 41 includes aWiFi wireless communication device 40 and a Bluetooth wirelesscommunication device 40.

FIG. 1G illustrates various elements that are coupled to the circuit 18in one embodiment of the present invention.

In one embodiment of the present invention, a haptic device 49 isincluded to provide the user with haptic feedback for the intelligentdoor lock system 10, see FIG. 1G. The haptic device is coupled to thecircuit 18, the processor 38, and the like. In one embodiment, thehaptic device provides a visual indication that the bolt/lock 24 of lockdevice 22 has reach a final position. In another embodiment, the hapticdevice 49 provides feedback to the user that the bolt/lock 24 of lockdevice 22 has reached a home open position verses a final position sothe dwelling user, resource owner, or end-user, resource owner, orend-user does not over-torque. A suitable haptic device 49 is disclosedin U.S. Publication No. 20120319827 A1, incorporated herein byreference.

In one embodiment, the wing latches 37 are used to secure theintelligent door lock system 10 to a mounting plate 26 coupled to thedoor 12. In one embodiment, the wing latches 37 secure the intelligentdoor lock system 10 to a mounting plate 26 coupled to a door 12 withoutadditional tools other than the wing latches 37.

FIG. 1G illustrates one embodiment of circuit 18, as well as elementsthat includes as part of circuit 18, or coupled to circuit 18, asdiscussed above.

FIGS. 2A-C illustrate front and back views of one embodiment of circuit18, and the positioning of circuit 18 in the intelligent door locksystem 10. FIGS. 2D-E illustrate an embodiment of non-wire, directconnection between PCBAs. FIG. 2E shows the relative positioning of aPCBA in the intelligent door lock device 10.

In one embodiment, the main circuit 18 is coupled to, the engine 36 witha processor and memory, the motor 38, wireless communication device 40such as a WiFi device including but not limited to a Bluetooth devicewith an antenna, position sensing device 16, \delete speaker(microphone) 17, temperature sensor 42, battery voltage sensor 44,current sensor or power sensor 46 that determines how hard the motor 38is working, a protection circuit to protect the motor from overheating,an LED array 48 that reports status and one or more batteries 50 thatpower circuit 18, see FIG. 1G.

The current sensor 46 monitors the amount of current that goes to themotor 38 and this information is received and processed by theengine/processor 36 with memory and is coupled to the circuit 18. Theamount of current going to the motor 38 is used to determine the amountof friction experienced by door 12 and/or lock device 22 with lock/bolt24 in opening and/or closing, as applied by the intelligent door locksystem 10 and the positioning sensing device 16 to the drive shaft 14.The circuit 18 and engine/processor 36 can provide for an adjustment ofcurrent. The engine/processor 36 can provide information regarding thedoor and friction to the dwelling user, resource owner, or end-user,resource owner, or end-user of the door 12.

FIGS. 3A-B illustrate embodiments of LED 48 lighting that can includediffusers, a plurality of LED patterns point upward, inward, and outwardand a combination of all three. In one embodiment two control PCDs areprovide to compare side by side. Each LED 48 can be independentlyaddressable to provide for maximization of light with the fewest LEDs48. In one embodiment, an air gap is provided.

FIGS. 4A-D, illustrate one embodiment of a faceplate 20 and views of thehousing 32 and faceplate 20.

FIGS. 5A and B illustrate the rotation range of the ring 32, with aminimized slot length of a bolt/lock 24 of lock device 22 in oneembodiment of the present invention. In one embodiment, there is a 1:1relationship of ring 32 and shaft rotation. In other embodiments, theratio can change. This can be achieved with gearing. In variousembodiments, the bolt/lock 24 and/or lock device 22 can have a rotationof 20-5 and less turns clockwise or counter-clockwise in order to openthe door 12. Some lock devices 22 require multiple turns.

FIGS. 6A and B, with front and back views, illustrate hook slots 52 thatcan be used with the present invention.

FIGS. 7A through F illustrate an embodiment of a mount 54, withattachment to the mounting plate 26. Screws 56 are captured in thehousing 58, and/or ring 32 and accessed through a battery cavity. Adwelling user, resource owner, or end-user, resource owner, or end-usercan open holes for access and replace the screws 56. In one embodiment,the screws extend through the mounting plate 26 into a door hole. In oneembodiment, a height of the mounting plate 26 is minimized. Duringassembly, the lock device 22 is held in place, FIG. 7C, temporarily by atop lip, FIG. 7D and the lock drive shaft 14.

In one embodiment the housing 58 has an interior volume of at least200,000 cubic mm.

In one embodiment the amount of torque applied to the mechanicalcomponents of intelligent door lock system 10 is less than 8 in-lbs. Inone embodiment the amount of torque applied to the draft shaft 22, bolt24 and lock device 22 is less than 8 in-lbs. As non-limiting examples,the amount of torque applied is less than: 7 in-lbs; 6 in-lbs; 5 in-lbs;4 in-lbs and the like.

FIGS. 8A-B illustrate embodiments where magnets 60 are utilized. Themagnet 60 locations are illustrated as are the tooled recesses from thetop and side. In one embodiment, the magnets 60 are distanced by rangesof 1-100 mm, 3-90, 5-80 mm apart and the like.

FIGS. 9A-E illustrate embodiments of the present invention with winglatches 36. The wing latches 36 allow for movement of the lock device 22with bolt/lock 24 towards its final position, in a Z-axis directiontowards the door 12. Once the lock device 22 with bolt/lock 24 is in afinal position, the wing latches 36 allows for the secure mountingwithout external tools. The wing latches 36 do the mounting. Winglatches 36 enable mounting of the lock device 22 and bolt/lock 24 withuse of only the Z axis direction only, and X and Y directionality arenot needed for the mounting.

In one embodiment, a lead in ramp, FIG. 9E is used to pull the elementstogether.

FIGS. 10A-C and FIGS. 11A-D illustrate further details of wing latching.

FIGS. 12A-D illustrate embodiments of battery contacts 64.

FIGS. 13A and B illustrate embodiments of motor 38 and one or more gears34, with a gearbox 66. In one embodiment, a first gear 34 in sequencetakes a large load if suddenly stopped while running.

FIG. 14 illustrates an embodiment of a plurality of motion transferdevices such as gears 34. There can be come backlash in a gear train asa result of fits and tolerances. There can also be play between adapters28 and lock drive shafts 14. This can produce play in an out gearbox 66ring. This can be mitigated with a detent that located the outer ring.

The intelligent door lock system 10 can be in communication with anintelligent door lock system back-end 68, via Network Systems, as morefully described hereafter.

In one embodiment, the flex circuit 18, which has an out-of planedeflection of at least 1 degree, includes a position detector connector46, Bluetooth circuit, and associated power points, as well as otherelements.

In one embodiment, the intelligent door lock system 10 can useincremental data transfer via Network Systems, including but not limitedto BLUETOOTH® and the like. The intelligent door lock system 10 cantransmit data through the inductive coupling for wireless charging. Thedwelling user, resource owner, or end-user, resource owner, or end-useris also able to change the frequency of data transmission.

In one embodiment, the intelligent door lock system 10 can engage inintelligent switching between incremental and full syncing of data basedon available communication routes. As a non-limiting example, this canbe via cellular networks, WiFi, BLUETOOTH® and the like.

In one embodiment, the intelligent door lock system 10 can receivefirmware and software updates from the intelligent lock system back-end68.

In one embodiment, the intelligent door lock system 10 produces anoutput that can be received by an amplifier, and decoded by an I/Odecoder to determine I/O logic levels, as well as, both clock and datainformation. Many such methods are available including ratio encoding,Manchester encoding, Non-Return to Zero (NRZ) encoding, or the like;alternatively, a UART type approach can be used. Once so converted,clock and data signals containing the information bits are passed to amemory at the intelligent door lock system 10 or intelligent door locksystem back-end 68.

In one embodiment, the intelligent door lock system 10, or associatedback-end 68, can includes a repeatable pseudo randomization algorithm inROM or in ASIC logic.

FIGS. 15A-B illustrate an embodiment of a speaker 17 and speakermounting 70.

FIGS. 15C-D illustrate one embodiment of an accelerometer FPC serviceloop.

As illustrated in FIG. 16, the intelligent door lock system back-end 68can include one or more receivers 74, one or more engines 76, with oneor more processors 78, coupled to conditioning electronics 80, one ormore filters 82, one or more communication interfaces 84, one or moreamplifiers 86, one or more databases 88, logic resources 90 and thelike.

The back-end 68 knows that an intelligent door lock system 10 is with adwelling user, resource owner, or end-user, resource owner, or end-user,and includes a database with the dwelling user, resource owner, orend-user, resource owner, or end-user's account information. Theback-end 68 knows if the dwelling user, resource owner, or end-user,resource owner, or end-user is registered or not. When the intelligentdoor lock system 10 is powered up, the back-end 68 associated thatintelligent door lock system 10 with the dwelling user, resource owner,or end-user, resource owner, or end-user.

The conditioning electronics 80 can provide signal conditioning,including but not limited to amplification, filtering, converting, rangematching, isolation and any other processes required to make sensoroutput suitable for processing after conditioning. The conditioningelectronics can provide for, DC voltage and current, AC voltage andcurrent, frequency and electric charge. Signal inputs accepted by signalconditioners include DC voltage and current, AC voltage and current,frequency and electric charge. Outputs for signal conditioningelectronics can be voltage, current, frequency, timer or counter, relay,resistance or potentiometer, and other specialized output.

In one embodiment, the one or more processors 78, can include a memory,such as a read only memory, used to store instructions that theprocessor may fetch in executing its program, a random access memory(RAM) used by the processor 78 to store information and a master dock.The one or more processors 78 can be controlled by a master clock thatprovides a master timing signal used to sequence the one or moreprocessors 78 through internal states in their execution of eachprocessed instruction. In one embodiment, the one or more processors 78can be low power devices, such as CMOS, as is the necessary logic usedto implement the processor design. Information received from the signalscan be stored in memory.

In one embodiment, electronics 92 are provided for use in intelligentdoor system 10 analysis of data transmitted via System Networks. Theelectronics 92 can include an evaluation device 94 that provides forcomparisons with previously stored intelligent door system 10information.

Signal filtering is used when the entire signal frequency spectrumcontains valid data. Filtering is the most common signal conditioningfunction, as usually not all the signal frequency spectrum containsvalid data.

Signal amplification performs two important functions: increases theresolution of the inputted signal, and increases its signal-to-noiseratio.

Suitable amplifiers 86 include but are not limited to sample and holdamplifiers, peak detectors, log amplifiers, antilog amplifiers,instrumentation amplifiers, programmable gain amplifiers and the like.

Signal isolation can be used in order to pass the signal from to ameasurement device without a physical connection. It can be used toisolate possible sources of signal perturbations.

In one embodiment, the intelligent door lock system back-end 68 canprovide magnetic or optic isolation. Magnetic isolation transforms thesignal from voltage to a magnetic field, allowing the signal to betransmitted without a physical connection (for example, using atransformer). Optic isolation takes an electronic signal and modulatesit to a signal coded by light transmission (optical encoding), which isthen used for input for the next stage of processing.

In one embodiment, the intelligent door lock system 10 and/or theintelligent door lock system back-end 68 can include ArtificialIntelligence (AI) or Machine Learning-grade algorithms for analysis.Examples of AI algorithms include Classifiers, Expert systems, casebased reasoning, Bayesian networks, and Behavior based AI, Neuralnetworks, Fuzzy systems, Evolutionary computation, and hybridintelligent systems.

Information received or transmitted from the back-end 68 to theintelligent door system 10 and mobile device 210 can use logicresources, such as AI and machine learning grade algorithms to providereasoning, knowledge, planning, learning communication, and createactions.

In one embodiment, AI is used to process information from theintelligent door lock system 10, from mobile device 210, and the like.The back-end 68 can compute scores associated with various riskvariables involving the intelligent door lock system 10. These score canbe compared to a minimum threshold from a database and an outputcreated. Alerts can be provided to the intelligent door lock system 10,mobile device 210 and the like. The alert can provide a variety ofoptions for the intelligent door lock system 10 to take, categorizationsof the received data from the mobile device 210, the intelligent doorlock system 10, and the like, can be created. A primary option can becreated as well as secondary options.

In one embodiment, data associated with the intelligent door lock system10 is received. The data can then be pre-processed and an array ofaction options can be identified. Scores can be computed for theoptions. The scores can then be compared to a minimum threshold and toeach other. A sorted list of the action options based on the comparisoncan be outputted to the intelligent door lock system 10, the mobiledevice 210 and the like. Selections can then be received indicatingwhich options to pursue. Action can then be taken. If an update to theinitial data is received, the back-end 68 can then return to the step ofreceiving data.

Urgent indicators can be determined and directed to the intelligent doorlock system 10, including unlocking, locking and the like.

Data received by the intelligent door lock system 10 and mobile device210 can also is compared to third party secured access to a dwellinguser, resource owner, or end-user, which can by programmatic datasources.

In data evaluation and decision making, algorithm files from a memorycan be accessed specific to data and parameters received from theintelligent door lock system 10 and mobile device 210.

Scoring algorithms, protocols and routines can be run for the variousreceived data and options. Resultant scores can then be normalized andweights assigned with likely outcomes.

The intelligent door lock system 10 can be a new lock system mounted toa door 12, with all or most of the elements listed above, or it can beretrofitted over an existing lock device 22.

To retrofit the intelligent door lock system 10 with an existing locksystem, the dwelling user, resource owner, or end-user, resource owner,or end-user makes sure that the existing lock device 22 and bolt/lock 24is installed right-side up. The existing thumb-turn is then removed.With some lock devices 22, additional mounting plates 26 need to beremoved and the intelligent door lock system 10 can include replacementscrews 56 that are used. The correct mounting plate 26 is then selected.With the existing screws 56 in the thumb-turn, the dwelling user,resource owner, or end-user, resource owner, or end-user sequentiallyaligns with 1 of 4 mounting plates 26 that are supplied or exist. Thisassists in determining the correct diameter and replace of the screws 56required by the bolt/lock 24. The mounting plate 26 is then positioned.The correct adapter 28 is positioned in a center of the mounting plate26 to assist in proper positioning. Caution is made to ensure that theadapter 28 does not rub the sides of the mounting plate 26 and thescrews 56 are then tightened on the mounting plate 26. The intelligentdoor lock system bolt/lock 24 of lock device 22 is then attached. In oneembodiment, this is achieved by pulling out side wing latches 36,sliding the lock device 22 and/or bolt/lock 24 over the adapter 28 andpin and then clamping down the wings 36 to the mounting plate 26. Thefaceplate is rotated to open the battery compartment and the batterytabs are then removed to allow use of the battery contacts 64. An outermetal ring 32 to lock and unlock the door 12 is then rotated. An appfrom mobile device 210 and/or key then brings the dwelling user,resource owner, or end-user, resource owner, or end-user through apairing process.

A door 12 can be deformed, warped, and the like. It is desirable toprovide a customer or dwelling user, resource owner, or end-user,resource owner, or end-user, information about the door, e.g., if it isdeformed, out of alignment, if too much friction is applied when openingand closing, and the like.

As recited above, the current sensor 46 monitors the amount of currentthat goes to the motor 38 and this information is received and processedby the engine/processor 36 with memory and is coupled to the circuit 18.The amount of current going to the motor 38 is used to determine theamount of friction experienced by door 12 and/or lock device 22 inopening and/or closing, as applied by the intelligent door lock system10 and the positioning sensing device 16 to the drive shaft 14. Thecircuit 18 and engine/processor 36 can provide for an adjustment ofcurrent. The engine/processor 36 can provide information regarding thedoor and friction to the dwelling user, resource owner, or end-user,resource owner, or end-user of the door 12.

In one embodiment of the present invention, the intelligent door locksystem 10 provides an ability to sense friction on the lock device 22and/or door 12 by measuring the torque required to move the bolt/lock24. The intelligent door lock system 10 increases the applied torquegradually until the bolt/lock 24 moves into its desired position, andthe applied torque is the minimum amount of torque required to move thebolt/lock 24, which is directly related to how deformed the door is.

In one embodiment, when a bad door is detected, a customer can benotified that their door may require some servicing. In one embodiment,door deformation can be detected with a torque device is used todetermine if the torque applied when the door is rotated is too high. Asa non-limiting example, this can be 2-15 in lbs of torque Theintelligent door lock system back end 68 can then perform a comparisonbetween the measured torque with a standard, or a norm that is includedin the one or more databases 88.

In one embodiment of the present invention, before the door is serviced,the intelligent door lock system 10 allows operation by offering ahigh-friction mode. As a non-limiting example, the high friction mode iswhen, as non-limiting examples, 2 inch lbs, 3 inch lbs., 3.5 inchpounds, and the like are required to open the door. In the high frictionmode, the bolt/lock 24 is driven while the dwelling user, resourceowner, or end-user, resource owner, or end-user is pushing, lifting,torqueing the door, pulling, performing visual inspections of rust,blockage, other conditions that can compromise a door and the like, thatis applied to the doorknob. The position sensing device 16 is used todetermine if the bolt/lock 24 was moved to a final position. In the highfriction mode, motion of the door closing is confirmed. Upon detectingthe closing of the door, the bolt/lock 24 is then driven. When thedwelling user, resource owner, or end-user, resource owner, or end-userreceives an auditory, visual, or any other type of perceptibleconfirmation, the dwelling user, resource owner, or end-user, resourceowner, or end-user then knows that the door has been locked. In oneembodiment, the firmware elements, of the intelligent door lock system10, as well as other door lock device 22 elements, can also attempt todrive the bolt/lock 24 for a second time when the first time fails.However, this can result in more power consumption, reducing lifetime ofthe power source, particularly when it is battery 50 based.

In one embodiment of the present invention, the intelligent door locksystem 10 seeks to have the motor 38 operate with reduced energyconsumption for energy source lifetime purposes, as well as eliminate orreduce undesirable noises, operations, and dwelling user, resourceowner, or end-user, resource owner, or end-user experiences that occurwhen this is a failure in door locking and unlocking, particularly dueto door deformation, door non-alignment, as well as other problems withthe door that can be irritating to the person locking or unlocking thedoor.

In one embodiment of the present invention, the intelligent door locksystem back-end 68 can track performance of doors and friction levelsacross time and build a service to encourage dwelling user, resourceowner, or end-user, resource owner, or end-users to better maintaintheir doors. Such service can be a comparison of a door's friction levelto other users that have similar geographic locations, at similarweather pattern, such that the dwelling user, resource owner, orend-user, resource owner, or end-user is encouraged to maintain theirdoors at a competent level. There can be a comparison to standards thatat a certain level the door becomes unsafe. Guidelines are provided asto how to maintain their doors. This can be achieved by asking a doordwelling user, resource owner, or end-user, resource owner, or end-userwhat improves their door, including but not limited to, pushing,lifting, torqueing the door, pulling, visual inspections of rust,blockage, other conditions that can compromise a door, and the like. Theanalysis and comparison can be conducted at the back-end 68 and theresults computed to door lock operator as well as others.

In one embodiment of the present invention, the intelligent door locksystem 10 has a deformed operation mode that can be activated after aselected amount of time. As a non-limiting example, this can immediatelyafter the dwelling user, resource owner, or end-user, resource owner, orend-user has been notified, more than 1 pico second, 1 second, 5seconds, and greater periods of time. The deformed operation mode can beactivated by the intelligent door lock system 10 itself, or by theintelligent door lock system back-end 68. It can be activated on thedoor operator's request. In one embodiment, the back-end 68 cananticipate these problems. As non-limiting examples, these can includebut are not limited to, due to analysis of doors 12 in similargeographic areas, doors under similar conditions, doors with similarhistories, similar environmental conditions, as well as the history of aparticular door, and the like.

The deformed mode provides cooperation with the door dwelling user,resource owner, or end-user, resource owner, or end-user to more readilyopen the door. In one embodiment, this is a mechanism for the door tocommunicate back to the door lock operator. As a non-limiting example,feedback can be provided to the door operator. Such feedback caninclude, but is not limited to, communication via, tactile, audio,visual, temperature, electronic, wirelessly, through a computer, mobiledevice 201 and the like. In another embodiment, the operator can signifyto the door the operator's desire to leave by unlocking and opening thedoor 12. This is a door operator and lock communication. The dooroperator can close the door, which is sensed by the intelligent doorlock system 10, a timer can then be initiated to provide with dooroperator with a selected time period in which the door operator canmanually alleviate the friction problem. When the time has expired, theintelligent door system 10 can then lock the door 12. Upon detecting asuccessful door locking event, the intelligent door lock system 10 canadvise the door operator that there is a successful door locking. If thedoor locking is not successful, the intelligent door lock system 10 canprovide a message to the door operator via a variety of means, includingbut not limited to a message or alert to the door lock operator's mobiledevice 201. Such a mobile device message provides the door operator withnotification that door locking was not successful or achieved, and thedoor lock operator can then take action to lock the door 12 either inperson, wirelessly, and the like.

For entry, communication with the lock device 22 may be different. Inone embodiment, it can be locking coupled with close proximity to amobile device 201 that is exterior to the door.

In another embodiment of the present invention, the intelligent doorlock system back-end 68 can track performance of doors and frictionlevels across time and build a simple service to encourage dwellinguser, resource owner, or end-user, resource owner, or end-users tomaintain their doors better, as discussed above.

This information can be stored in the one or more databases 64.

In one embodiment of the present invention, the intelligent door locksystem 10 unlocks when a selected temperature is reached, when smoke isdetected, when a fire is detected by processor 38 and the like. Asnon-limiting examples, the intelligent door lock system 10 unlocks thebolt/lock 24 when a temperature is sensed by the temperature sensor 46that, as non-limiting examples, is greater than 40 degrees C., anytemperature over 45 degrees C. and the like. The temperature sensor 46212 sends a signal to the processor 36 which communicates with the motor38 that will then cause the drive shaft 14 to rotate sufficiently andunlock the bolt/lock 24. An arm can also be activated. It will beappreciated that the processor 36 can be anywhere as long as it is incommunication with the temperature sensor 46, and the motor 38, whichcan be at the intelligent door lock system 10, at the back-end 68,anywhere in the building, and at any remote location. The processor 36determines if there is an unsafe condition, e.g., based on a rise intemperature and this then results in an unlocking of the bolt/lock 24.

In one embodiment, the intelligent door lock system back-end 68 cantrack performance of doors and friction levels across time and build aservice to encourage dwelling user, resource owner, or end-user,resource owner, or end-users to better maintain their doors, asdiscussed above.

FIG. 17 is a diagram illustrating an implementation of an intelligentdoor look system 100 that allows an intelligent lock on one or morebuildings to the controlled, as described above, and also controlledremotely by a mobile device 201 or computer, as well as remotely by anintelligent lock system back-end component 114, a mobile device 201 or acomputing device 210 of a dwelling user, resource owner, or end-user,resource owner, or end-user who is a member of the intelligent door locksystem 100, as disclosed above. The intelligent door lock systemback-end component 114 may be any of those listed above included in theintelligent lock system back-end 68, one or more computing resources,such as cloud lock access services computing resources or servercomputers with the typical components, that execute a plurality of linesof computer code to implement the intelligent door lock system 100functions described above and below. Each computing device 210 of adwelling user, resource owner, or end-user, resource owner, or end-usermay be a processing unit based device with sufficient processing power,memory and connectivity to interact with the intelligent door locksystem back-end component 114. As a non-limiting example, the mobiledevice 201 or computing device 210 may be as defined above, and includethose disclosed below, that is capable of interacting with theintelligent door lock back-end component 114. In one implementation, themobile device 201 or computing device 210 may execute an applicationstored in the memory of the mobile device 201 computing device 210 usinga processor from the mobile device 201 or computing device 210 tointeract with the intelligent door lock back-end component 114. Examplesof a dwelling user, resource owner, or end-user, resource owner orend-user interface for that application is shown in FIGS. 21A-22Ediscussed below in more detail.

In another embodiment, the mobile device 201 or computing device 210 mayexecute a browser stored in the memory of the mobile or computing device210 using a processor from the mobile device 201 or computing device 210to interact with the intelligent door lock system back-end component114. Each of the elements shown in FIG. 17 may be linked by SystemNetworks, including but not limited to a cellular network, a Bluetoothsystem, the Internet (HTTPS), a WiFi network and the like.

As shown in FIG. 17, each dwelling user, resource owner, or end-user,resource owner, or end-user's mobile device 201 or computer 210 mayinteract with the intelligent door lock system back-end 68 over SystemNetworks, including but not limited to a wired or wireless network, suchas a cellular network, digital data network, computer network and mayalso interact with the intelligent door lock system 10 using SystemNetworks. Each mobile device 201 or computing device 210 may alsocommunicate with a WiFi network 115 or Network Systems over, as anon-limiting example, a network and the WiFi network 115 may thencommunicate with the intelligent door lock system 10.

FIGS. 18A and B illustrate a front view and a back view, respectively,of a door 120 with intelligent door lock system 10. The front portion ofthe door 120 (that is outside relative to a building or dwelling user,resource owner, or end-user) shown in FIG. 17 looks like a typical door120 with a bolt assembly 122 and a doorknob and lock assembly 124. Theback portion of the door 120, that is inside of the dwelling user,resource owner, or end-user when the door 120 is closed, illustrated inFIG. 18B has the same doorknob and lock assembly 124, but then has anintelligent door lock system 100 that is retrofitted onto the boltassembly 124 as described below in more detail.

The intelligent door look assembly 100 may have an extension gear whichextends through the baseplate of the smart door lock. The baseplate mayhave one or more oval mounting holes to accommodate various rose screwdistances from 18 mm to 32 mm to accommodate various different doors. Inone implementation, the intelligent door lock system 100 may have acircular shape and also a rotating bezel. The rotating bezel allows adwelling user, resource owner, or end-user, resource owner, or end-userto rotate the smart door lock and thus manually lock or unlock the boltas before. The extension gear extends through the baseplate and theninteracts with the existing bolt elements and allows the smart door lockto lock/unlocks the bolt. The extension gear may have a modular adapterslot at its end which interfaces with an extension rod of the boltassembly 124. These modular adapters, as shown in FIG. 23B, may be usedto match the existing extension rod of the bolt assembly 124. The smartdoor lock housing may further include an energy source, such as abattery, a motor assembly, such as a compact, high-torque, high-accuracystepper motor, and a circuit board that has at least a processor, afirst wireless connectivity circuit and a second wireless connectivitycircuit, as described above. In one embodiment, the first wirelessconnectivity circuit may be a Bluetooth chip that allows the smart doorlock to communicate using a Bluetooth protocol with a computing deviceof a dwelling user, resource owner, or end-user, resource owner, orend-user, such as a Smartphone, tablet computer and the like. The secondwireless connectivity circuit may be a WiFi chip that allows the smartdoor lock to communicate using a WiFi protocol with a back-end serversystem. The circuit board components may be intercoupled to each otherand also coupled to the energy source and the motor for power and tocontrol the motor, respectively. Each of the components described heremay be coupled to the energy source and powered by the energy source.

FIG. 19 illustrates the smart door lock system 100 being retrofittedonto a bolt in a door 10. As shown in FIG. 19, when the intelligent doorlock system 100 is installed on the door 120, the thumb turn 124 isremoved (replaced by the bezel that allows the dwelling user, resourceowner, or end-user, resource owner, or end-user to manually unlock orlock the bolt.) In addition, the extension gear 126 of the intelligentdoor lock system 100, and more specifically the slotted portion 126A atthe end of the extension gear, is mechanically coupled to the extensionrod 128 of the bolt assembly as show in FIG. 19. When the intelligentdoor lock system 100 is installed, as shown in FIG. 19, the dwellinguser, resource owner, or end-user, resource owner, or end-user canrotate the bezel 132 to manually lock or unlock the bolt assembly. Inaddition, when commanded to do so, the motor assembly in the intelligentdoor lock system 100 can also turn the extension gear 126 that in turnturns the extension rod and lock or unlock the bolt assembly. Thus, theextension gear 126 allows the smart door lock to act as a manual thumbturn (using the bezel) and rotate either clockwise or counterclockwiseto engage or disengage the bolt of a bolt. The extension gear 126 isdesigned in a manner to control the physical rotation of extensionrods/axial actuators/tail pieces/tongues 128 which are traditionalrotated by means of a thumb turn. This is achieved by designing theextension gear 126 with modular gear adapters as shown in FIG. 23B tofit over the extension rod 22 as shown. This allows the extension gear126 to fit with a variety of existing extension rods.

FIG. 20 illustrates a set of interactions between the intelligent doorlock system 100, mobile or computing device 210 and intelligent doorlock system back-end 68 that may include a pairing process 138 and alock operation process 140. During the pairing process 138, theintelligent door lock system 100 and mobile or computing device 210 canbe paired to each other and also authenticated by the intelligent doorlock system back-end 68. Thus, as shown in FIG. 20, during the pairingprocess, the intelligent door look system 100 is powered on and becomesdiscoverable, while the mobile or computing device 210 communicates withthe intelligent door lock system back-end 68, and has its credentialsvalidated and authenticated. Once the mobile or computing device 210,and the app on the mobile or computing device 210, is authenticated, themobile or computing device 210 discovers the lock, such as through aBluetooth discovery process, since the intelligent door look system 100and the mobile or computing device 210 are within a predeterminedproximity to each other. The mobile or computing device 210 may thensend a pairing code to the intelligent door look system 100, and in turnreceive a pairing confirmation from the intelligent door lock system100. The pairing process is then completed with the processesillustrated in FIG. 20. The lock operation may include the steps listedin FIG. 20 to operate the intelligent door look system 100 wirelesslyusing the mobile or computing device 210.

The intelligent door lock system 100 may be used for various functions.As a non-limiting example, the intelligent door lock system 100 mayenable a method to exchange a security token between mobile or computingdevice 210 and the intelligent door look system 100. All or all of theintelligent door look systems 100 may be registered with the intelligentdoor lock back-end 68 with a unique registration ID. The unique ID ofthe an intelligent door look system 100 may be associated with a uniquesecurity token that can only be used to command a specific intelligentdoor look system 100 to lock or unlock. Through a virtual keyprovisioning interface of the intelligent door lock system back-end 68,a master user, who may be an administrator, can issue a new securitytoken to a particular mobile or computing device 210. The intelligentdoor look system 100 can periodically broadcast an advertisement of itsavailable services over System Networks. When the mobile or computingdevice 210 is within a predetermined proximity of the intelligent doorlook system 100, which varies depending on the protocol being used, themobile or computing device 210 can detect the advertisement from theintelligent door lock assembly 100.

The application on the mobile or computing device 210 detects theintelligent door look system 100 and a communications session can beinitiated. The token, illustrated as a key 118 in FIG. 20, is exchangedand the lock is triggered to unlock automatically. Alternatively, if theintelligent door look system 100 is equipped with a second wirelesscommunications circuit, then the intelligent door look system 100 canperiodically query the intelligent door lock system back-end 68 forcommands. A dwelling user, resource owner, or end-user, resource owner,or end-user can issue commands via a web interface to the intelligentdoor lock system back-end 68, and the intelligent door look system 100can lock or unlock the door 120. The intelligent door lock system 100may also allow the dwelling user, resource owner, or end-user, resourceowner, or end-user to disable auto-unlock, at which time the applicationon the dwelling user, resource owner, or end-user, resource owner, orend-user's mobile or computing device 210 can provide a notificationwhich then allows the dwelling user, resource owner, or end-user,resource owner, or end-user to press a button on the mobile or computingdevice 210 to lock or unlock the lock.

The intelligent door lock system 100 may also allow for the triggeringof multiple events upon connection to an intelligent door look system100 by a mobile or computing device 210. As a non-limiting example, theintelligent door look system 100 can detect and authenticate the mobileor computing device 210, as described herein, and initiate a series ofactions, including but not limiting to, unlocking doors 100, turning onlights, adjusting temperature, turning on stereo etc.

As non-limiting examples, suitable devices that can be controlled by amobile device 201 include but are not limited to: doors and windows,burglar alarms, generators, thermostats. lighting, smoke/co detector,refrigerator, ranges, electronic devices, door locks, water alarm orshutoff, washer and dryer, music systems, heating and air conditioningsystems—water systems, sprinklers systems and the like. With the presentinvention analogies of any of the preceding can be detected. When ananomaly is detected the owner can be detected via its mobile device 201,via the cloud or through a system backend, and an action be taken. Incertain embodiments authorities can be immediately contacted andinvestigate the situation/dwelling user, resource owner, or end-user.

In one embodiment the motivation for anomaly detection is to discoverevents that are outside of threshold settings. Events could be maliciousones such as a hacker attempting to remotely operate a lock, a burglarbreaking a window or pushing in a door, or non-malicious events such asa door that has been left open for longer than normal.

As a non-limiting example normal events would be normal smart lockoperation and door operations that fall within threshold values, such asa commuter who operates the door lock once in the morning, and then oncein the evening when they return home.

In one embodiment the calculation of an anomaly could be done bycollecting signal values from devices and sensors such as a smart doorlock, camera, microphone, etc. that capture video, audio, motion,seismic, or other event data. Data from each device could have aweighting factor attached to it, and a total event value could becalculated by multiplying each signal value by its weighting factor, andthen summing all signal values. If the total event value is greater thanthe anomaly threshold, then additional alerts or actions could betriggered, such as automatically locking the door or sending anotification to the dwelling user, resource owner, or end-user, resourceowner, or end-user.Total Event Value=w1k(door)+w2*k(window)+ . . . +wn*kn

where w1, w2, wn are weighting factors

where k(door), k(window), kn are signal values from devices or sensors

The commands for these actions may be carried out by the mobile orcomputing device 210 or the intelligent door lock system back-end 68. Inaddition, through a web interface of the intelligent door lock systemback-end 68, the dwelling user, resource owner, or end-user, resourceowner, or end-user may define one or more events to be triggered uponproximity detection and authentication of the dwelling user, resourceowner, or end-user, resource owner, or end-user's mobile or computingdevice 210 to the intelligent door look system 100.

The intelligent door lock system 100 may also allow for the intelligenttriggering of events associated with an individual. In particular,environmental settings may be defined per individual in the intelligentdoor lock system back-end 68 and then applied intelligently bysuccessive ingress by that person into a building that has anintelligent door look system 100. For example: person A arrives home andits mobile or computing device 210 is authenticated by the intelligentdoor look system 100. His identity is shared with the intelligent doorlock system back-end 68. The intelligent door lock system back-end 68may send environmental changes to other home controllers, such as“adjust heat to 68 degrees”. Person B arrives at the same building anhour later and her mobile or computing device 210 is also authenticatedand shared with the intelligent door lock system back-end 68. Theintelligent door lock system back-end 68 access her preferredenvironmental variables such as “adjust heat to 71 degrees”. Theintelligent door lock system back-end understands that person B hasasked for a temperature increase and issues the respective command tothe dwelling user, resource owner, or end-user thermostat. In oneexample, the intelligent door lock back-end system 68 has logic thatdefers to the higher temperature request or can deny it. Therefore ifperson A entered the home after person B, the temperature would not bedecreased.

FIGS. 21A-G are examples of a dwelling user, resource owner, orend-user, resource owner, or end-user interface for an owner of adwelling user, resource owner, or end-user that has an intelligent doorlock system 100. These dwelling user, resource owner, or end-user,resource owner, or end-user interfaces may be seen by a dwelling user,resource owner, or end-user, resource owner, or end-user who is theowner of a building that has an intelligent door look system 100 withthe unique ID. FIG. 21A is a basic home screen while FIG. 22B shows thesmart door locks (in a keychain) which the dwelling user, resourceowner, or end-user, resource owner, or end-user of the mobile orcomputing device 210 has access rights to in intelligent door locksystem 100. FIG. 21C illustrates an example of a dwelling user, resourceowner, or end-user, resource owner, or end-user interface when aparticular intelligent door look system 100 is locked. FIG. 22Dillustrates an example of a dwelling user, resource owner, or end-user,resource owner, or end-user interface when a particular intelligent doorlook system 100 is unlocked. FIGS. 21E and F are dwelling user, resourceowner, or end-user, resource owner, or end-user interface examples thatallow the owner to add other dwelling user, resource owner, or end-user,resource owner, or end-users/people to be able to control theintelligent door look system 100 of the building. FIG. 21G is an exampleof a configuration interface that allows the owner of the building tocustomize a set of permissions assigned for each intelligent door locksystem 100.

FIGS. 22A-E are examples of a dwelling user, resource owner, orend-user, resource owner, or end-user interface for a guest of an ownerof a building that has an intelligent door lock system 100.

FIGS. 23A and B illustrate an intelligent door look system 100 andextension gear adapters 142. In particular, FIG. 23A shows the bolt of alock device with an empty extension gear receptacle that allowsdifferent extension gear adapters 150 (shown in FIG. 7B) to be insertedinto the receptacle so that the an intelligent door look system 100 maybe used with a number of different bolts of lock devices that each havea different shaped extension rod and/or extension rods that havedifferent cross-sections.

Referring to FIGS. 22-24, the mobile or computing device can include anapp for executing the methods of the present invention.

The mobile or computing device can include a display that can be a touchsensitive display. The touch-sensitive display is sometimes called a“touch screen” for convenience, and may also be known as or called atouch-sensitive display system. The mobile or computing device mayinclude a memory (which may include one or more computer readablestorage mediums), a memory controller, one or more processing units(CPU's), a peripherals interface, Network Systems circuitry, includingbut not limited to RF circuitry, audio circuitry, a speaker, amicrophone, an input/output (I/O) subsystem, other input or controldevices, and an external port. The mobile or computing device mayinclude one or more optical sensors. These components may communicateover one or more communication buses or signal lines.

It should be appreciated that the mobile or computing device is only oneexample of a portable multifunction mobile or computing device, and thatthe mobile or computing device may have more or fewer components thanshown, may combine two or more components, or a may have a differentconfiguration or arrangement of the components. The various componentsmay be implemented in hardware, software or a combination of hardwareand software, including one or more signal processing and/or applicationspecific integrated circuits.

Memory may include high-speed random access memory and may also includenon-volatile memory, such as one or more magnetic disk storage devices,flash memory devices, or other non-volatile solid-state memory devices.Access to memory by other components of the mobile or computing device,such as the CPU and the peripherals interface, may be controlled by thememory controller.

The peripherals interface couples the input and output peripherals ofthe device to the CPU and memory. The one or more processors run orexecute various software programs and/or sets of instructions stored inmemory to perform various functions for the mobile or computing deviceand to process data.

In some embodiments, the peripherals interface, the CPU, and the memorycontroller may be implemented on a single chip, such as a chip. In someother embodiments, they may be implemented on separate chips.

The Network System circuitry receives and sends signals, including butnot limited to RF, also called electromagnetic signals. The NetworkSystem circuitry converts electrical signals to/from electromagneticsignals and communicates with communications with communications devicesvia the electromagnetic signals. The Network Systems circuitry mayinclude well-known circuitry for performing these functions, includingbut not limited to an antenna system, an RF transceiver, one or moreamplifiers, a tuner, one or more oscillators, a digital signalprocessor, a CODEC chipset, a subscriber identity module (SIM) card,memory, and so forth. The Network Systems circuitry may communicate withNetwork Systems 110 and other devices by wireless communication.

The wireless communication may use any of a plurality of communicationsstandards, protocols and technologies, including but not limited toGlobal System for Mobile Communications (GSM), Enhanced Data GSMEnvironment (EDGE), high-speed downlink packet access (HSDPA), widebandcode division multiple access (W-CDMA), code division multiple access(CDMA), time division multiple access (TDMA), BLUETOOTH®, WirelessFidelity (Wi-Fi) (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/orIEEE 802.11n), voice over Internet Protocol (VoIP), Wi-MAX, a protocolfor email (e.g., Internet message access protocol (IMAP) and/or postoffice protocol (POP)), instant messaging (e.g., extensible messagingand presence protocol (XMPP), Session Initiation Protocol for InstantMessaging and Presence Leveraging Extensions (SIMPLE), and/or InstantMessaging and Presence Service (IMPS)), and/or Short Message Service(SMS)), or any other suitable communication protocol, includingcommunication protocols not yet developed as of the filing date of thisdocument.

The audio circuitry, the speaker, and the microphone provide an audiointerface between a user and the mobile or computing device. The audiocircuitry receives audio data from the peripherals interface, convertsthe audio data to an electrical signal, and transmits the electricalsignal to the speaker. The speaker converts the electrical signal tohuman-audible sound waves. The audio circuitry also receives electricalsignals converted by the microphone from sound waves. The audiocircuitry converts the electrical signal to audio data and transmits theaudio data to the peripherals interface for processing. Audio data maybe retrieved from and/or transmitted to memory and/or the NetworkSystems circuitry by the peripherals interface. In some embodiments, theaudio circuitry also includes a headset jack. The headset jack providesan interface between the audio circuitry and removable audioinput/output peripherals, such as output-only headphones or a headsetwith both output (e.g., a headphone for one or both ears) and input(e.g., a microphone).

The I/O subsystem couples input/output peripherals on the mobile orcomputing device, such as the touch screen and other input/controldevices, to the peripherals interface. The I/O subsystem may include adisplay controller and one or more input controllers for other input orcontrol devices. The one or more input controllers receive/sendelectrical signals from/to other input or control devices. The otherinput/control devices may include physical buttons (e.g., push buttons,rocker buttons, etc.), dials, slider switches, and joysticks, clickwheels, and so forth. In some alternate embodiments, input controller(s)may be coupled to any (or none) of the following: a keyboard, infraredport, USB port, and a pointer device such as a mouse. The one or morebuttons may include an up/down button for volume control of the speakerand/or the microphone. The one or more buttons may include a pushbutton. A quick press of the push button may disengage a lock of thetouch screen or begin a process that uses gestures on the touch screento unlock the device, as described in U.S. patent application Ser. No.11/322,549, “Unlocking a Device by Performing Gestures on an UnlockImage,” filed Dec. 23, 2005, which is hereby incorporated by referencein its entirety. A longer press of the push button may turn power to themobile or computing device on or off. The user may be able to customizea functionality of one or more of the buttons. The touch screen is usedto implement virtual or soft buttons and one or more soft keyboards.

The touch-sensitive touch screen provides an input interface and anoutput interface between the device and a user. The display controllerreceives and/or sends electrical signals from/to the touch screen. Thetouch screen displays visual output to the user. The visual output mayinclude graphics, text, icons, video, and any combination thereof(collectively termed “graphics”). In some embodiments, some or all ofthe visual output may correspond to user-interface objects, furtherdetails of which are described below.

A touch screen has a touch-sensitive surface, sensor or set of sensorsthat accepts input from the user based on haptic and/or tactile contact.The touch screen and the display controller (along with any associatedmodules and/or sets of instructions in memory) detect contact (and anymovement or breaking of the contact) on the touch screen and convertsthe detected contact into interaction with user-interface objects (e.g.,one or more soft keys, icons, web pages or images) that are displayed onthe touch screen. In an exemplary embodiment, a point of contact betweena touch screen and the user corresponds to a finger of the user.

The touch screen may use LCD (liquid crystal display) technology, or LPD(light emitting polymer display) technology, although other displaytechnologies may be used in other embodiments. The touch screen and thedisplay controller may detect contact and any movement or breakingthereof using any of a plurality of touch sensing technologies now knownor later developed, including but not limited to capacitive, resistive,infrared, and surface acoustic wave technologies, as well as otherproximity sensor arrays or other elements for determining one or morepoints of contact with a touch screen.

A touch-sensitive display in some embodiments of the touch screen may beanalogous to the multi-touch sensitive tablets described in thefollowing U.S. Pat. No. 6,323,846 (Westerman et al.), U.S. Pat. No.6,570,557 (Westerman et al.), and/or U.S. Pat. No. 6,677,932(Westerman), and/or U.S. Patent Publication 2002/0015024A1, each ofwhich is hereby incorporated by reference in their entirety. However, atouch screen displays visual output from the portable mobile orcomputing device, whereas touch sensitive tablets do not provide visualoutput.

A touch-sensitive display in some embodiments of the touch screen may beas described in the following applications: (1) U.S. patent applicationSer. No. 11/381,313, “Multipoint Touch Surface Controller,” filed May12, 2006; (2) U.S. patent application Ser. No. 10/840,862, “MultipointTouchscreen,” filed May 6, 2004; (3) U.S. patent application Ser. No.10/903,964, “Gestures For Touch Sensitive Input Devices,” filed Jul. 30,2004; (4) U.S. patent application Ser. No. 11/048,264, “Gestures ForTouch Sensitive Input Devices,” filed Jan. 31, 2005; (5) U.S. patentapplication Ser. No. 11/038,590, “Mode-Based Graphical User InterfacesFor Touch Sensitive Input Devices,” filed Jan. 18, 2005; (6) U.S. patentapplication Ser. No. 11/228,758, “Virtual Input Device Placement On ATouch Screen User Interface,” filed Sep. 16, 2005; (7) U.S. patentapplication Ser. No. 11/228,700, “Operation Of A Computer With A TouchScreen Interface,” filed Sep. 16, 2005; (8) U.S. patent application Ser.No. 11/228,737, “Activating Virtual Keys Of A Touch-Screen VirtualKeyboard,” filed Sep. 16, 2005; and (9) U.S. patent application Ser. No.11/367,749, “Multi-Functional Hand-Held Device,” filed Mar. 3, 2006. Allof these applications are incorporated by reference herein in theirentirety.

The touch screen may have a resolution in excess of 1000 dpi. In anexemplary embodiment, the touch screen has a resolution of approximately1060 dpi. The user may make contact with the touch screen using anysuitable object or appendage, such as a stylus, a finger, and so forth.In some embodiments, the user interface is designed to work primarilywith finger-based contacts and mood intensity, which are much lessprecise than stylus-based input due to the larger area of contact of afinger on the touch screen. In some embodiments, the device translatesthe rough finger-based input into a precise pointer/cursor position orcommand for performing the actions desired by the user.

In some embodiments, in addition to the touch screen, the mobile orcomputing device may include a touchpad (not shown) for activating ordeactivating particular functions. In some embodiments, the touchpad isa touch-sensitive area of the device that, unlike the touch screen, doesnot display visual output. The touchpad may be a touch-sensitive surfacethat is separate from the touch screen or an extension of thetouch-sensitive surface formed by the touch screen.

In some embodiments, the mobile or computing device may include aphysical or virtual click wheel as an input control device. A user maynavigate among and interact with one or more graphical objects(henceforth referred to as icons) displayed in the touch screen byrotating the click wheel or by moving a point of contact with the clickwheel (e.g., where the amount of movement of the point of contact ismeasured by its angular displacement with respect to a center point ofthe click wheel). The click wheel may also be used to select one or moreof the displayed icons. For example, the user may press down on at leasta portion of the click wheel or an associated button. User commands andnavigation commands provided by the user via the click wheel may beprocessed by an input controller as well as one or more of the modulesand/or sets of instructions in memory. For a virtual click wheel, theclick wheel and click wheel controller may be part of the touch screenand the display controller, respectively. For a virtual click wheel, theclick wheel may be either an opaque or semitransparent object thatappears and disappears on the touch screen display in response to userinteraction with the device. In some embodiments, a virtual click wheelis displayed on the touch screen of a portable multifunction device andoperated by user contact with the touch screen.

The mobile or computing device also includes a power system for poweringthe various components. The power system may include a power managementsystem, one or more power sources (e.g., battery, alternating current(AC)), a recharging system, a power failure detection circuit, a powerconverter or inverter, a power status indicator (e.g., a light-emittingdiode (LED)) and any other components associated with the generation,management and distribution of power in portable devices.

The mobile or computing device may also include one or more sensors,including not limited to optical sensors. In one embodiment an opticalsensor is coupled to an optical sensor controller in I/O subsystem. Theoptical sensor may include charge-coupled device (CCD) or complementarymetal-oxide semiconductor (CMOS) phototransistors. The optical sensorreceives light from the environment, projected through one or more lens,and converts the light to data representing an image. In conjunctionwith an imaging module (also called a camera module); the optical sensormay capture still images or video. In some embodiments, an opticalsensor is located on the back of the mobile or computing device,opposite the touch screen display on the front of the device, so thatthe touch screen display may be used as a viewfinder for either stilland/or video image acquisition. In some embodiments, an optical sensoris located on the front of the device so that the user's image may beobtained for videoconferencing while the user views the other videoconference participants on the touch screen display. In someembodiments, the position of the optical sensor can be changed by theuser (e.g., by rotating the lens and the sensor in the device housing)so that a single optical sensor may be used along with the touch screendisplay for both video conferencing and still and/or video imageacquisition.

The mobile or computing device may also include one or more proximitysensors. In one embodiment, the proximity sensor is coupled to theperipherals interface. Alternately, the proximity sensor may be coupledto an input controller in the I/O subsystem. The proximity sensor mayperform as described in U.S. patent application Ser. No. 11/241,839,“Proximity Detector In Handheld Device,” filed Sep. 30, 2005; Ser. No.11/240,788, “Proximity Detector In Handheld Device,” filed Sep. 30,2005; Ser. No. 13/096,386, “Using Ambient Light Sensor To AugmentProximity Sensor Output”; Ser. No. 13/096,386, “Automated Response ToAnd Sensing Of User Activity In Portable Devices,” filed Oct. 24, 2006;and Ser. No. 11/638,251, “Methods And Systems For AutomaticConfiguration Of Peripherals,” which are hereby incorporated byreference in their entirety. In some embodiments, the proximity sensorturns off and disables the touch screen when the multifunction device isplaced near the user's ear (e.g., when the user is making a phone call).In some embodiments, the proximity sensor keeps the screen off when thedevice is in the user's pocket, purse, or other dark area to preventunnecessary battery drainage when the device is a locked state.

In some embodiments, the software components stored in memory mayinclude an operating system, a communication module (or set ofinstructions), a contact/motion module (or set of instructions), agraphics module (or set of instructions), a text input module (or set ofinstructions), a Global Positioning System (GPS) module (or set ofinstructions), and applications (or set of instructions).

The operating system (e.g., Darwin, RTXC, LINUX, UNIX, OS X, WINDOWS, oran embedded operating system such as VxWorks) includes various softwarecomponents and/or drivers for controlling and managing general systemtasks (e.g., memory management, storage device control, powermanagement, etc.) and facilitates communication between various hardwareand software components.

The communication module facilitates communication with other devicesover one or more external ports and also includes various softwarecomponents for handling data received by the Network Systems circuitryand/or the external port. The external port (e.g., Universal Serial Bus(USB), FIREWIRE, etc.) is adapted for coupling directly to other devicesor indirectly over Network Systems 110. In some embodiments, theexternal port is a multi-pin (e.g., 30-pin) connector that is the sameas, or similar to and/or compatible with the 30-pin connector used oniPod (trademark of Apple Computer, Inc.) devices.

The contact/motion module may detect contact with the touch screen (inconjunction with the display controller) and other touch sensitivedevices (e.g., a touchpad or physical click wheel). The contact/motionmodule includes various software components for performing variousoperations related to detection of contact, such as determining ifcontact has occurred, determining if there is movement of the contactand tracking the movement across the touch screen, and determining ifthe contact has been broken (i.e., if the contact has ceased).Determining movement of the point of contact may include determiningspeed (magnitude), velocity (magnitude and direction), and/or anacceleration (a change in magnitude and/or direction) of the point ofcontact. These operations may be applied to single contacts (e.g., onefinger contacts) or to multiple simultaneous contacts (e.g.,“multitouch”/multiple finger contacts). In some embodiments, thecontact/motion module and the display controller also detect contact ona touchpad. In some embodiments, the contact/motion module and thecontroller detects contact on a click wheel.

Examples of other applications that may be stored in memory includeother word processing applications, JAVA-enabled applications,encryption, digital rights management, voice recognition, and voicereplication.

In conjunction with touch screen, display controller, contact module,graphics module, and text input module, a contacts module may be used tomanage an address book or contact list, including: adding name(s) to theaddress book; deleting name(s) from the address book; associating mobiledevice number(s), e-mail address(es), physical address(es) or otherinformation with a name; associating an image with a name; categorizingand sorting names; providing mobile device numbers or e-mail addressesto initiate and/or facilitate communications by mobile device 201, videoconference, e-mail, or IM; and so for

The foregoing description of various embodiments of the claimed subjectmatter has been provided for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit the claimedsubject matter to the precise forms disclosed. Many modifications andvariations will be apparent to the practitioner skilled in the art.Particularly, while the concept “component” is used in the embodimentsof the systems and methods described above, it will be evident that suchconcept can be interchangeably used with equivalent concepts such as,class, method, type, interface, module, object model, and other suitableconcepts. Embodiments were chosen and described in order to bestdescribe the principles of the invention and its practical application,thereby enabling others skilled in the relevant art to understand theclaimed subject matter, the various embodiments and with variousmodifications that are suited to the particular use contemplated.

Referring now to FIG. 24, 1212 is a block diagram illustratingembodiments of a mobile or computing device 210 that can be used withintelligent door lock system 10.

The mobile or computing device 210 can include a display 1214 that canbe a touch sensitive display. The touch-sensitive display 1214 issometimes called a “touch screen” for convenience, and may also be knownas or called a touch-sensitive display system. The mobile or computingdevice 210 may include a memory 1216 (which may include one or morecomputer readable storage mediums), a memory controller 1218, one ormore processing units (CPU's) 1220, a peripherals interface 1222,Network Systems circuitry 1224, including but not limited to RFcircuitry, audio circuitry 1226, a speaker 1228, a microphone 1230, aninput/output (I/O) subsystem 1232, other input or control devices 1234,and an external port 1236. The mobile or computing device 210 mayinclude one or more optical sensors 1238. These components maycommunicate over one or more communication buses or signal lines 1240.

It should be appreciated that the mobile or computing device 210 is onlyone example of a portable multifunction mobile or computing device 210,and that the mobile or computing device 210 may have more or fewercomponents than shown, may combine two or more components, or a may havea different configuration or arrangement of the components. The variouscomponents shown in FIG. 24 may be implemented in hardware, software ora combination of hardware and software, including one or more signalprocessing and/or application specific integrated circuits.

Memory 1216 may include high-speed random access memory and may alsoinclude non-volatile memory, such as one or more magnetic disk storagedevices, flash memory devices, or other non-volatile solid-state memorydevices. Access to memory 1216 by other components of the mobile orcomputing device 210, such as the CPU 1220 and the peripherals interface1222, may be controlled by the memory controller 1218.

The peripherals interface 1222 couples the input and output peripheralsof the device to the CPU 1220 and memory 1216. The one or moreprocessors 1220 run or execute various software programs and/or sets ofinstructions stored in memory 1216 to perform various functions for themobile or computing device 210 and to process data.

In some embodiments, the peripherals interface 1222, the CPU 1220, andthe memory controller 1218 may be implemented on a single chip, such asa chip 1242. In some other embodiments, they may be implemented onseparate chips.

The Network System circuitry 1244 receives and sends signals, includingbut not limited to RF, also called electromagnetic signals. The NetworkSystem circuitry 1244 converts electrical signals to/fromelectromagnetic signals and communicates with communications networksand other communications devices via the electromagnetic signals. TheNetwork Systems circuitry 1244 may include well-known circuitry forperforming these functions, including but not limited to an antennasystem, an RF transceiver, one or more amplifiers, a tuner, one or moreoscillators, a digital signal processor, a CODEC chipset, a subscriberidentity module (SIM) card, memory, and so forth. The Network Systemscircuitry 1244 may communicate with networks, such as the Internet, alsoreferred to as the World Wide Web (WWW), an intranet and/or a wirelessnetwork, such as a cellular telephone network, a wireless local areanetwork (LAN) and/or a metropolitan area network (MAN), and otherdevices by wireless communication.

The wireless communication may use any of a plurality of communicationsstandards, protocols and technologies, including but not limited toGlobal System for Mobile Communications (GSM), Enhanced Data GSMEnvironment (EDGE), high-speed downlink packet access (HSDPA), widebandcode division multiple access (W-CDMA), code division multiple access(CDMA), time division multiple access (TDMA), BLUETOOTH®, WirelessFidelity (Wi-Fi) (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/orIEEE 802.11n), voice over Internet Protocol (VoIP), Wi-MAX, a protocolfor email (e.g., Internet message access protocol (IMAP) and/or postoffice protocol (POP)), instant messaging (e.g., extensible messagingand presence protocol (XMPP), Session Initiation Protocol for InstantMessaging and Presence Leveraging Extensions (SIMPLE), and/or InstantMessaging and Presence Service (IMPS)), and/or Short Message Service(SMS)), or any other suitable communication protocol, includingcommunication protocols not yet developed as of the filing date of thisdocument.

The audio circuitry 1226, the speaker 1228, and the microphone 1230provide an audio interface between a dwelling user, resource owner, orend-user, resource owner, or end-user and the mobile or computing device210. The audio circuitry 1226 receives audio data from the peripheralsinterface 1222, converts the audio data to an electrical signal, andtransmits the electrical signal to the speaker 1228. The speaker 1228converts the electrical signal to human-audible sound waves. The audiocircuitry 1226 also receives electrical signals converted by themicrophone 1230 from sound waves. The audio circuitry 1226 converts theelectrical signal to audio data and transmits the audio data to theperipherals interface 1222 for processing. Audio data may be retrievedfrom and/or transmitted to memory 1216 and/or the Network Systemscircuitry 1244 by the peripherals interface 1222. In some embodiments,the audio circuitry 1226 also includes a headset jack. The headset jackprovides an interface between the audio circuitry 1226 and removableaudio input/output peripherals, such as output-only headphones or aheadset with both output (e.g., a headphone for one or both ears) andinput (e.g., a microphone).

The I/O subsystem 1232 couples input/output peripherals on the mobile orcomputing device 210, such as the touch screen 1214 and otherinput/control devices 1234, to the peripherals interface 1222. The I/Osubsystem 1232 may include a display controller 1246 and one or moreinput controllers 210 for other input or control devices. The one ormore input controllers 1 receive/send electrical signals from/to otherinput or control devices 1234. The other input/control devices 1234 mayinclude physical buttons (e.g., push buttons, rocker buttons, etc.),dials, slider switches, and joysticks, click wheels, and so forth. Insome alternate embodiments, input controller(s) 1252 may be coupled toany (or none) of the following: a keyboard, infrared port, USB port, anda pointer device such as a mouse. The one or more buttons may include anup/down button for volume control of the speaker 1228 and/or themicrophone 1230. The one or more buttons may include a push button. Aquick press of the push button may disengage a lock of the touch screen1214 or begin a process that uses gestures on the touch screen to unlockthe device, as described in U.S. patent application Ser. No. 11/322,549,“Unlocking a Device by Performing Gestures on an Unlock Image,” filedDec. 23, 2005, which is hereby incorporated by reference in itsentirety. A longer press of the push button may turn power to the mobileor computing device 210 on or off. The dwelling user, resource owner, orend-user, resource owner, or end-user may be able to customize afunctionality of one or more of the buttons. The touch screen 1214 isused to implement virtual or soft buttons and one or more softkeyboards.

The touch-sensitive touch screen 1214 provides an input interface and anoutput interface between the device and a dwelling user, resource owner,or end-user, resource owner, or end-user. The display controller 1246receives and/or sends electrical signals from/to the touch screen 1214.The touch screen 1214 displays visual output to the dwelling user,resource owner, or end-user, resource owner, or end-user. The visualoutput may include graphics, text, icons, video, and any combinationthereof (collectively termed “graphics”). In some embodiments, some orall of the visual output may correspond to dwelling user, resourceowner, or end-user, resource owner, or end-user-interface objects,further details of which are described below.

A touch screen 1214 has a touch-sensitive surface, sensor or set ofsensors that accepts input from the dwelling user, resource owner, orend-user, resource owner, or end-user based on haptic and/or tactilecontact. The touch screen 1214 and the display controller 1246 (alongwith any associated modules and/or sets of instructions in memory 1216)detect contact (and any movement or breaking of the contact) on thetouch screen 1214 and converts the detected contact into interactionwith dwelling user, resource owner, or end-user, resource owner, orend-user-interface objects (e.g., one or more soft keys, icons, webpages or images) that are displayed on the touch screen. In an exemplaryembodiment, a point of contact between a touch screen 1214 and thedwelling user, resource owner, or end-user, resource owner, or end-usercorresponds to a finger of the dwelling user, resource owner, orend-user, resource owner, or end-user.

The touch screen 1214 may use LCD (liquid crystal display) technology,or LPD (light emitting polymer display) technology, although otherdisplay technologies may be used in other embodiments. The touch screen1214 and the display controller 1246 may detect contact and any movementor breaking thereof using any of a plurality of touch sensingtechnologies now known or later developed, including but not limited tocapacitive, resistive, infrared, and surface acoustic wave technologies,as well as other proximity sensor arrays or other elements fordetermining one or more points of contact with a touch screen 1214.

A touch-sensitive display in some embodiments of the touch screen 1214may be analogous to the multi-touch sensitive tablets described in thefollowing U.S. Pat. No. 6,323,846 (Westerman et al.), U.S. Pat. No.6,570,557 (Westerman et al.), and/or U.S. Pat. No. 6,677,932(Westerman), and/or U.S. Patent Publication 2002/0015024A1, each ofwhich is hereby incorporated by reference in their entirety. However, atouch screen 1214 displays visual output from the portable mobile orcomputing device 210, whereas touch sensitive tablets do not providevisual output.

A touch-sensitive display in some embodiments of the touch screen 1214may be as described in the following applications: (1) U.S. patentapplication Ser. No. 11/381,313, “Multipoint Touch Surface Controller,”filed May 12, 2006; (2) U.S. patent application Ser. No. 10/840,862,“Multipoint Touchscreen,” filed May 6, 2004; (3) U.S. patent applicationSer. No. 10/903,964, “Gestures For Touch Sensitive Input Devices,” filedJul. 30, 2004; (4) U.S. patent application Ser. No. 11/048,264,“Gestures For Touch Sensitive Input Devices,” filed Jan. 31, 2005; (5)U.S. patent application Ser. No. 11/038,590, “Mode-Based Graphical UserInterfaces For Touch Sensitive Input Devices,” filed Jan. 18, 2005; (6)U.S. patent application Ser. No. 11/228,758, “Virtual Input DevicePlacement On A Touch Screen User Interface,” filed Sep. 16, 2005; (7)U.S. patent application Ser. No. 11/228,700, “Operation Of A ComputerWith A Touch Screen Interface,” filed Sep. 16, 2005; (8) U.S. patentapplication Ser. No. 11/228,737, “Activating Virtual Keys Of ATouch-Screen Virtual Keyboard,” filed Sep. 16, 2005; and (9) U.S. patentapplication Ser. No. 11/367,749, “Multi-Functional Hand-Held Device,”filed Mar. 3, 2006. All of these applications are incorporated byreference herein in their entirety.

The touch screen 1214 may have a resolution in excess of 1000 dpi. In anexemplary embodiment, the touch screen has a resolution of approximately1060 dpi. The dwelling user, resource owner, or end-user, resourceowner, or end-user may make contact with the touch screen 1214 using anysuitable object or appendage, such as a stylus, a finger, and so forth.In some embodiments, the dwelling user, resource owner, or end-user,resource owner, or end-user interface is designed to work primarily withfinger-based contacts and gestures, which are much less precise thanstylus-based input due to the larger area of contact of a finger on thetouch screen. In some embodiments, the device translates the roughfinger-based input into a precise pointer/cursor position or command forperforming the actions desired by the dwelling user, resource owner, orend-user, resource owner, or end-user.

In some embodiments, in addition to the touch screen, the mobile orcomputing device 210 may include a touchpad (not shown) for activatingor deactivating particular functions. In some embodiments, the touchpadis a touch-sensitive area of the device that, unlike the touch screen,does not display visual output. The touchpad may be a touch-sensitivesurface that is separate from the touch screen 1214 or an extension ofthe touch-sensitive surface formed by the touch screen.

In some embodiments, the mobile or computing device 210 may include aphysical or virtual click wheel as an input control device 1234. Adwelling user, resource owner, or end-user, resource owner, or end-usermay navigate among and interact with one or more graphical objects(henceforth referred to as icons) displayed in the touch screen 1214 byrotating the click wheel or by moving a point of contact with the clickwheel (e.g., where the amount of movement of the point of contact ismeasured by its angular displacement with respect to a center point ofthe click wheel). The click wheel may also be used to select one or moreof the displayed icons. For example, the dwelling user, resource owner,or end-user, resource owner, or end-user may press down on at least aportion of the click wheel or an associated button. Dwelling user,resource owner, or end-user, resource owner, or end-user commands andnavigation commands provided by the dwelling user, resource owner, orend-user, resource owner, or end-user via the click wheel may beprocessed by an input controller 1252 as well as one or more of themodules and/or sets of instructions in memory 1216. For a virtual clickwheel, the click wheel and click wheel controller may be part of thetouch screen 1214 and the display controller 1246, respectively. For avirtual click wheel, the click wheel may be either an opaque orsemitransparent object that appears and disappears on the touch screendisplay in response to dwelling user, resource owner, or end-user,resource owner, or end-user interaction with the device. In someembodiments, a virtual click wheel is displayed on the touch screen of aportable multifunction device and operated by dwelling user, resourceowner, or end-user, resource owner, or end-user contact with the touchscreen.

The mobile or computing device 210 also includes a power system 1214 forpowering the various components. The power system 1214 may include apower management system, one or more power sources (e.g., battery 1254,alternating current (AC)), a recharging system, a power failuredetection circuit, a power converter or inverter, a power statusindicator (e.g., a light-emitting diode (LED)) and any other componentsassociated with the generation, management and distribution of power inportable devices.

The mobile or computing device 210 may also include one or more sensors1238, including not limited to optical sensors 1238. An optical sensorcan be coupled to an optical sensor controller 1248 in I/O subsystem1232. The optical sensor 1238 may include charge-coupled device (CCD) orcomplementary metal-oxide semiconductor (CMOS) phototransistors. Theoptical sensor 1238 receives light from the environment, projectedthrough one or more lens, and converts the light to data representing animage. In conjunction with an imaging module 1258 (also called a cameramodule); the optical sensor 1238 may capture still images or video. Insome embodiments, an optical sensor is located on the back of the mobileor computing device 210, opposite the touch screen display 1214 on thefront of the device, so that the touch screen display may be used as aviewfinder for either still and/or video image acquisition. In someembodiments, an optical sensor is located on the front of the device sothat the dwelling user, resource owner, or end-user, resource owner, orend-user's image may be obtained for videoconferencing while thedwelling user, resource owner, or end-user, resource owner, or end-userviews the other video conference participants on the touch screendisplay. In some embodiments, the position of the optical sensor 1238can be changed by the dwelling user, resource owner, or end-user,resource owner, or end-user (e.g., by rotating the lens and the sensorin the device housing) so that a single optical sensor 1238 may be usedalong with the touch screen display for both video conferencing andstill and/or video image acquisition.

The mobile or computing device 210 may also include one or moreproximity sensors 1250. In one embodiment, the proximity sensor 1250 iscoupled to the peripherals interface 1222. Alternately, the proximitysensor 1250 may be coupled to an input controller in the I/O subsystem1232. The proximity sensor 1250 may perform as described in U.S. patentapplication Ser. No. 11/241,839, “Proximity Detector In HandheldDevice,” filed Sep. 30, 2005; Ser. No. 11/240,788, “Proximity DetectorIn Handheld Device,” filed Sep. 30, 2005; Ser. No. 13/096,386, “UsingAmbient Light Sensor To Augment Proximity Sensor Output”; Ser. No.11/586,862, “Automated Response To And Sensing Of User Activity InPortable Devices,” filed Oct. 24, 2006; and Ser. No. 11/638,251,“Methods And Systems For Automatic Configuration Of Peripherals,” whichare hereby incorporated by reference in their entirety. In someembodiments, the proximity sensor turns off and disables the touchscreen 1214 when the multifunction device is placed near the dwellinguser, resource owner, or end-user, resource owner, or end-user's ear(e.g., when the dwelling user, resource owner, or end-user, resourceowner, or end-user is making a phone call). In some embodiments, theproximity sensor keeps the screen off when the device is in the dwellinguser, resource owner, or end-user, resource owner, or end-user's pocket,purse, or other dark area to prevent unnecessary battery drainage whenthe device is a locked state.

In some embodiments, the software components stored in memory 1216 mayinclude an operating system 1260, a communication module (or set ofinstructions) 1262, a contact/motion module (or set of instructions)1264, a graphics module (or set of instructions) 1268, a text inputmodule (or set of instructions) 1270, a Global Positioning System (GPS)module (or set of instructions) 1272, and applications (or set ofinstructions) 1272.

The operating system 1260 (e.g., Darwin, RTXC, LINUX, UNIX, OS X,WINDOWS, or an embedded operating system such as VxWorks) includesvarious software components and/or drivers for controlling and managinggeneral system tasks (e.g., memory management, storage device control,power management, etc.) and facilitates communication between varioushardware and software components.

The communication module 1262 facilitates communication with otherdevices over one or more external ports 1274 and also includes varioussoftware components for handling data received by the Network Systemscircuitry 1244 and/or the external port 1274. The external port 1274(e.g., Universal Serial Bus (USB), FIREWIRE, etc.) is adapted forcoupling directly to other devices or indirectly over a network (e.g.,the Internet, wireless LAN, etc.). In some embodiments, the externalport is a multi-pin (e.g., 30-pin) connector that is the same as, orsimilar to and/or compatible with the 30-pin connector used on iPod(trademark of Apple Computer, Inc.) devices.

The contact/motion module 106 may detect contact with the touch screen1214 (in conjunction with the display controller 1246) and other touchsensitive devices (e.g., a touchpad or physical click wheel). Thecontact/motion module 106 includes various software components forperforming various operations related to detection of contact, such asdetermining if contact has occurred, determining if there is movement ofthe contact and tracking the movement across the touch screen 1214, anddetermining if the contact has been broken (i.e., if the contact hasceased). Determining movement of the point of contact may includedetermining speed (magnitude), velocity (magnitude and direction),and/or an acceleration (a change in magnitude and/or direction) of thepoint of contact. These operations may be applied to single contacts(e.g., one finger contacts) or to multiple simultaneous contacts (e.g.,“multitouch”/multiple finger contacts). In some embodiments, thecontact/motion module 106 and the display controller 1246 also detectscontact on a touchpad. In some embodiments, the contact/motion module1284 and the controller 1286 detects contact on a click wheel.

Examples of other applications that may be stored in memory 1216 includeother word processing applications, JAVA-enabled applications,encryption, digital rights management, voice recognition, and voicereplication.

In conjunction with touch screen 1214, display controller 1246, contactmodule 1276, graphics module 1278, and text input module 1280, acontacts module 1282 may be used to manage an address book or contactlist, including: adding name(s) to the address book; deleting name(s)from the address book; associating telephone number(s), e-mailaddress(es), physical address(es) or other information with a name;associating an image with a name; categorizing and sorting names;providing telephone numbers or e-mail addresses to initiate and/orfacilitate communications by telephone, video conference, e-mail, or IM;and so forth.

FIGS. 25A-E represents a logical diagram of a cloud lock access servicesInfrastructure that can be utilized with the present invention that isin communication with the bridge 11, Bluetooth devices 21 and/or theintelligent door lock system 10. As shown, the cloud lock accessservices encompasses web applications, mobile devices 210, personalcomputer and/or laptops and social networks, such as, Twitter®.(“Twitter®” is a trademark of Twitter Inc.). It will be appreciated thatother social networks can be included in the cloud lock access servicesand Twitter® has been given as a specific example. Therefore, everycomponent forms part of the cloud lock access services which comprisesservers, applications and clients as defined above.

The cloud lock can provide dwelling user, resource owner, or end-useraccess services with the utilization and allocation of hardware andsoftware resource(s) to remote clients. The system can concurrentlyservice requests from several clients without participant perception ofdegraded computing performance as compared to conventional techniqueswhere computational tasks can be performed upon a client or a serverwithin a proprietary intranet. The cloud services provider (e.g., “whichcan be for secured dwelling user, resource owner, or end-user accesswith or without an intelligent door lock system 10”) supports acollection of hardware and/or software resources. The hardware and/orsoftware resources can be maintained by an off-premises party, and theresources can be accessed and utilized by identified participants overNetwork System. Resources provided by the cloud services provider can becentrally located and/or distributed at various geographic locations.For example, the cloud services provider can include any number of datacenter machines that provide resources. The data center machines can beutilized for storing/retrieving data, effectuating computational tasks,rendering graphical outputs, routing data, and so forth.

In one embodiment the cloud is used for the remote door 12 statusoperation, remote door operation for locking, unlocking and the like.

According to an illustration, the cloud services provider can provideany number of resources such as data storage services, computationalservices, word processing services, electronic mail services,presentation services, spreadsheet services, gaming services, websyndication services (e.g., subscribing to a RSS feed), and any otherservices or applications that are conventionally associated withpersonal computers and/or local servers. Further, utilization of anynumber of the cloud service providers similar to the cloud servicesprovider is contemplated. According to an illustration, disparate cloudservices providers can be maintained by differing off-premise partiesand a participant can employ, concurrently, at different times, and thelike, all or a subset of the cloud services providers.

By leveraging resources supported by the cloud services provider,limitations commonly encountered with respect to hardware associatedwith clients and servers within proprietary intranets can be mitigated.Off-premises parties or Network System administrators of servers withinproprietary intranets, can maintain, troubleshoot, replace and updatethe hardware resources. Further, for example, lengthy downtimes can bemitigated by the cloud services provider utilizing redundant resources;thus, if a subset of the resources are being updated or replaced, theremainder of the resources can be utilized to service requests fromparticipants. According to this example, the resources can be modular innature, and thus, resources can be added, removed, tested, modified,etc. while the remainder of the resources can support servicingparticipant requests. Moreover, hardware resources supported by thecloud services provider can encounter fewer constraints with respect tostorage, processing power, security, bandwidth, redundancy, graphicaldisplay rendering capabilities, etc. as compared to conventionalhardware associated with clients and servers within proprietaryintranets.

The system can include a client device, which can be the wearable deviceand/or mobile device 201 that employs resources of the cloud servicesprovider. Although one client device is depicted, it is to beappreciated that the system can include any number of client devicessimilar to the client device, and the plurality of client devices canconcurrently utilize supported resources. By way of illustration, theclient device can be a desktop device (e.g., personal computer), mobiledevice 201, and the like. Further, the client device can be an embeddedsystem that can be physically limited, and hence, it can be beneficialto leverage resources of the cloud services provider.

Resources can be shared amongst a plurality of client devicessubscribing to the cloud services provider. According to anillustration, one of the resources can be at least one centralprocessing unit (CPU), where CPU cycles can be employed to effectuatecomputational tasks requested by the client device. Pursuant to thisillustration, the client device can be allocated a subset of an overalltotal number of CPU cycles, while the remainder of the CPU cycles can beallocated to disparate client device(s). Additionally or alternatively,the subset of the overall total number of CPU cycles allocated to theclient device can vary over time. Further, a number of CPU cycles can bepurchased by the participant of the client device. In accordance withanother example, the resources can include data store(s) that can beemployed by the client device to retain data. The participant employingthe client device can have access to a portion of the data store(s)supported by the cloud services provider, while access can be denied toremaining portions of the data store(s) (e.g., the data store(s) canselectively mask memory based upon participant/device identity,permissions, and the like). It is contemplated that any additional typesof resources can likewise be shared.

The cloud services provider can further include an interface componentthat can receive input(s) from the client device and/or enabletransferring a response to such input(s) to the client device (as wellas perform similar communications with any disparate client devices).According to an example, the input(s) can be request(s), data,executable program(s), etc. For instance, request(s) from the clientdevice can relate to effectuating a computational task,storing/retrieving data, rendering a participant interface, and the likevia employing one or more resources. Further, the interface componentcan obtain and/or transmit data over a Network System connection.According to an illustration, executable code can be received and/orsent by the interface component over the Network System connection.Pursuant to another example, a participant (e.g. employing the clientdevice) can issue commands via the interface component.

In one embodiment, the cloud services provider includes a dynamicallocation component that apportions resources, which as a non-limitingexample can be hardware resources supported by the cloud servicesprovider to process and respond to the input(s) (e.g., request(s), data,executable program(s), and the like, obtained from the client device.

Although the interface component is depicted as being separate from thedynamic allocation component, it is contemplated that the dynamicallocation component can include the interface component or a portionthereof. The interface component can provide various adaptors,connectors, channels, communication paths, etc. to enable interactionwith the dynamic allocation component.

In one embodiment a system includes the cloud services provider thatsupports any number of resources (e.g., hardware, software, andfirmware) that can be employed by the client device and/or disparateclient device(s) not shown. The cloud services provider furthercomprises the interface component that receives resource utilizationrequests, including but not limited to requests to effectuate operationsutilizing resources supported by the cloud services provider from theclient device and the dynamic allocation component that partitionsresources, including but not limited to, between participants, devices,computational tasks, and the like. Moreover, the dynamic allocationcomponent can further include a participant state evaluator, anenhancement component and an auction component.

The dwelling user, resource owner, or end-user, resource owner, orend-user state evaluator can determine a state associated with adwelling user, resource owner, or end-user, resource owner, or end-userand/or the client device employed by the dwelling user, resource owner,or end-user, resource owner, or end-user, where the state can relate toa set of properties. For instance, the dwelling user, resource owner, orend-user, resource owner, or end-user state evaluator can analyzeexplicit and/or implicit information obtained from the client device(e.g., via the interface component) and/or retrieved from memoryassociated with the cloud services provider (e.g., preferences indicatedin subscription data). State related data yielded by the dwelling user,resource owner, or end-user, resource owner, or end-user state evaluatorcan be utilized by the dynamic allocation component to tailor theapportionment of resources.

In one embodiment, the dwelling user, resource owner, or end-user,resource owner, or end-user state evaluator can consider characteristicsof the client device, which can be used to apportion resources by thedynamic allocation component. For instance, the dwelling user, resourceowner, or end-user, resource owner, or end-user state evaluator canidentify that the client device is a mobile device 201 with limiteddisplay area. Thus, the dynamic allocation component can employ thisinformation to reduce resources utilized to render an image upon theclient device since the cellular telephone may be unable to display arich graphical dwelling user, resource owner, or end-user, resourceowner, or end-user interface.

Moreover, the enhancement component can facilitate increasing anallocation of resources for a particular participant and/or clientdevice.

In one embodiment a system employs load balancing to optimizeutilization of resources. The system includes the cloud servicesprovider that communicates with the client device (and/or any disparateclient device(s) and/or disparate cloud services provider(s)). The cloudservices provider can include the interface component that transmitsand/or receives data from the client device and the dynamic allocationcomponent that allots resources. The dynamic allocation component canfurther comprise a load balancing component that optimizes utilizationof resources.

In one embodiment, the load balancing component can monitor resources ofthe cloud services provider to detect failures. If a subset of theresources fails, the load balancing component can continue to optimizethe remaining resources. Thus, if a portion of the total number ofprocessors fails, the load balancing component can enable redistributingcycles associated with the non-failing processors.

In one embodiment a system archives and/or analyzes data utilizing thecloud services provider. The cloud services provider can include theinterface component that enables communicating with the client device.Further, the cloud services provider comprises the dynamic allocationcomponent that can apportion data retention resources, for example.Moreover, the cloud services provider can include an archive componentand any number of data store(s). Access to and/or utilization of thearchive component and/or the data store(s) by the client device (and/orany disparate client device(s)) can be controlled by the dynamicallocation component. The data store(s) can be centrally located and/orpositioned at differing geographic locations. Further, the archivecomponent can include a management component, a versioning component, asecurity component, a permission component, an aggregation component,and/or a restoration component.

The data store(s) can be, for example, either volatile memory ornonvolatile memory, or can include both volatile and nonvolatile memory.By way of illustration, and not limitation, nonvolatile memory caninclude read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable programmable ROM(EEPROM), or flash memory. Volatile memory can include random accessmemory (RAM), which acts as external cache memory. By way ofillustration and not limitation, RAM is available in many forms such asstatic RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), doubledata rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM(SLDRAM), Rambus direct RAM (RDRAM), direct Rambus dynamic RAM (DRDRAM),and Rambus dynamic RAM (RDRAM). The data store(s) of the subject systemsand methods is intended to comprise, without being limited to, these andany other suitable types of memory. In addition, it is to be appreciatedthat the data store(s) can be a server, a database, a hard drive, andthe like.

The management component facilitates administering data retained in thedata store(s). The management component can enable providingmulti-tiered storage within the data store(s), for example. According tothis example, unused data can be aged-out to slower disks and importantdata used more frequently can be moved to faster disks; however, theclaimed subject matter is not so limited. Further, the managementcomponent can be utilized (e.g. by the client device) to organize,annotate, and otherwise reference content without making it local to theclient device. Pursuant to an illustration, enormous video files can betagged via utilizing a cell phone. Moreover, the management componentenables the client device to bind metadata, which can be local to theclient device, to file streams (e.g., retained in the data store(s));the management component can enforce and maintain these bindings.

Additionally or alternatively, the management component can allow forsharing data retained in the data store(s) with disparate participantsand/or client devices. For example, fine-grained sharing can besupported by the management component.

The versioning component can enable retaining and/or tracking versionsof data. For instance, the versioning component can identify a latestversion of a document (regardless of a saved location within datastore(s)).

The security component limits availability of resources based onparticipant identity and/or authorization level. For instance, thesecurity component can encrypt data transferred to the client deviceand/or decrypt data obtained from the client device. Moreover, thesecurity component can certify and/or authenticate data retained by thearchive component.

The permission component can enable a participant to assign arbitraryaccess permissions to various participants, groups of participantsand/or all participants.

Further, the aggregation component assembles and/or analyzes collectionsof data. The aggregation component can seamlessly incorporate thirdparty data into a particular participant's data.

The restoration component rolls back data retained by the archivecomponent. For example, the restoration component can continuouslyrecord an environment associated with the cloud services provider.Further, the restoration component can playback the recording.

FIG. 26 illustrates one embodiment of inputs and outputs.

FIG. 27 is a flowchart illustrating an example of a process for trackingsignal strength of between the bridge 11 and the Bluetooth LE devices21, as well as the intelligent door lock system 10. While FIG. 27illustrates exemplary steps according to one embodiment, otherembodiments may omit, add to, and/or modify any of the steps shown inFIG. 27.

An algorithm described hereafter computes proximity of a Bluetoothdevice 21 from the intelligent door lock system 10 of a dwelling user,resource owner, or end-user and from the one or more bridges 11 in thedwelling user, resource owner, or end-user. The relative signal strengthof connections to these two devices during lock operations is recordedas a threshold value. When the proximity to the bridge 11, placed insidethe home is closer than before the lock operation, we will computealgorithmically that the device is inside the home.

In one embodiment the time spent with a relatively consistent signalstrength value is a strong indicator a person being in the dwellinguser, resource owner, or end-user. A rapid change of proximity followinga lock operation will be an indicator of coming.

In one embodiment a lock device 22 operation of the intelligent doorlock system 10 followed by a rapid change of proximity is an indicatorof going from the dwelling user, resource owner, or end-user.

The process of FIG. 27 begins by measuring the signal strength ofwireless signals between the bridge 11 and the Bluetooth LE devices 21at step 310. The signal strength may be measured in any of the waysdiscussed above, including the bridge 11 measuring the power ofdownstream wireless signals. Step 310 may be initiated in accordancewith a predefined schedule or in response to a predetermined event.

At step 320, parameter data of the non-interconnect device isdetermined. The parameter data may include location, time, and/orvelocity coordinates associated with the non-interconnect device at thetime of the signal strength measurement. Step 320 may be performed inany variety of ways, including but not limited to the use of GPSinformation. Further, step 320 may be initiated by a predefined scheduleor a predefined event, as discussed above.

At step 330, the signal strength and parameter data are transmitted tothe cloud lock access services. Step 330 may be performed in any of theways discussed above, including using upstream control, communication,or out-of-band channels of Network System. The signal strength andparameter data, and optionally additional data, may be combined to formnetwork status data, which is transmitted to the cloud lock accessservices at step 330.

At step 340, the signal strength and parameter data are used to analyzethe signal strength between the bridge 11 and a Bluetooth LE device 21.The network operations center 150 is able to process the data in any ofthe ways discussed above, including mapping the signal strength togeographic representations of the bridge 11 and a Bluetooth LE device21, based on the parameter data. A graphical representation of at leasta section of the strength of the signal between the bridge 11 and aBluetooth LE device 12 may be generated to illustrate instances ofmeasured signal strength plotted based on corresponding parameter data.Network operators may use the output of the cloud lock access servicesto analyze, configure, reconfigure, overhaul, and/or optimize thewireless network, as discussed above.

FIG. 28 is a flowchart illustrating another example of a process fortracking signal strength between the bridge 11 and a Bluetooth LE device21. While FIG. 27 illustrates exemplary steps according to oneembodiment, other embodiments may omit, add to, and/or modify any of thesteps shown in FIG. 28.

The process of FIG. 28 begins by measuring the signal strength betweenthe bridge 11 and a Bluetooth LE device 21 at step 410. The signalstrength may be measured in any of the ways discussed above, includingmeasuring the power of downstream wireless signals being received fromthe cloud lock access services relative to bridge 11 and a Bluetooth LEdevice 21. Step 410 may be initiated in accordance with a predefinedschedule or in response to a predetermined event.

At step 420, it is determined whether the measured signal strength islower than a predetermined threshold. The predetermined threshold may bedefined by network operators and may be based on a desired level ofsignal power that provides effective signal strength. If it isdetermined at step 420 that the measured signal strength is not lowerthan the predetermined threshold, the process returns to step 410, atwhich step another measurement of signal strength is obtained eitherimmediately, according to an established schedule, or in response to apredetermined trigger event.

On the other hand, if it is determined at step 420 that the measuredsignal strength is lower than the predetermined threshold, the processcontinues at step 430. In one embodiment, at step 430, parameter data ofthe Bluetooth LE device 21 is determined. As non-limiting examples, theparameter data may include location, time, and/or velocity coordinatesassociated with the Bluetooth LE device 21 relative to the bridge 11.Step 430 may be performed in any of the ways discussed above; includingusing GPS signals to determine GPS coordinate data.

At step 440, it is determined whether the measured signal strength isadequate for transmission of data upstream to the cloud lock accessservices from the Bluetooth LE device 21. Step 440 may be performed bycomparing the measured signal strength to a predetermined transmissionthreshold, which may be defined by network operators based on a level ofsignal power that supports reliable upstream data transmissions from thewireless device.

If it is determined at step 440 that the measured signal strength isinadequate for transmission of data, the process continues at step 445.At step 445, the signal strength and parameter data are buffered forsubsequent transmission. Step 445 may be performed by storing the datato memory to maintain the data until it can be transmitted. In oneembodiment, from step 445, the process returns to step 410 to obtainanother measurement of signal strength. Multiple instances of data maybe buffered until signal strength becomes strong enough for the storeddata to be transmitted from the Bluetooth LE device 21. In other words,steps 410-440 may be repeated with different measurements being gatheredand stored for later transmission when the signal strength becomesstrong enough to support upstream transmissions.

If it is determined at step 440 that the measured signal strength isadequate for data transmission, the process continues to step 450. Atstep 450, the signal strength and parameter data are transmitted to thecloud lock access services. Step 450 may be performed in any of the waysdiscussed above, including using upstream control, communication, orout-of-band channels of the wireless network 144. The signal strengthand parameter data, and optionally additional data, may be combined toform network status data, which is transmitted to the cloud lock accessservices at step 450.

At step 460, the signal strength and parameter data are used to analyzeany number of parameters relative to Bluetooth LE device 21,particularly its location. The cloud is able to process the data in anyof the ways discussed above, including mapping the signal strength togeographic representations of the wireless network 144, based on theparameter data. A graphical representation may be generated toillustrate instances of measured signal strength plotted based oncorresponding parameter data.

FIG. 29 illustrates one embodiment of a triangulation algorithm forlocation estimation that can be used for the bridge 11, the intelligentdoor lock system 10 and a Bluetooth LE device 21. In one embodiment thetriangulation computes the location estimate by solving systems ofquadratic equations. In one embodiment the triangulation forms circleswhose centers are the locations of the transmitters, e.g., access pointsor base stations. Geometries other than circles can be used. In FIG. 29,the locations and RF characteristics of access points 1, 2, and 3 of thebridge 11, the intelligent door lock system 10 and the Bluetooth LEdevice 21 have been obtained at numerous known locations. Distances dlbetween the object and the access point 1, d2 between the bridge 11, theintelligent door lock system 10 and the Bluetooth LE device 21 and theaccess point 2, and d3 between them and the access point 3 arecalculated based on radio wave characteristics, e.g., TOA or TDOA. Itwill be appreciated than communication other than radio waves can beused.

Triangulation forms sets of circles. Each of the reference points,access points 1, 2 or 3, becomes the center of a circle, and thedistances between the object and the center, d1, d2 or d3, becomes theradius of that circle.

Triangulation estimates locations based on various intersection areasformed by these circles. If three formed circles meet at a single spot,that spot becomes the location estimate as a result of thetriangulation. However, as a practical matter, the three circles rarelywill meet at a single spot. More often, if the circles intersect, theywill intersect in multiple spots. In FIG. 29, the three circles have sixintersection points, P1, P2, P3, P4, P5 and P6. The triangulationalgorithm examines areas formed by the intersection points to obtain alocation estimate for the bridge 11, the intelligent door lock system 10and the Bluetooth LE device. Specifically, the triangle formed by P2, P4and P5 has the smallest area among all possible triangles formed bythese intersection points, and the centroid X of the triangle (P2, P4,and P5) is the best location estimate of the object.

FIG. 30 illustrates the K-nearest neighbor averaging algorithm forlocation estimate, wherein K=5. Typically, K is larger than 2.Experimental analysis shows that K=3 gives the best performance. Let atriplet (Sa, Sb, Sc) represent a set of run-time signal strengthmeasurements at a location of interest from the bridge 11, theintelligent door lock system 10 and the Bluetooth LE device 21,represented as a, b, and c. Five triplets which have the least root meansquare (RMS) error in signal strength between the run-time and theoff-line measurements are found. The root mean square error in signalstrength is calculated as follows:rms=√{square root over((a−a i)2+(b−b i)2+(c−c i)2)} {square rootover((a−a i)2+(b−b i)2+(c−c i)2)} {square root over((a−a i)2+(b−bi)2+(c−c i)2)}  (1)

wherein (Sa, Sb, Sc) represents off-line signal strength measurements atthe location of interest.

In particular, these five triplets are: signal strength triplet (a1, b1,c1) at position L1 (x1, y1) from a, b and c; signal strength triplet(a2, b2, c2) at position L2 (x2, y2) from a, b and c; and signalstrength triplet (a5, b5, c5) at position L5 (x5, y5) from a, b and c.L1, . . . , L5 are determined by using the location informationdatabase. The location information database for RF-based static sceneanalysis typically contains entries used to map RF signal metrics topositions (i.e., transfer from signal domain to space domain). Thepositions of these five locations are averaged to yield the locationestimate of the object as follows:L=(L1+L2+L3+L4+L5)/5  (2)

FIG. 31 illustrates, in one embodiment, the smallest M-polygon algorithmfor location estimate, wherein M=3. M is the number of access points, orbase stations, used for the system. M=3 gives reasonably goodperformance for the algorithm. The bridge 11, intelligent door locksystem 10 and Bluetooth LE device 21, represented as A, B, and C provideseparate candidate locations A1, A2, B1, B2, C1 and C2 that match bestwith the off-line measurements. The algorithm then searches for thepolygon that has the smallest perimeter formed by candidate locationscontributed by each reference base station, wherein one and only onecandidate from each base station must constitute a vertex of thepolygon. In FIG. 3, candidate locations A1, B2 and C2 form the smallestperimeter polygon, in this case, a triangle. The final location estimateof the object is the centroid X of the polygon:x=(A1+B2+C2)/3  (3)

In one embodiment the conventional static scene analysis maps from theradio signal domain to the space domain. The final estimate is typicallywithin a coordinate system. A main drawback of the static scene analysisis that it cannot effectively cope with the impact of errors in theradio signal domain. Due to interference and noise, objects at differentlocations might be represented similarly in the radio signal domain, aphenomenon called aliasing. The conventional methods cannot detectaliasing, and may provide these different locations with similarlocation estimates.

In one embodiment selective fusion location estimation (SELFLOC)algorithm selectively combines or fuses multiple location informationsources to yield a combined estimate in a theoretically optimal manner.The SELFLOC algorithm is disclosed in U.S. patent application Ser. No.10/330,523, filed Dec. 27, 2002, which is incorporated herein byreference.

FIG. 32 illustrates, in one embodiment, an overview of the SELFLOCalgorithm to fuse three information sources 1, 2 and 3. Each inputbranch is individually weighted by one of the weights 1, 2, and 3. Thesum of the weighted input branches provides the SELFLOC estimate.

The branch weights 1, 2 and 3 are calibrated during the off-line stageusing error feedback. A minimum mean square error (MMSE) algorithm canbe used for SELFLOC weight training and calibration. As shown in FIG. 4,three location estimates available independently are to be fused, andx-coordinates of these estimates are X1, X2 and X3. The weights forthese input branches are w1, w2, and W3 respectively. Thus, the SELFLOCestimate X could be written as:X=w1·X1+w2·X2+w3·X3  (4)

In one embodiment, a dwelling user, resource owner, or end-user securitysystem 10A is provided as illustrated in FIG. 33. In one embodiment thedwelling user, resource owner, or end-user security system 10A is awireless camera system with one or more wireless bridges 11 eachincluding a computing device 13, an internet-facing radio 15, and asecond radio 17 communicating with one or more dual-mode wirelesscameras 10C. In one embodiment the dual mode camera 10C includes acamera, a first radio 10D within communication range of the second radio17 of the wireless bridge 11, and a third internet-facing radio 10Eresponsible for transmitting video. A trigger mechanism 10F isconfigured to receive a trigger via Network Systems or directly throughhardware in communication with at least one of the bridges 11. Thetrigger mechanism 10F is configured triggers to at least one of thebridges 11 to transmit on its second radio 17 to wake up the dual modecamera 10C to transmit video on its third radio 10E. As a non-limitingexample, camera 10C can be the camera disclosed in US20040085205,incorporated fully herein by reference.

The camera 10C consumes less power in a standby mode because the firstradio 10D consumes less power when configured to receive triggers andthe third radio 10D is very efficient at transmitting video over NetworkSystems.

In one embodiment a generic input device, (hereafter “keypad”) isprovided. The key pad can be part of the intelligent door lock system orbe an accessory to the intelligent door lock system. In one embodimentthe key pad is retrofitted to an existing intelligent door lock systemafter the intelligent door lock system has been installed. It isretrofitted to the existing intelligent door lock system. In oneembodiment the keypad is installed when the intelligent door locksystem, and can be sold with the intelligent door lock system. In oneembodiment the keypad is an exterior of the dwelling user, resourceowner, or end-user and in another embodiment it is in the interior ofthe dwelling user, resource owner, or end-user.

In one embodiment the keypad includes: a battery, keypad, a Bluetoothchip and board. Optionally included are LED lighting and a proximitysensor. Suitable examples of proximity sensors are disclosed herein.

The keypad provides for entering a communication that is encrypted, inorder to gain access to the intelligent door lock system to lock andunlock. In one embodiment the communication is via BLE low energy.

In one embodiment the keypad has a BLE range of range of 20-30 feet. Inone embodiment the keypad is within 3-5 feet of the door. As anon-limiting example the keypad can have a communication distance of atleast thirty feet.

In one embodiment, the dwelling user, resource owner, or end-user,resource owner, or end-user, on initial setup programs the keypad viaits mobile device 201, or other web-enabled device. The initial setupprogram is encrypted and can be achieved with symmetric key encryption,public key encryption and the like.

The dwelling user, resource owner, or end-user, resource owner, orend-user can communicate with the keypad by a variety of differentmechanisms, including but not limited to entering digitals, letters,codes, tapping, a code with a pattern and the like.

In one embodiment the proximity sensor is integral with the proximitysensor. In one embodiment the keypad lights up as the dwelling user,resource owner, or end-user, resource owner, or end-user walks towardsthe keypad via the LED's.

As non-limiting examples the keypad can be configured to have time codesfor expiration, may only be available for a certain of time, codes canbe on a recurring identified time basis, the dwelling user, resourceowner, or end-user, resource owner, or end-user can set the availabilityof time for access via the key paid for who can use, and how often itcan be used

In one embodiment the keypad can be programmed via a bridge 11. This canbe achieved remotely.

As non-limiting examples the keypad can be utilized using a mobiledevice 201, a computing device, via an API and the like. As anon-limiting example, a delivery company can issue a pass to a deliveryperson for access to the dwelling user, resource owner, or end-user.This can be done at any time, or at a last minute via an API.

In one embodiment, illustrated in FIG. 34, a dwelling user, resourceowner, or end-user security system 10A includes a camera 10C that can becoupled to a BLE-WiFi bridge 10B, as described above and anauthorization sensing device (motion detection device) 10G which can belong range, short range, and both and the like. As non-limiting examplesthe authorization sensing device 10G can be one or more of a device tosense key fobs/key cards, mobile devices 210, microchips, devices tosense biometrics, occupancy sensors including but not limited to rRFinfrared, pressure, and optical-interrupter based sensor. In oneembodiment detection device 10G is an electronic detection device 10G.As non-limiting examples, motion detection device 10G can include anoptical, microwave, or acoustic sensor, and a transmitter forillumination. In one embodiment a passive sensor 10G can be used. In oneembodiment the intelligent security system 10A 10G can detect up todistances of at least 15 feet (5 meters).

In one embodiment the intelligent security system 10A 10G is an infrareddetector mounted on circuit board, along with photoresistive detectorfor visible light. As non-limiting examples the following technologiescan be used for the motion detection device 10G: passive infrared (PIR),micro wave which detects motion through the principle of Doppler radar,and the like, ultrasonic and the like, tomographic motion detector,video camera 10C software, and the like.

As non-limiting examples suitable motion detection devices 10G includebut are not limited to Infrared (passive and active sensors); optics(video and camera systems); radio frequency energy (radar, microwave andtomographic motion detection); sound (microphones and acoustic sensors);vibration (triboelectric, seismic, and inertia-switch sensors);magnetism (magnetic sensors and magnetometers); and the like.

In one embodiment in a first step, motion detection device 10G is usedto detect motion of an individual approaching the dwelling user,resource owner, or end-user. In a second step, if the motion detectiondevice 10G detects the approach of the individual then the camera 10C isturned on in sufficient time to take a face or body picture of theindividual. In one embodiment, motion detection of the individual andturning on of camera 10C is processed in the cloud via its server/engineand the like, and in another embodiment in an intelligent door locksystem back-end.

As a non-limiting example the first distance for the motion detectiondevice 10G to detect approach of an individual is 5 meters, 10 metersand the like and the first trigger is at 10 meters, 5 meters and thelike. As a non-limiting example the second distance to wake up camera10C can be 2 mm, and any suitable distance suffice for a camera 10C toidentify that there is a person. In one embodiment the second distancecan be 5 meters for body detection.

As the person approaching hits, as a non-limiting example, 5 meters, themotion detection device 10G says that something has happened and wakesup camera 10C, and at 2 meters determines if it is a person, the camera10C is awakened in sufficient time to take a picture, and send a noticeto the owner, to any device capable of receiving messages andnotifications, it can be sent also to the cloud, to the authorities suchas law enforcement who can then be dispatched to the dwelling user,resource owner, or end-user

In one embodiment the authorization sensing device 10G is a personsensing device, including but not limited to a button. As non-limitingexamples, the button can be a doorbell that can be integrated with adoorbell, a body or person sensing device, a hepatic device and thelike. One embodiment of a suitable doorbell is disclosed in US2004008205, incorporated herein by reference.

In other embodiments the camera 10C can be activated by an accessauthorization event. Suitable access authorization events include butare not limited to, use of an authorized mobile device 201 to unlock adoor of the dwelling user, resource owner, or end-user; detection of anapproaching face by another camera 10C that is powered, someone pressingthe doorbell via a mechanical switch, capacitive sensor that sensestouch, and the like. In other embodiment's access to a dwelling user,resource owner, or end-user is given to a person with one of theauthorized devices recited above. In one embodiment instead of adoorbell a device is provided that translates mechanical movement orcontact into an electrical signal. These devices include but are notlimited to a rocker switch, body-heat sensitive switches, capacitiveswitch, pressure sensitive switches and the like.

In one embodiment the camera 10C is activated when a person is detectedin proximity to an entrance to the dwelling user, resource owner, orend-user. As a non-limiting example this can be achieved using aproximity sensor situated inside the doorbell; by pressure sensors on adwelling user, resource owner, or end-user floor; with the use of otherproximity sensors with coverage in front of the a dwelling user,resource owner, or end-user access such as a door; and the like.

In one embodiment the camera 10C is in an interior of the dwelling user,resource owner, or end-user and the camera 10C is activated when aperson entering the dwelling user, resource owner, or end-user isdetected.

In one embodiment a power supply powers the intelligent doorbell byextracting power from the 2 leads from the dwelling user, resourceowner, or end-user without ringing the doorbell, and without affectingthe doorbells ability to ring. In one embodiment the intelligentdoorbell is a bridge 11 configured to communicate with another bridge11.

In one embodiment the camera 10C is positioned at the doorbell and isactivated by a sensor or when the doorbell is depressed. In oneembodiment a doorbell module is integrated with the camera 10C. In oneembodiment the doorbell module of a dwelling user, resource owner, orend-user is coupled to a wireless camera 10C that provides for wirelesstransmission of an image, and the like.

In one embodiment the camera is a micro-camera 10C mounted to a circuitboard and is positioned in alignment with a hole defined in a case forphotographing the visitor.

In one embodiment of the present invention, illustrated in FIG. 35, aBluetooth/WiFi bridge 11 is provided that includes, a computing device13 in an interior or exterior of a dwelling user, resource owner, orend-user 15 with an internet-facing radio 15, and a second radio 17communicating with one or more Bluetooth LE devices 21. For purposes ofthe present invention Bluetooth LE devices 21 are Bluetooth LE devices21, Bluetooth LE peripheral devices 21 and the like, are hereaftercollectively “Bluetooth LE devices 21. As non-limiting examples theBluetooth LE devices can have power from 40 mW hours to 40 W hours. Asnon-limiting examples, Bluetooth devices 21 include but are not limitedto: mobile devices 210, wearable devices, wearable devices supportingBLE, including but not limited to: Smart Wristwatches, smart bracelets,smart jewelry, smart tags, smart fobs, smart clothing, shoes, glasses,any type of wearable device, smart access control devices such as smartdeadbolts, smart doorknobs, smart doorbells, wireless video cameras 10C,wireless thermostats, automated irrigation control systems, smart lightbulbs, and the like.

In one embodiment the computing device 13 is configured to connectBluetooth LE devices 21 to the Network Systems.

In one embodiment the bridge 11 is coupled to the intelligent door locksystem 10 via secure digital keys distributed by Cloud lock accessservices Lock Access Services.

In one embodiment the bridge 11 allows BLE devices in the dwelling user,resource owner, or end-user to interact with the cloud lock accessservices and with other Internet-connected devices via the intermediarythat is the cloud lock access services. It will be appreciated that thedwelling user, resource owner, or end-user includes all structuresbesides homes.

In one embodiment the bridge 11 determines signal strength between thebridge 11, and the Bluetooth LE device 21. In another embodiment thebridge 11 determines signal strength of between the bridge 11, theBluetooth LE device 21 and the intelligent door lock system 10A.

The retrieved signal strength processed . . . . It one embodiment, asdescribed below, a triangulation algorithm is applied between the bridge11, the Bluetooth LE device 21 and the intelligent door lock system.

In one embodiment the bridge 11 uses detection of known Bluetoothdevices and peripheral devices, hereafter collectively Bluetooth devices21, tied to specific individual people in the interior or at an exteriorof the dwelling user, resource owner, or end-user. The bridge 11 trackssignal strength over time to: (i) determine if known or unknown peopleare inside or outside the dwelling user, resource owner, or end-user,(ii) if people are approaching the dwelling user, resource owner, orend-user, entering the dwelling user, resource owner, or end-user,exiting the dwelling user, resource owner, or end-user, moving away fromthe building and the like. In one embodiment the bridge 11 with thedetection of the presence of a Bluetooth device 21 relays lockoperations of the intelligent door lock system (manual or via a mobileapplication), door 12 movements, door 12 knocks to allow making thesedeterminations of presence and movement with an algorithm as set forthbelow.

In one embodiment the bridge 11 interacts with the cloud lock accessservices to gather and relay data. This data can be gathered and storedlocally, at the back-end 68, and in a cloud lock access services baseddata layer. This is then used to determine the location and movement ofpeople in and out the dwelling user, resource owner, or end-user.

In one embodiment the bridge 11 discovers the intelligent door locksystem 10 over a Bluetooth device 21 networking. In one embodiment thisis achieved by the bridge discovering lock devices 22 and theiravailable services by scanning the Bluetooth LE 21 network for connecteddevices, advertising their presence and their services for obtaininglock device 22 status (secured or unsecured), communicates lock device22 activity, communicates door 12 activity (door 12 opening and closing,door 12 knocks, and the like) and operates the lock to lock and unlockthe bolt 24 to secure or unsecure the lock device 22.

In one embodiment the bridge 11 provides communication to otherBluetooth devices 21 without the use of a mobile device 201. Asnon-limiting examples, the bridge 11 allows: WiFi-enabled devices in adwelling user, resource owner, or end-user to interact with Bluetoothdevices 21 in the dwelling user, resource owner, or end-user;WiFi-enabled devices in a dwelling user, resource owner, or end-user tointeract with the intelligent door lock system 10 over Bluetooth; allowsa Bluetooth device 21 in a dwelling user, resource owner, or end-user tointeract with Internet-based services and API's using a dwelling user,resource owner, or end-user's home WiFi network and Network Systemconnection; allows people to operate an intelligent door lock system andother Bluetooth devices over a Network System from anywhere outside adwelling user, resource owner, or end-user; extend network coverage ofBluetooth devices in a dwelling user, resource owner, or end-user inorder to understand who is in the dwelling user, resource owner, orend-user, who is away, who is coming and who is going when doors 12 andlock devices 22 are operated and the like.

In one embodiment the bridge 11 extends Network System coverage ofBluetooth devices 21 other than lock devices 22 to performdevice-specific operations, including but not limited to: gatheringinformation about the presence of the Bluetooth device 21, theoperational status of the Bluetooth device 21, the operational historyof the Bluetooth device 21 and performing Bluetooth device 21 specificoperations including but not limited to: turning the Bluetooth device 21off and on, changing the mode of operations of the Bluetooth device 21,changing the operational settings of the Bluetooth device 21 andscheduling these device operations based on ad hoc, daily, weekly,monthly or other schedules.

In one embodiment the intelligent door lock system 10 trusts the bridge11 for commands (remote status) after an intelligent door lock systemowner or designee is registered at the back-end of the intelligent doorlock system using a cloud lock access services-based access system thatgrants the bridge 11 access to the intelligent door lock system 10.

In one embodiment the intelligent door lock system 10 owners or designeerants the bridge 11 access to the lock device 22 by using their digitalcredentials, which can be stored at the cloud lock access services or atthe back-end 68, to pair a specific bridge 11 with a specificintelligent door lock system 10 grant specific rights. As non-limitingexample, the specific rights include but are not limited to, gatheringof status and operational history of the system 10, triggering lockdevice 22 operations in real-time, as well as applications forinterfacing with the bridge 11 and a Bluetooth device 21.

In one embodiment the bridge 11 is used to determine if an intelligentdoor lock system 10 owners or designee with a non-internet connectdevice is at an interior or an exterior of a dwelling user, resourceowner, or end-user.

In one embodiment the bridge 11 is used to determine if the person isapproaching or moving away from the dwelling user, resource owner, orend-user. In one embodiment the bridge 11 measures the signal strengthof the Bluetooth LE devices 21.

In one embodiment as a Bluetooth LE device 21, coupled to a person movesaway from the bridge 11 the signal strength decreases, as more fullydiscuss hereafter. Similarly, as the signal strength increases thisindicates that a person with the Bluetooth LE device is approaching thedwelling user, resource owner, or end-user.

In one embodiment, each room of a dwelling user, resource owner, orend-user with the intelligent door lock system has a bridge 11. Inanother embodiment, the major rooms of the dwelling user, resourceowner, or end-user each have a bridge 11.

In one embodiment the bridge 11 learns habits, movements, and the likeof the intelligent door lock system 10 owners or designee.

In one embodiment a triangulation is provided between the bridge 11, theintelligent door lock system 10 and a Bluetooth LE device 21, as morefully explained hereafter.

In one embodiment the computing device 13 provides for coordination ofinformation flow between the two radios 15 and 17. The computing device13 is configured to enable the two radios, 15 and 17 to communicate andtake incoming and outgoing information from one radio into a format thatthe other radio can transmit and receive. The internet facing radio 15is configured to communicate through a router 25 to the Network Systemsand the BLE LE devices 21 connect to Network Systems via one of theradios 15, 17 through the computing device 13 through the internetfacing radio 15 through the router 25 to Network Systems, with thebridge 11 communicating with a data center 27. In one embodiment arouter is not required when an alternative bridge 11 is constructed tobridge 11 between cellular and BTLE.

In one embodiment the internet facing radio is configured to communicatethrough the router 25 to Network Systems. The Bluetooth LE devices 21connect to Network Systems, via the computing device 13, with the bridge11 communicating with a data center 27.

The computing device 13 provides for coordination of information flowbetween the two radios 15 and 17. Because most radios speak in differentfrequencies or protocols, packet sizes, and the like, the computingdevice 13 enables the two radios 15 and 17 to communicate, takesincoming and outgoing information from one radio into the proper formatthat the other radio can transmit and receive. In one embodiment thecomputing device makes the first and second radios 16 and 18 the samething.

In one embodiment a wall wart in the dwelling user, resource owner, orend-user is configured to communicate with other Bluetooth devices,including but not limited to redundant or backup power supplies,redundant data communications connections, environmental controls (e.g.,air conditioning, fire suppression) and various security devices,thermostats, audio systems, appliances, gates, outdoor electricalequipment and the like.

In one embodiment the internet facing radio 15 is configured tocommunicate through the router 25 to Network Systems and Bluetooth LEdevices 21 connected to Network Systems via the computing device 13. Thebridge 11 communicates with the data center 27.

In one embodiment the computing device 13 is a wall wart, and equivalentelement, which is a power adapter that contains the plug for a walloutlet.

In one embodiment the radios 15 and 17 transmit radio waves forcommunication purposes.

In one embodiment the bridge 11 provides at least a partial probabilityanalysis of where a person with a Bluetooth LE device 21 is located, aswell as to the existence of an adverse condition including but notlimited to entrance via a window or door to the dwelling user, resourceowner, or end-user.

Referring to FIG. 36 in one embodiment the intelligent door lock system10 server and/or cloud based server provides third party secured accessto a dwelling user, resource owner, or end-user, which can byprogrammatic, which can be via a mobile device 201 application. A systemand method is provided that specifies a process for dwelling user,resource owner, or end-user, resource owner, or end-user to authorizethird-party access to dwelling user, resource owner, or end-user via theintelligent door lock system without sharing their credentials. Thesystem and method grants access credentials to someone in a securemanner. In one embodiment the authorization works with HTTP and allowsaccess tokens to be issued to third party secured access to a dwellinguser, resource owner, or end-user, which can by programmatic via anauthorization server, with the approval of the dwelling user, resourceowner, or end-user occupant/or owner, or end-dwelling user, resourceowner, or end-user of the dwelling user, resource owner, or end-user.The third party secured access to a dwelling user, resource owner, orend-user, which can by programmatic then use the access token for accessto the dwelling user, resource owner, or end-user hosted by the server.

Third party secured access to a dwelling user, resource owner, orend-user, which can by programmatic is protected access in that it is anaccess control code that is running on the server. The third securedaccess to the dwelling user, resource owner, or end-user can beautomatically revoked, along with automatic revocation of accesscredentials.

In one embodiment credentials are granted for third party secured accessto a dwelling user, resource owner, or end-user, which can byprogrammatic, in a secure manner via the server. In one embodiment theserver communicates with a server of the third party secured access to adwelling user, resource owner, or end-user, which can by programmatic.As a non-limiting example, the third party secured access to a dwellinguser, resource owner, or end-user, which can by programmatic can be aservice provider, including but not limited to grocery delivery, housingcleaning company/person, package delivery organizations, including butnot limited to FedEx, UPS, grocery delivery, house cleaning, and thelike, as defined above.

In this embodiment the dwelling user, resource owner, or end-user,resource owner, or end-user, grants to a third party secured access to adwelling user, resource owner, or end-user, which can by programmatic,which can be via the intelligent door lock system 10. The access can beat a certain time of day/night, and for a certain length of time. In oneembodiment a mobile device 201 is utilized or a keypad can also be used.In one embodiment the third party secured access to a dwelling user,resource owner, or end-user, which can by programmatic asks for acustomer account of an organization that has been granted previousaccess to the dwelling user, resource owner, or end-user. The company isable to give its employees, consultants, associates and the like, accessto the dwelling user, resource owner, or end-user via the intelligentdoor lock system. In one embodiment the access is granted at a certaindate and time. In one embodiment one or more cameras 10C are utilized tovideo the activities of the person granted access to the dwelling user,resource owner, or end-user. In one embodiment a first camera 10C is atthe interior and a second one is at the exterior to video the actions ofthe third party secured access to a dwelling user, resource owner, orend-user, which can by programmatic. In one embodiment the videos can beuplifted and sent to the third party employer, and the like formonitoring every activity and movement. An accessible database can beprovided and used by the third party service provider.

As a non-limiting example, third party secured access to the dwellinguser, resource owner, or end-user, which can be programmatic, isauthenticated by a back end of intelligent lock system 10 or via theCloud, and authorized with a resetting of the lock.

Notifications are provided to a third party system of the third partygranted secured access to the dwelling user, resource owner, orend-user, along with an audit trail that can be stored for a definedtime period, as well as perpetually.

In one embodiment there can be a transfer of access rights to a newresident of the dwelling user, resource owner, or end-user for secure,authorized access to the dwelling user, resource owner, or end-user. Asa non-limiting example this is a secure transfer of rights, and theoriginal occupants or owners or end-users of the dwelling user, resourceowner, or end-user is then dissociated with access rights withoutfurther rights, and can include resetting, and a change of credentials.

In one embodiment this is achieved using server which maintains accessright privileges. The server is an intermediary. The person with thedwelling user, resource owner, or end-user and the intelligent door locksystem 10 grants permission via server to give third party securedaccess to the dwelling user, resource owner, or end-user, which can beprogrammatic. Because that third party secured access to the dwellinguser, resource owner, or end-user, which can by programmatic, includingbut not limited to a service provider is authorized, they can givetemporary rights to an individual or dwelling user, resource owner, orend-user service provider, and then the occupant or owner or end-user ofthe dwelling user, resource owner, or end-user, and lock system 10 canrevoke those rights at any time, for one or all. As non-limitingexamples cameras 10C are utilized to see the person entering or exitingthe dwelling user, resource owner, or end-user. It will be appreciatedthat cameras 10C as optional. Without the use of cameras 10C the dateand time of a third party secured access to a dwelling user, resourceowner, or end-user, which can by programmatic unlocking or locking theintelligent door lock system 10 is provided to the third party securedaccess to a dwelling user, resource owner, or end-user, which can byprogrammatic, such as a service provider, as well as the person with thedwelling user, resource owner, or end-user and intelligent door locksystem.

In one embodiment a lock system is coupled to a lock at a dwelling of adwelling user, resource owner, or end-user, collectively the user. Anintelligent door lock system is provided with a remotely operable lockat the dwelling accessable by the user, as illustrated in FIG. 37. Theintelligent door lock system 10 is configured to be in communicationwith a server 510. An automatic unlock system is activated when the usercommunicates with the server 510 using the user's mobile device 210. Theserver 510 is configured to transmit a crossing notification message inresponse to tracking the user's mobile device 210 and enable anautomatic unlock feature of the lock using the server 510 and a mobiledevice App

In one embodiment when the dwelling user, resource owner, or end-user,resource owner, or end-user enables an automatic unlock of system 10 itcan view its current location on a map as a means of visual verificationthat it is being set up properly. In one embodiment a dwelling user,resource owner, or end-user threshold region can be viewed and/oradjusted by the dwelling user, resource owner, or end-user, resourceowner, or end-user. In this embodiment the dwelling user, resourceowner, or end-user, resource owner, or end-user implicitly indicatesthat when it has left the area then on returning to the area thedwelling user, resource owner, or end-user, resource owner, or end-userwould like its door unlocked as the dwelling user, resource owner, orend-user, resource owner, or end-user approaches it. A dwelling user,resource owner, or end-user threshold region can be adjusted larger tocompensate for poor GPS positioning available in a remote dwelling user,resource owner, or end-user region.

As a non-limiting example the following steps can be followed. Thedwelling user, resource owner, or end-user, resource owner, or end-userexits the dwelling user, resource owner, or end-user. One or both innerand outer geo-fences 512, 514 can be exited. In the event that bothgeo-fences 512, 514 are exited after a certain period of time door 12 isthen locked. When the inner fence 512 is only exited system 10 does notlock door 12. The server 510 can enable detailed GPS detection to verifythat the dwelling user, resource owner, or end-user, resource owner, orend-user has left the area defined by geo-fences 512 and 514. Thedwelling user, resource owner, or end-user, resource owner, or end-usercan enter outer geo-fence 514 and mobile device 210 App wakes up.Dwelling user, resource owner, or end-user, resource owner, or end-usermobile device 210 examines a sufficient to determine whether to activateBluetooth and search for door 12 in order to unlock door 12. The datacan include, time spent outside geo-fence 512 or geo-fence 514, time ofday, past dwelling user, resource owner, or end-user, resource owner, orend-user activity patterns, dwelling user, resource owner, or end-user,resource owner, or end-user habits, motion data recorded (including butnot limited to driving activity, walking or running activity, and thelike), dwelling user, resource owner, or end-user, resource owner, orend-user activity data, WiFi access point information and the like. Theserver 510 can enable detailed GPS detection to verify that the dwellinguser, resource owner, or end-user, resource owner, or end-user hasreturned to the dwelling user, resource owner, or end-user. Using thisinformation the server 510 decides if the dwelling user, resource owner,or end-user, resource owner, or end-user is returning to the dwellinguser, resource owner, or end-user.

The server 510 synthesizes the configuration data (which can includethresholds and probabilities) with the activity data on the service anddetermines if the dwelling user, resource owner, or end-user, resourceowner, or end-user is returning to the dwelling user, resource owner, orend-user. In the case where there are multiple geo-fences, e.g., morethan just inner geo-fence 512, the server 510 can decide multiple timesif this is true in order to determine if the dwelling user, resourceowner, or end-user, resource owner or end-user is returning to thedwelling user, resource owner, or end-user. Bluetooth is activated onthe dwelling user, resource owner, or end-user, resource owner, orend-user's mobile phone to search for the dwelling user, resource owner,or end-user lock. When the lock is detected the server 510 connects toit, establishes a secure connection, unlocks door 12, and can notify thedwelling user, resource owner, or end-user, resource owner, or end-uservia mobile device 210 that door 12 has been unlocked.

System 10 receives notifications when the dwelling user, resource owner,or end-user, resource owner, or end-user has left and entered the areaas defined by the one or more geo-fences 512, 514. At least a portion ofthe Bayesian algorithm, or other filtering algorithm, filters spuriouslocation events that can be erroneous due to environmental or technicalglitches, which as a non-limiting example can be a power outage. Ifsystem 10 sees that the dwelling user, resource owner, or end-user,resource owner, or end-user has entered the dwelling user, resourceowner, or end-user area less than 90 seconds after entering, then system10 can discard it.

In one embodiment of the present invention first and second geo-fences512 and 514 are provided, also known as inner and outer geo-fences 512and 514. When first and second geo-fences 512 and 514 are exited, aftera certain time period door 12 is then locked or a notification is sentwarning the user door 12 at the user's dwelling has been unlocked. Ifthe first geo-fence 512 is only exited system 10 may not lock door 12.User's mobile device 210 can also enable detailed GPS detection toverify that the user has left the area.

In one embodiment of the present invention an automatic-unlock uses amobile device's 210 location features to tell when the mobile device 210dwelling user, resource owner, or end-user, resource owner, or end-userhas left a geo-fence 512 and/or 514 in an area outside of a dwellinguser, resource owner, or end-user. As a non-limiting example, this canbe considered the first geo-fence 512, second geo-fence 514, both orjust one. At a later time when the mobile device 210 dwelling user,resource owner, or end-user, resource owner, or end-user returns to itsneighborhood an app of the mobile device 210 prepares to connect to theintelligent door lock system 10 via the system server 510 and/or cloudbased server 510. As the mobile device 210 owner approaches an entranceto the dwelling user, resource owner, or end-user the intelligent locksystem 10 can automatically unlocks a door 12.

In one embodiment the automatic unlock feature is on the dwelling user,resource owner, or end-user, resource owner, or end-user's mobile device210 app that uses the dwelling user, resource owner, or end-user,resource owner, or end-user's mobile device 210 location features totell when dwelling user, resource owner, or end-user, resource owner, orend user leaves. At this point the first geo-fence 512 is triggered. Asa result of dwelling user, resource owner, or end-user, resource owner,or end user leaving the geo-fence 512/514 is triggered, and whendwelling user, resource owner, or end-user, resource owner, or end useris at the dwelling user, resource owner, or end-user, the geo-fence512/514 is on and the Bluetooth is also on. At entrance to the firstgeo-fence 512, the Bluetooth is turned on and the Bluetooth creates asignal to unlock system 10. There is no need for dwelling user, resourceowner, or end-user, resource owner, or end user to utilize its mobiledevice 210.

When dwelling user, resource owner, or end-user, resource owner, or enduser enables an automatic unlock of system 10 it may view its currentlocation on a map as a means of visual verification that it is being setup properly. A home threshold region can be viewed, adjusted and thelike by the dwelling user, resource owner, or end-user, resource owner,or end-user. In one embodiment dwelling user, resource owner, orend-user, resource owner, or end user implicitly indicates that when ithas left the area then upon returning to the area dwelling user,resource owner, or end-user, resource owner, or end user would liketheir door 12 unlocked as dwelling user, resource owner, or end-user,resource owner, or end user approaches the door 12. A home thresholdregion is provided that can be adjusted larger to compensate for poorGPS positioning. As a non-limiting example this can be caused when thedwelling user, resource owner, or end-user is in a remote region and thelike.

As dwelling user, resource owner, or end-user, resource owner, or enduser exits the dwelling user, resource owner, or end-user the first andsecond geo-fences 512 and 514 are exited. When this occurs, after acertain time period the door 12 is then locked. If the first geo-fence512 is only exited system 10 may not lock the door 12. The system 10server 510 and/or cloud based server 510 can enable detailed GPSdetection to verify that dwelling user, resource owner, or end-user,resource owner, or end user has left the area.

In one embodiment as dwelling user, resource owner, or end-user,resource owner, or end use renters the second geo-fence 514 an app onthe dwelling user, resource owner, or end-user, resource owner, orend-user's mobile device 210 wakes up and examines a host of data todetermine whether to activate Bluetooth of the mobile device 210 andsearch for the door 12 to unlock. As non-limiting examples the data caninclude: the amount of time spent outside the first or second geo-fence512, 514 respectfully, time of day, past dwelling user, resource owner,or end-user, resource owner, or end-user activity patterns, motion datarecorded device (including driving activity, walking or runningactivity), WiFi access point information. The system 10 server 510and/or cloud based server 510 can enable detailed GPS detection toverify that dwelling user, resource owner, or end-user, resource owner,or end user has returned home.

Using this information the system 10 server 510 and/or cloud basedserver 510 determines if dwelling user, resource owner, or end-user,resource owner, or end user is returning to the dwelling user, resourceowner, or end-user. The dwelling user, resource owner, or end-user,resource owner, or end-user's mobile device 210 synthesizesconfiguration data (which can include thresholds and probabilities) withactivity data on the system 10 server 510 and/or cloud based server 510and determines if dwelling user, resource owner, or end-user, resourceowner, or end user is returning to the dwelling user, resource owner, orend-user. Mobile device 210 can employ this logic multiple times over aperiod of time as input data changes to decide whether mobile device 210believes that the user is returning home.

The Bluetooth is activated on the dwelling user, resource owner, orend-user, resource owner, or end-user's mobile phone to search for thedwelling user, resource owner, or end-user, resource owner, orend-user's dwelling user, resource owner, or end-user lock. When thelock is detected the system 10 server 510 and/or cloud based server 510connects to it, establishes a secure connection, unlocks door 12, andnotifies dwelling user, resource owner, or end-user, resource owner, orend user via notification that door 12 has been unlocked.

System 10 receives notifications when dwelling user, resource owner, orend-user, resource owner, or end user has left and entered the area.Spurious location events are filtered out that could be erroneous due toenvironmental or technical glitches. As a non-limiting example this canbe a power outage. If the system sees that dwelling user, resourceowner, or end-user, resource owner, or end user has entered the homearea less than a selected period of time a debounce signal, from thesystem 10 server 510 and/or cloud based server 510, 90 seconds afterentering, then the system may discard it.

In one embodiment a debounce is provided by the system and/or cloudbased server 510 such that dwelling user, resource owner, or end-user,resource owner, or end user leaves and is outside a geo-fence 512, 514(a second geo-fence as described hereafter), and the like for a selectedperiod of time in order for an entrance to trigger a Bluetoothconnection to the lock to unlock of door 12. With the debounce thedwelling user, resource owner, or end-user, resource owner or end usercan leave, come back quickly, and then is not considered to have leftthe dwelling user, resource owner, or end-user. The use of the debounceeliminates false unlocking of system 10 when dwelling user, resourceowner, or end-user, resource owner, or end user is at the dwelling user,resource owner, or end-user home and artifacts from cell tower, WiFi andother systems that provide assistance providing location data are faultyand incorrectly assert that the user has left the dwelling user,resource owner, or end-user.

In one embodiment intelligent door lock system 10 is configured to havea remotely operable lock 12 at a dwelling accessable by the user. Theintelligent door lock system 10 configured to be in communication with aserver 510. The user communicates with the server 510 using the user'smobile device 210 and the server 510 is configured to transmit acrossing notification message in response to tracking the user's mobiledevice 201 and enable an automatic unlock feature of the lock using theserver 510 and a mobile device 201 App.

In one embodiment a second geo-fence 514 is provided, or the firstgeo-fence 512 is extended, for early entrance detection. The secondgeo-fence 514 is larger than the first geo-fence 512 and can be ofdifferent geometric configurations. The second geo-fence 514increases/decreases and a combination of both, the first geo-fence 512.In one embodiment the second geo-fence is adjustable 514. The secondgeo-fence 514 increases sensitivity

In another embodiment a map view position and radius adjustment is made.In this embodiment system 10 does not unlock until after the mobiledevice 210 owner has manually performed an unlock.

In one embodiment data is collected and false motion data is filteredout.

In one embodiment mobile device 210 stores data over time as eventsoccur. As non-limiting examples this can include, motion data, geo-fenceregions exited or entered and the like. Any configuration of parametersfrom the server 510 can be downloaded at any time as well. Eachgeo-fence 510/512 is associated with a lock or door 12. When a geo-fencearea has been entered, the mobile device 201 collects the history ofcrossing geo-fences for that lock and creates a data set along withother live data, including but not limited to WiFi access point data,accumulated motion data during the time the user was outside a geo-fencefence, time of day, and other information. That information is processedbased on the configuration data, producing a limited set of parameterstypes and associated values. These are fed to a decision making engineof mobile device 210, which may be a Bayesian filter, and the like, thatassociates different probability value on each of these parameters, andcombines it to form a single yes no decision on whether the user desiresits door 12 is locked or unlocked. In the unlocked case, the deviceenables Bluetooth and begins trying to connect to the dwelling user,resource owner, or end-user lock. When the dwelling user, resourceowner, or end-user lock is connected the device unlocks door 12. In thecase of the lock being bridged to the internet via Wireless access pointBluetooth is not used, the mobile device 210 connects to the bridge 11via Network system. The lock is then locked or unlocked remotely bymobile device 210 using the Network System to a cloud service and/orsystem 10 backend that establishes a secure connection to the lock. Inthis embodiment there is a wall wart, doorbell, or another device thatincludes Bluetooth and is within an appropriate distance of door 12.

In one embodiment security system 10A is an intelligent security systemthat produces fewer false alarms or alerts. In one embodiment securitysystem 10A uses motion detection device 10G to look for an actualperson, which can be, an outline of a person at or near the door 12, orother entrance to the dwelling. If motion detection device 10G withcamera 10C sees a person, an outline of a person and the like, an alertis sent to the dwelling user, resource owner, or end-user mobile device210. The dwelling user, resource owner, or end-user views the video,picture and the like taken by camera 10C and has various optionsincluding but not limited to: determine who is at the dwelling;communicate with the person who is at the dwelling; notify authoritiesof an unwanted person at the dwelling; unlock or lock the dwellingincluding but not limited to door 12, a window and the like in order toallow or deny access to the person.

In one embodiment intelligent security system 10A is split into aplurality of parts. As a non-limiting example intelligent securitysystem 10A can be split into: (i) an intelligent security system 10Aused to wake up the motion detection device 10G and prepare for a videocall; (ii) detect motion, with or without person detection; (iii) detectpeople at the dwelling without linger detection; and (iv) detect peopleat the dwelling and linger.

As a non-limiting example intelligent security system 10A triggersmotion detection device 10G to wake up and turn on camera 10C whenmotion is triggered. As a non-limiting example one use of thiscapability is to prepare for a video call in response to a doorbellpress. When motion is detected, camera 10C takes a still image to beused in a notification and make other preparations for a video call tothe dwelling occupant in the event that the doorbell is pressed, or thedwelling occupant initiates a video call in response to a motion/personnotification. As a non-limiting example motion detection device 10G doeswhatever is possible ahead of time to speed up the perceived connectiontime of notice to the dwelling occupant which can be a video call, andthe like

When the short range motion detection device 10G is triggered, thedoorbell wakes up and camera 10C takes a still image. A countdown to atimeout begins.

If the doorbell button is pressed before the timeout, a doorbell pressnotification is sent to dwelling user, resource owner, or end-user and amotion notification is not sent.

If the doorbell button is not pressed before the timeout, a motionnotification can be sent.

As a non-limiting example mobile device OS motion notification caninclude the following text or equivalent: “Motion detected at <doorname> at <house name>”. The in-app accept/reject UI can be the same asfor a button press except with the following differences: (i) it canhave the following text: “Motion detected at <door name> at <housename>”; (ii) it will display the still image taken by camera (10C) whenit was awakened by the motion it detected; (iii) red X and green checkicons can remain the same but the labels below them can be “Dismiss” and“View”, note: the timeout can be a variety of different times. As anon-limiting example it can be 5-10 second range, although other rangescan be utilized; (iv) a motion event can be put into an activity feedwith the image taken in response to the motion, and this can happenregardless of whether the dwelling user, resource owner, or end-userresponds to the notification.

In one embodiment if the dwelling user, resource owner, or end-user taps“View” to initiate a video call, an on-demand video session can be putinto the activity feed. In this embodiment, there can be two events inthe activity feed, one for the motion and one for the video call.

In one embodiment toggle settings can be provided in settings toenable/disable motion alerts. In one embodiment person notifications areprovided. As a non-limiting example the person notifications are sent tothe dwelling user, resource owner, or end-user.

As a non-limiting example person detection can be based on whether thereis a person in the frames captured by the camera 10C which can beincluded with the doorbell as described above. As a non-limiting examplethere is detection of via camera 10C/doorbell and the like. In oneembodiment there is not checking that the same person is being detectedin every frame captured by camera 10C.

When either the long range or short range motion sensor 10G istriggered, camera 10C/doorbell wakes up, takes a still image andinitiates intelli-vision analytics. Camera 10C/doorbell can continuetaking still images, save them, and feed them to the server, see FIGS.25A-E.

A countdown to a timeout can begin.

If the doorbell button is pressed before the timeout, a doorbell pressnotification can be sent, and no motion or person notification is sent.

If the doorbell button is not pressed before the timeout, either amotion notification or a person notification is sent.

If the analytics engine does not detect a person at any time during thetimeout period, a motion notification is sent as described above.

If the analytics engine does detect a person, at any point during thetimeout, a person notification is sent.

In one embodiment the mobile device OS notification can have thefollowing text: “Person detected at <door name> at <house name>”. In oneembodiment the in-app accept/reject UI is the same as for door bellpress, but may not have the following text: “Person detected at <doorname> at <house name>”. In one embodiment it can display the first imageand the server/analytics engine tags as containing a person. The red Xand green check icons can remain the same, but the labels below them canbe “Dismiss” and “View”.

The timeout period is then selected. As a non-limiting example this canbe 5-10 seconds. It will be appreciated that other periods of time canbe used for the timeout period.

In one embodiment Person events are placed in the Activity Feed the sameway described above for motion events. In one embodiment the motion andperson events are mutually exclusive. For a given activation of theintelligent security system 10A, a person event or motion event can beplaced into the Activity Feed, not both.

In one embodiment on demand video session events in the Activity Feedwork the same as described above. As a non-limiting example these eventscan include addition to motion/person events.

In one embodiment there are two toggles in settings, one toenable/disable motion notifications, and the other to enable/disableperson notifications. The defaults for these settings need to bedetermined. In one embodiment the person notifications can be on bydefault and motion notifications can be off by default.

Lingering notifications can be selected.

In one embodiment “Person Notifications” only detects whether a framecontains a person. It does nothing to track a person from frame toframe, or to determine if it's the same person in each frame. The resultis that on a busy street where people frequently pass by the doorbelland or camera 10C, the person notification feature is triggered, eventhough no one person is actually lingering in front of door 12. Thisissue can be addressed using the server/analytics engine's ability todetect lingering. From a user perspective, the feature can operate thesame way and can surface the same settings. In one embodiment system 10only sends person notifications when we detect that the same person islingering in front of the door 12, window and the like. This providesbetter accuracy and fewer false person notifications.

In one embodiment camera 10C is coupled to an analytics engine. Theanalytics engine includes a person detection module which wakes camera10C from the sleep state earlier.

In one embodiment intelligent security system 10A has reduced latency.In one embodiment the reduced latency is achieved by the analyticsengine/person detection module. As a person approaches and comes to door12 or any dwelling available entrance, including but not limited to awindow, and the like, camera 10C is activated with or with pressing thedoorbell, wakes up from a sleep mode and the intelligent security system10A is ready to go. Motion detection device 10G, with or withoutanalytics engine, wakes camera 10C up from the sleep mode and when theperson is at the entrance of the dwelling the camera is set to take apicture, video with one or more frames, and the like. This reduceslatency and improves speed. As a non-limiting example activation ofcamera 10C integrated or not integrated with the doorbell, from thepressing of the doorbell, when the doorbell and camera 10C are coupledand/or integrated to the sending of a picture or video to a mobiledevice 210 can be on the order of 30 seconds or less. This results frommotion detection device 10G starting recognition of a person or anobject at an earlier time. When the person is at the dwelling entrancecamera 10C is then is set to start recording.

In one embodiment security system 10A has reduced power consumption. Inthis embodiment the security system 10A camera 10C is only started upfrom its sleep state to a wake state when something passes by and/or isin a selected distance relative to camera 10C which is detected by. Moreparticularly the person detection module is used along or without motiondetection device 10G to determine if something or someone passes by. Inresponse to that determination, if a person or something similar to aperson passes by, camera 10C is awakened and put in an active state.This results in a savings of power because camera 10C is in active stepless often.

ENCRYPTION

In one embodiment a server 510 is in communication with the intelligentdoor lock system 10. In another embodiment instead of the intelligentdoor lock system 10, a low power device that communicates with smallpayloads is used instead of the intelligent door lock system 10. In oneembodiment low power means running off of consumer batteries. In oneembodiment a small payload is 12 bytes or less. The server 510 has ahandshake key (Kh) with a key exchange that provides for a communicationsession between a mobile device 210 and the intelligent door lock system10. The mobile device 210 does not have the (Kh). A user mobile device210 is in communication with the server 510 and uses a cipher to providea secured communication between the mobile device 210 and theintelligent door lock system 10.

In one embodiment cipher block chaining is utilized to provide thesecured communication.

In one embodiment an initialization is done when the intelligent doorlock system 10 and/or the lock 22 is created. In one embodimentcommunication is initialized by generating a session nonce (Ns) on themobile device 210. In one embodiment the session nonce is encryptedusing a handshake key (Kh) that is at the server 510. In one embodimentthe (Kh) is a shared secret known to intelligent door lock system 10 andto an entity encrypting the nonce that includes the server 510. In oneembodiment the intelligent door lock system 10 modifies the nonce andreturns a modified value to the mobile device 210. In one embodiment

An entity with the server 510 has the (Kh) decrypts a session key andthe mobile device 210 uses that to encrypt subsequent communication,wherein the intelligent door lock system 10 generates the session keyand provides for an unlocking of a lock 22 at the intelligent door locksystem 10.

In one embodiment when the intelligent door lock system 10 is assembleda random number is provisioned on the mobile device 210.

In one embodiment the (Kh) can be common to all locks 22 of a given lockmodel.

In one embodiment the (Kh) is a shared secret between the server 510 andall locks 22 of a model class.

As a non-limiting example the (Kh) is exchanged for a unit-specific unitkey (Kh). As a non-limiting example the (Kh) is a random number.

In one embodiment the server 510 associates the (Kh) with a uniqueidentification of a lock 22 of the intelligent door lock system 10. Inone embodiment the cloud service responds to the mobile device 210 witha unit key encrypted using an open block cipher. As a non-limitingexample the server 510 sends the (Kh) to the lock 22 and the lock 22stores it in a non-volatile memory, with the (Ku) used as a handshakekey. In one embodiment the mobile device 210 generates two randomnumbers that are communicated with the server 510 to create one/half ofthe (Kh). In response the server 510 generates one or more randomnumbers to create a second half of the (Kh). For each of session theserver 510 creates a different set of one or more numbers for the secondhalf of the (Kh).

In one embodiment in response to the server 510 creating the second halfof the (Kh) the mobile device 210 functions without having the (Kh)

In one embodiment the mobile device 210 generates a checksum. In oneembodiment the mobile device 210 creates a request for a privatecommunication and in response the server 510 creates a second half ofthe (Kh) without the mobile device 210 having the (Kh). In response totransmission of the (Kh) a session is initiated that provides forunlocking of the door 12. A production of half of the (Kh) by the mobiledevice 210 is an initiation of a request for packet for a privatecommunication and thereafter a validation of a source is conducted.

As a non-limiting example a third party mobile device 210 never has onits mobile device 210 an encryption for the intelligent door lock system10.

Encryption Example 1

Terms:

The following terms are used: encryption function: e (key, block)

decryption function: d(key, block)

random number function r(number)

The handshake key will be called Kh

The generated session key, Ks

A 32-bit constant used during Initialization, IC

A 32-bit constant used during Initialization, RC

mFooBar means foobar for the mobile device 210

lFooBar means foobar for the lock (it's an el not an eye).

Communication is initialized by generating a session nonce (Ns) on themobile device 210. This session nonce is encrypted using a handshake key(Kh). The handshake key is a shared secret known to the lock and to theentity encrypting the nonce. The lock then modifies the nonce andreturns the modified value to the mobile device 210. The entity that hasthe handshake key then decrypts the session key and the mobile device210 uses that to encrypt subsequent communication.

Factory Initialization

When the lock is assembled, a 16-byte key (random number) can beprovisioned on the device. This key can be common to all locks of agiven model and referred to as model key (Km). The model key is a sharedsecret between the August API server 510 and all locks of that modelclass. It can only be used at setup or factory reset time to exchange anew, unit-specific unit key (Ku).

Owner Initialization

When the owner of the lock sets it up for the first time, or after afactory reset of the lock, the mobile application can generate a 16-byterandom number and send it to the server 510. This number can be referredto as the unit key (Ku). The API server 510 associates the unit key withthe unique ID of the lock. This is a shared secret between the lock andthe service.

After associating the unit key with the lock, the service responds tothe mobile device 210 with the unit key encrypted using AES CBC. Themobile device 210 then sends this key to the lock and the lock stores itin non-volatile memory. This unit key can be used as the handshake key(Kh) in future communications.

The mobile device 210 generates a key, sends it to the service server510 for encryption.

When a mobile device 210 has authenticated against the August REST APIand has been authorized to communicate with a particular lock, itgenerates two 32-bit random values: mRand1 and mRand2, which combinedconstitute the session nonce (Ns).

It also generates a 32-bit checksum that is the 2s-complement sum forthe two random numbers.

The service server 510 encrypts the key, sends encrypted data back tomobile device 210.

This set of numbers is transmitted to the server 510, where it isencrypted using the handshake key:Kh=KumKeyExchange=e(Kh,{mRand1,mRand2,mKeyChecksum})

mKeyExchange is then returned to the mobile device 210.

The mobile device 210 transmits the key to the low power device wheredata is validated. When the mobile device 210 receives the encrypted keyfrom the server 510, it sends it to the lock. The lock then decrypts themessage:Kh=Ku{mRand1′,mRand2′,mKeyChecksum′}=d(Kh,mKeyExchange)

The lock confirms the validity of the message by summing the fourdecrypted 32-bit values:mKeyCheck=mRand1′+mRand2′+mKeyChecksum′

If mKeyCheck is non-zero, the lock disconnects from the mobile devices210.

Lock Generates Key, Encrypts, and Sends Data

The lock now generates two 32-bit random values: lRand1 & lRand2, and a32-bit lKeyCHecksum that is the 2s-complement sum of lRand1, lRand2, andthe 32-bit constant LX.lKeyChecksum=232−(LX+lRand1+lRand2)

The values are combined into a message and encrypted using the unit key,Kh.lKeyExchange=e(Kh,{LX,lRand1,lRand2,lKeyChecksum})

The value lKeyExchange is sent to the mobile device 210.

Mobile device 210 transmits the encrypted key to service server 510which validates it. The mobile device 210 sends lKeyExchange to theserver 510, which uses the unit key to decrypt it:Kh=Ku{_(LX',l)Rand′,lRand2′,lKeychecksum′}=d(Kh,lKeyExchange)

The server 510 confirms the validity of the message by summing the fourdecrypted 32-bit values:lKeyCheck=LX′+lRand1′+lRand2′+lKeyChecksum′

If lKeyCheck is not zero, the server 510 returns an error to the mobiledevice and the mobile device 210 disconnects from the lock. If lKeyCheckis zero, the server 510 returns lRand1′ and lRand2′ to the mobile device210.

The mobile device 210 21-generates the candidate session key, mSK:mSK={mRand1,mRand2,lRand1′,lRand2′}

The mobile device 210 initiates a test communication.

The mobile device 210 then generates two 32-bit random values: iRand2and iRand2, as well as another 32-bit value, iInitChecksum, that is thetwos-complement of the two random values, and a 32-bit constant, IC:iInitChecksum=232−(IC+iRand1+iRand2)

The values are combined into a message and encrypted using the candidatesession key, mSK.iInitComm=e(mSK,{IC,iRand1,iRand2,iInitChecksum})

The mobile device 210 then transmits iInitComm to the lock.

The low power device validates an initialization command. When the lockreceives the candidate session key from mobile, device, it generates itscandidate session key (lSK) from the generated and shared random valuesand decrypts the message:lSK={mRand1′,mRand2′,lRand1,lRand2}{IC′,iRand1′,iRand2′,iInitChecksum′}=d(lSK,iInitComm)

The low power device confirms the validity of the message by summing thefour decrypted 32-bit values:iInitCheck=iC′+iRand1′+=iRand2′+iInitChecksum′

If iInitCheck is non-zero or if IC′ does not match the expected valuefor IC, the lock disconnects from the mobile device 210. If the messageis valid, communication is now considered secure buy the lock and futuremessages can be decrypted using Ks=lSK.

The intelligent door lock 10 system sends an initialization response.

The intelligent door lock 10 now generates a 32-bit value,rInitChecksum, that is the twos-compliment sum of the random valuesiRand1′, iRand2′, and a 32-bit constanct, RC.rInitChecksum=232−(RC+iRand1′+iRand1′)

The values are combined into a message and encrypted using the sessionkey Ks:rInitResponse=e(Ks,{RC,iRand1′,iRand2′,rInitChecksum})

The value rInitResponse is sent to the mobile device 210.

The mobile device 210 validates initialization response.

When the mobile device 210 receives rInitResponse, it decrypts it usingmSK:{RC′,iRand1″,iRand2″,rInitChecksum′}=d(mSK,rInitResponse)

The mobile device 210 confirms the validity of the message by summingthe four decrypted 32-bit values:rInitCheck=RC′+iRand1″+iRand2″+rInitChecksum′

If all of the conditions below are met, communication is consideredsecure and future messages can be encrypted or decrypted with Ks=mSK:rInitCheck==0RC′==RCiRand1″==iRand1iRand2″==iRand2

If any of the above conditions are not met, the mobile device 210disconnects from the low power device.

The low power device can have three states that define its securitylevel:

Not Connected

Connected Not Secure

Connected Secure

The security level defines the behavior of the service characteristics.When advertising, the device is in the Not Connected state. After aconnection is established, the peripheral is in the Connected Not Securestate. After the handshake process is complete, the device enters theConnected Secure state.

In one embodiment firmware updates are provide to intelligent door locksystem from server. In one embodiment a dwelling Bluetooth device 21sends a packet with or without acknowledgement. As a non-limitingexample server 510 sends updates to mobile device 210 or Bluetooth toWiFi bridge 11. Mobile device 210 or WiFi bridge 11 then sends theupdates to a Bluetooth device 21 at the dwelling, e.g., to lock system10.

In one embodiment the update is send as a payload. As a non-limitingexample a payload of N bits is sent. As a non-limiting example thepayload can be 96 bits. Each packet includes n number of bits. Each bithas a traceable marker. As a non-limiting example the payload is sentwithout a response. This increases the speed of sending the payload. Asa non-limiting example the speed can be a bit packet three times asecond.

Even though the payload is sent without a response, in response toreceipt of the payload a notification is required from lock system 10.In one embodiment the notification is a bit mask of how many bits of thepayload were received.

Typically not all of the bits are received by lock system 10.Notification is then provided to server of the non-received bits. Whenthere is 0 in the bit mask that portion not received is then resent. Apayload is resent until all of the bits have been received.

In this manner a backfill of non-received bits is process. This isrepeated until all of the original bits in the update have beenreceived.

With subsequent updates a checksum is made on the payload and a checksumis sent back.

In this embodiment intelligent door lock system 10 receives fast updatesof firmware where there have been slow connections.

In one embodiment intelligent door lock system with server 510 notifiesthe dwelling user, resource owner, or end-user, hereafter (dwellinguser) the status of the intelligent door lock system batteries 21. As anon-limiting example intelligent door lock system 10 reports its batteryvoltages to server 510, and then the server 510 determines battery life,more particularly when the batteries will die and need to be changed.Notification is sent to the dwelling user.

In one embodiment intelligent door lock system reports its voltage toserver 510. Server 510 then determines when the one or more batteries 21are going to die. The user of is then notified of the battery 21 statusand can be prompted to change the batteries 21.

In one embodiment periodically mobile device 210 or Bluetooth to WiFibridge 11 records the voltage every time intelligent door lock system 10locks or unlocks. The recorded voltage is sent to server 510. This isdone on a period basis. In one embodiment a band pass filter is used inprocessing the recorded voltage.

In one embodiment server 510 initially runs a linear regression on thedata for a period of a number of different months which can be from 1-6months. Thereafter server 510 runs a cubic regression on the data set ofthe recorded voltages.

The server 510 pulls from memory the average lifetime of a battery 21.As a non-limiting example in the beginning if the recorded voltage isabove 5 volts, and a certain threshold is reached, a cubic regressionpredicts immediate death of batteries 21. A comparison is run of battery21 status now and when the battery 21 was charged. When the cubic ticksback up then use linear regression is applied. Linear regression worksup to a certain range of battery life. As a non-limiting example linearregression is applied up to 75% of battery life.

In one embodiment server 510 initially runs linear regression on thedata set of recorded voltages. Cubic regression is applied. When thecubic regression diverges server 510 switches back to linear regressionand this is used as the death date.

The data check of battery life voltages can be for any number of times,including periodically. As a non-limiting example the data check ofbattery voltages is run everyday.

In one embodiment when Bluetooth-WiFi bridge 11 is used the batterycheck voltage is done automatically.

In one embodiment the dwelling user is notified when a door 12, window,opening and the like of a dwelling is manually opened. Manually openedincludes operation of the keypad, of a key, by any mechanism which cannot notify server 510 directly. This in effect provides a notificationof “I need attention”.

In one embodiment every time the lock 24 is operated a log of that eventis put in the lock's memory. One or more bits of this bit information isreceived by the wireless bridge 11, which processes all of the logs.This provides a notification of “I need attention”. A push notificationis sent to the dwelling user.

In another embodiment server 210 can sent a similar push notificationalso be sent to a third party that provides a service to the dwellinguser, including but not limited to an alarm company, which then cancause the alarm to not be activated, and an a notification is alsoprovided to the notification to the dwelling user, which as anon-limiting example can be via mobile device 210.

The wireless bridge 11 processes all of the logs.

In one embodiment of the, illustrated in FIG. 38, security system 610,which can be 11A is configured to provide that a camera sensor 612 andvideo encoder 614, which can be video apparatus 10C and camera 10Cbegins before motion detection begins by motion detection device 10G. Inone embodiment video encoder 614 is coupled to a buffer 616, resources618 and a PR 620. As a non-limiting example video apparatus 10C recordsall of the time. When events occur there is an existing buffering of animportant selected video. In one embodiment the video apparatus 10C, isa camera, including but not limited to a doorbell camera 10C. In oneembodiment video apparatus records a buffer for a selected amount oftime, which as a non-limiting example can be for 20 seconds or less, 10seconds, 5 seconds, 2-5 seconds and the like. When motion is detected ata time T0 the last buffer is marked for saving. New-upcoming videos arerecorded until there is a complete motion. In one embodiment a videofile is appended which includes the pre-TO buffer of x seconds to createa video file that shows action starting at time T0−x. In one embodimentsecurity system includes the motion detection device 10G.

In one embodiment the buffer size is selected based on analytics and adetermination can be made as to when to start the video. As anon-limiting example motion can be triggered by a PR sensor, but oncemotion is triggered, the security system 11A analyses the x-second videobuffer to pixel changes This provides that the beginning of the video isaligned with the first pixel change. In another embodiment, motion speedis evaluated so that the slower the event, the longer the buffer time xis.

Referring to FIG. 39 one embodiment of intelligent door lock system 10with a magnetic sensor 712 is illustrated. In one embodiment, a magnetsensor 712, which can be a magnetometer 712, is provided. As anon-limiting example magnetometer 712 provides a reading that can beused to determine if door 12 is being opened as illustrated in FIG. 40.Magnetometer 712 can be used in conjunction with sensor 16. Magnetometer712 detects movement of the door 12. In one embodiment sensors 16 and712 are combined in order to determine an angle in which door 12 is openas illustrated in FIGS. 41A-42D.

As set forth above sensor 16, which can be an accelerometer, can be usedto detect rotation of the lock device 22 and the magnetometer 712 candetect the movement of the door 12. The value of knowing the magneticsensor provides door ajar status, sensor 16 is used to determine ifbolt/lock 24 is extended or retracted.

As non-limiting examples, the magnetometer 712 can be: (i) a vectormagnetometer 712 that measures vector components of a magnetic field;(ii) a total field magnetometer 712 or scalar magnetometer 712 tomeasure a magnitude of the vector magnetic field; and the like.

In one embodiment the magnetometer 712 is an absolute magnetometer 712that measures an absolute magnitude or vector magnetic field, using aninternal calibration or known physical constants of the magnetic sensor.In one embodiment magnetometer 712 is a relative magnetometer 712 thatmeasures magnitude or vector magnetic field relative to a fixed butun-calibrated baseline, and can be used to measure variations inmagnetic field.

In one embodiment, illustrated in FIG. 42, the magnetometer 712 isintegrated with intelligent door lock system 10. In one embodimentmagnetometer 712 is integrated with the lock of lock device 22 in asingle device, which as non-limiting example can be included as amagnetometer integrated circuit 714 on the printed circuit boarddescribed above on the printed circuit board (PCB) described above.

In one embodiment the magnetometer 712 is used to determine if the door12 is actually closed or ajar. This information, as well as informationprovided by sensor 16 is used to determine whether or not door 12 issecured. As illustrated in FIG. 43 non-limiting examples include but notare not limited to if the door 12 is: ajar and locked; not secured; ajarand unlocked; not secured; closed and unlocked; closed and locked;secured; and the like.

As a non-liming example the magnetometer 712 measures magnetism,including but not limited to magnetization of a magnetic material,strength of a magnetic field, a direction of the magnetic field at apoint in space. A magnetic material 716 can be existing in the door 12;be at the door frame; can be added which as a non-limiting example canbe a discreet magnet 716 coupled to the door frame; be a magnetic strikeplate; and the like, as illustrated in FIG. 42.

In one embodiment the magnetometer 712 communicates wirelessly, which asa non-limiting example can be RF and the like. In one embodimentmagnetometer 712 receives power from power source, battery 50.

The performance and capabilities of the magnetometer 712 can performand/or include all or a portion of the following:

-   -   Sample rate—the number of readings given per second. The inverse        is the cycle time in seconds per reading. Sample rate is        important in mobile magnetometers 712; the sample rate and the        vehicle speed determine the distance between measurements.    -   Bandwidth or bandpass—characterizes relative to how well the        magnetometer 712 tracks rapid changes in magnetic field.    -   Have or not have onboard signal processing, and without onboard        bandwidth can be determined by a Nyquist limit set by sample        rate.    -   Smoothing or averaging over sequential samples to achieve a        lower noise in exchange for lower bandwidth.    -   Have resolution with the smallest change in magnetic field the        magnetometer 712 can resolve. As a non-limiting example the        magnetometer 712 can have a resolution smaller than an amount of        smallest change desired to be observed to avoid quantization        errors.    -   Absolute error—a difference between the averaged readings of a        magnetometer 712 in a constant magnetic field and true magnetic        field.    -   Drift—a change in absolute error over time.    -   Thermal stability—the dependence of the measurement on        temperature. It is given as a temperature coefficient in units        of nT per degree Celsius.    -   Noise—the random fluctuations generated by the magnetometer 712        sensor or electronics, which as a non-limiting example can be        given in units of {\displaystyle {\rm {{nT}/{\sqrt {\rm Hz}}}}}        where frequency component refers to the bandwidth.    -   Sensitivity—the larger of the noise or the resolution.    -   Heading error—the change in the measurement due to a change in        orientation of the instrument in a constant magnetic field.    -   A dead zone—the angular region of magnetometer 712 orientation        in which the instrument produces poor or no measurements.    -   Gradient tolerance—the ability of a magnetometer 712 to obtain a        reliable measurement in the presence of a magnetic field        gradient.

In one embodiment, illustrates in FIG. 44, intelligent door lock system10 includes a camera 810, which as a non-limiting example can be camera10C or a different camera 810, with a wide field of view. As anon-limiting example camera 810 can be a camera similar commerciallyavailable one such as Arlo, Blink, ZModo, Nest Cam and the like. Camera810 can be coupled to intelligent door lock system 10 as disclosedabove. As non-limiting examples the field of view can be up to 180degrees, at least 180 degrees and the like. With the wide field of viewthe wide field camera 810 allows for viewing everything at the interiorof the dwelling, at the exterior of the dwelling and the like. This isuseful for viewing any approach to the dwelling, any activity at theinterior of the dwelling in the field of view and the like. This canprovide for monitoring a person and viewing their activities at or nearthe dwelling, both internally and at the exterior, viewing a lockingand/or locking of the door 12, viewing of an attempt to tamper with thedoor or lock, exiting the dwelling, the activities of a person at theexterior or interior of the dwelling and the like.

Additionally the wide field camera 810 can be a doorbell, included as adoorbell and also allow for a resident to see and speak with a thirdparty viewed by the wide field camera 810. In one embodiment the widefield camera 810 is included with a keypad, can be a keypad and thelike, allowing a person to enter a code. In one embodiment the widefield camera 810 also provides for detecting if the door has been closedand can serve as a door sensor, e.g, to determine open or closed doorstatus. As a non-limiting example, the open close status of the door canbe used to operate the lock, or trigger alarms.

In one embodiment the wide field camera 810 captures a follow-throughvideo of a third party, who may or may not have been given access to thedwelling by the dwelling occupant, by using the wide field camera 810,that can be coupled to door 12, and moves with door 12 as door 12 moves.Because the camera moves with the door, this allows wide angle camera810 to capture view and capture activities and third party movementinside and outside of the dwelling, all with a single camera system.

Referring to FIGS. 45 and 46, in one embodiment a camera, which can becamera 10C, camera 810 or a separate camera 812, is configured to definea safe zone in which an occupant, a non dwelling occupant third personand the like, is allowed into the dwelling. As a non-limiting example anarea of the safe zone can be created by the dwelling occupant or itsdesignee. Camera 812 is coupled to and/or included in intelligent doorlock system 10 as disclosed above.

In one embodiment the safe zone is delimited by one or more virtualfences 814, 816 and the like, which the occupant of the dwelling candefine, and in the event the one or more virtual fences 814 and 816 arebroken, different alerts can be activated, including but not limited alocal alarm, notification to the occupants mobile device, vocal warning,a communication with authorities, and the like.

In one embodiment the one or more virtual fences are multi-layer fencesthat can define multiple concentric zones. This allows for tracking ofthe occupant, a non-occupant that is granted access to the dwelling bythe occupant, including but not limited to a delivery person,housekeeper and the like. In one embodiment, the order in whichconcentric fences are broken allows tracking of a movement as eithertowards door 12, or away from door 12. As a non-limiting examplebreaking the first fence 814 can result in a vocal warning, whilebreaking second fence 816 can result in an alarm being activated, andbreaking a third fence can result in a call to authorities.

More particularly as illustrated in FIG. 45 video processing of camera814 images, and analysis of the virtual fences being broken can be inthe Cloud that can be in communication with the dwelling occupantsmobile device, an optional local speaker or alarm, as well as anoptional authority/police or security contact.

As illustrated in FIG. 46, in one embodiment the occupant of thedwelling can provide programmed fences 814, 816 and so forth. Theoccupant can also provided programmed alerts, including but not limitedto notifications, vocal warnings, sounding of alarms, calls toauthorities including police, security companies and the like. Whencamera 812 detects motion, a video analysis is performed to determine ifthere is a breach of fences 814, 816 and the like. If a determination ismade of a breach, an alert is triggered. A movement analysis can also bemade of a person relative to the dwelling, either at the interior,exterior of the dwelling and like. A determination can also be maderelative the direction of the movement, e.g, towards the inside oroutside of the dwelling. Thread alert levels can be increased, ordecreased. Alerts can be made according to the occupants programming.

The foregoing description of various embodiments of the claimed subjectmatter has been provided for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit the claimedsubject matter to the precise forms disclosed. Many modifications andvariations will be apparent to the practitioner skilled in the art.Particularly, while the concept “component” is used in the embodimentsof the systems and methods described above, it will be evident that suchconcept can be interchangeably used with equivalent concepts such as,class, method, type, interface, module, object model, and other suitableconcepts. Embodiments were chosen and described in order to bestdescribe the principles of the invention and its practical application,thereby enabling others skilled in the relevant art to understand theclaimed subject matter, the various embodiments and with variousmodifications that are suited to the particular use contemplated.

What is claimed is:
 1. An intelligent door lock system coupled to a doorat a building and for determining whether a non-building occupantgranted limited access to the building has exceeded the limited access,comprising: a sensor at the building, the sensor being coupled to adrive shaft of a lock device to assist in locking and unlocking a lockof the lock device at the door, the lock device coupled to the sensorand including a bolt; at least one camera to capture one or more imagesrelating to a zone within the building, the zone including a firstvirtual fence and a second virtual fence to delimit the zone within thebuilding; and at least one processor configured to: detect motion withinor outside the zone; in response to detecting motion within or outsidethe zone, analyze a first set of the one or more captured images todetermine a presence of a person; determine whether the person is abuilding occupant or a non-building occupant based on whether the personis registered or not registered with the intelligent door lock system;in response to determining that the person is the non-building occupant,analyze a second set of the one or more captured images to determinewhether the non-building occupant has crossed the first virtual fence;in response to determining that the non-building occupant has crossedthe first virtual fence, analyze the crossing of the first virtual fenceto determine whether the non-building occupant with the limited accesshas breached the first virtual fence and exceeded the limited access ofthe non-building occupant; in response to determining that thenon-building occupant has breached the first virtual fence and exceededthe limited access of the non-building occupant, trigger an alert; at atime subsequent to the non-building occupant crossing the first virtualfence, analyze a third set of the one or more captured images todetermine whether the non-building occupant has crossed the secondvirtual fence; in response to determining that the non-building occupanthas crossed the second virtual fence, analyze the crossing of the secondvirtual fence to determine whether the non-building occupant with thelimited access has breached the second virtual fence and exceeded thelimited access of the non-building occupant, wherein the second virtualfence is further from the door than the first virtual fence; and inresponse to determining that the non-building occupant has breached thesecond virtual fence and exceeded the limited access of the non-buildingoccupant, trigger the alert.
 2. The system of claim 1, whereintriggering the alert comprises triggering one or more notifications to:an occupant's mobile device, vocal warning, and/or a communication withauthorities.
 3. The system of claim 1, wherein the at least oneprocessor is configured to operate at least the first virtual fence andthe second virtual fence to delimit multiple concentric zones, the zonebeing one of the multiple concentric zones.
 4. The system of claim 1,wherein triggering the alert comprises triggering a vocal warningresponsive to the first virtual fence being breached, and/or triggeringan alarm responsive to the second virtual fence being breached.
 5. Thesystem of claim 1, wherein one or more of the at least one camera has awide field of view.
 6. The system of claim 5, wherein the wide field ofview is up to 180 degrees.
 7. The system of claim 5, wherein the widefield of view is at least 180 degrees.
 8. The system of claim 5, whereinthe wide field of view allows for viewing an interior of the building.9. The system of claim 5, wherein the wide field of view allows forviewing an exterior of the building.
 10. The system of claim 5, whereinthe wide field of view allows for viewing an approach of a person to thebuilding.
 11. The system of claim 5, wherein the wide field of viewallows for viewing activities at an interior or at an exterior of thebuilding.
 12. The system of claim 5, wherein the wide field of viewallows for monitoring a person at an interior or exterior near thebuilding.
 13. The system of claim 5, wherein the wide field of viewallows for viewing a locking and/or locking of the door.
 14. The systemof claim 5, wherein the wide field of view allows for viewing an attemptto tamper with the door or lock.
 15. The system of claim 5, wherein thewide field of view allows for viewing, a person exiting the building.16. The system of claim 5, wherein the wide field of view allows forviewing activities of a person at the exterior or interior of thebuilding.
 17. The system of claim 5, wherein one or more of the at leastone camera is integrated with a doorbell.
 18. The system of claim 5,wherein one or more of the at least one camera allows for a buildingoccupant to see and speak with a third party viewed by the at least onecamera.
 19. The system of claim 5, wherein one or more of the at leastone camera is integrated with a keypad.
 20. The system of claim 5,wherein one or more of the at least one camera is configured to be adoor sensor.
 21. The system of claim 5, wherein the at least oneprocessor is configured to determine open or closed door status and/or achange in door status from open to closed or closed to open.
 22. Thesystem of claim 21, wherein the at least one processor is configured touse an open or close status of the door to operate the lock and/or totrigger alarms.
 23. The system of claim 1, wherein the zone is a firstzone within the building, and the unpermitted area outside the zone is asecond zone within the building.
 24. An intelligent door lock systemcoupled to a door at a building and for determining whether anon-building occupant granted limited access to the building hasexceeded the limited access, comprising: a sensor at the building, thesensor being coupled to a drive shaft of a lock device to assist inlocking and unlocking a lock of the lock device at the door, the lockdevice coupled to the sensor and including a bolt; at least one camerato: capture one or more images relating to a zone within the building,the zone including a first virtual fence and a second virtual fence todelimit the zone within the building; detect motion within or outsidethe zone; in response to detecting motion within or outside the zone,analyze at least some of the one or more captured images to determine apresence of a person; determine whether the person is a buildingoccupant or a non-building occupant based on whether the person isregistered or not registered with the intelligent door lock system; inresponse to determining that the person is the non-building occupant,analyze at least some of the one or more captured images to determinewhether the non-building occupant has crossed the first virtual fence;in response to determining that the non-building occupant has crossedthe first virtual fence, analyze the crossing of the first virtual fenceto determine whether the non-building occupant with the limited accesshas breached the first virtual fence and exceeded the limited access ofthe non-building occupant; in response to determining that thenon-building occupant has breached the first virtual fence and exceededthe limited access of the non-building occupant, trigger an alert; at atime subsequent to the non-building occupant crossing the first virtualfence, analyze at least some of the one or more captured images todetermine whether the non-building occupant has crossed the secondvirtual fence; in response to determining that the non-building occupanthas crossed the second virtual fence, analyze the crossing of the secondvirtual fence to determine whether the non-building occupant with thelimited access has breached the second virtual fence and exceeded thelimited access of the non-building occupant, wherein the second virtualfence is further from the door than the first virtual fence; and inresponse to determining that the non-building occupant has breached thesecond virtual fence and exceeded the limited access of the non-buildingoccupant, trigger the alert.