Systems and methods for controlling electronically operable access devices using WI-FI and radio frequency technology

ABSTRACT

Systems and methods are disclosed for controlling access devices including WI-FI and dual radio communications between an access control database and one or more access devices in a facility. The systems and methods allow real time communications between the database and the access devices utilizing existing communications WI-FI infrastructure in the facility while minimizing loss of battery life of the access devices by employing the radio network to target all or a portion of the access devices for communications when needed.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.14,817,933 filed on Aug. 4, 2015 and issued as U.S. Pat. No. 10,244,478,which is a continuation of U.S. application Ser. No. 13/888,648 filed onMay 7, 2013 and issued as U.S. Pat. No. 9,098,953, which claims thebenefit of the filing date of U.S. Provisional Application No.61/644,384 filed on May 8, 2012, the contents of each applicationincorporated by reference herein in their entireties.

FIELD OF THE INVENTION

The invention relates to systems and methods for control and operationof electronic access devices in commercial, residential, industrial,storage, medical, and other facilities that can be monitored andcontrolled remotely through a computer system that selectively wakes theaccess devices via a radio signal from a radio frequency bridge deviceconnected to the computer system, and the access devices are furtherselectively connected to the computer system with a wireless fidelity(WI-FI) connection for data transmission when waked with the radiosignal.

BACKGROUND

Existing electronic lock systems are used to control access to variousareas within a facility. Some systems employ wireless locks thatcommunicate with an interface device that is in sufficient proximity tothe electronic locks to enable radio communication. The variousinterface devices are hardwired to a central database that is connectedto the computer system of the facility. The computer system providesupdates to the electronic locks through this radio communicationnetwork. However, the hardwired connection of the interfaces deviceswith the access control device can be expensive in large facilities, andcreates concerns that the hardwiring is redundant with the existingwiring of the various area networks of the facility.

Some electronic lock systems leverage the existing WI-FI and othernetworks of the facility to communicate with the electronic locks sothat programming and/or data can be transmitted to each lock withoutrequiring separate updates for each lock. However, WI-FI systems areemployed off-line, meaning that communication between the computersystem and the electronic locks is only established at predeterminedintervals to preserve battery life of the electronic locks, which aredesired to operate for several years between battery changes. Therefore,further improvements in this area of technology are desired.

SUMMARY

In one aspect, there is disclosed systems and methods for controllingone or more access devices using WI-FI and radio frequency networksconnected to an access control device. The systems and methods providereal-time communications between the access devices and the accesscontrol device, which includes software and a database for updating ofcredentials, software, and other aspects of each access device whilepreserving battery life of the access device. The systems and methodscan also be operated in an off-line mode where communication between theaccess control device and the access device is established atpredetermined intervals. These and other aspects, features, forms,embodiments, objects, and advantages are also discussed below withreference at least in part to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of a system for connecting a computer network to aplurality of access devices with a radio frequency (RF) bridge deviceand/or a WI-FI connection to allow on-line and off-line remotemonitoring and control of the access devices from an access controldevice.

FIG. 2 is a block diagram of the system of FIG. 1.

FIG. 3 is a block diagram of an access device that is configured fordual frequency communication with the computer network of FIG. 1.

FIG. 4 is a block diagram of the radio frequency bridge device of FIG.1.

FIG. 5 is a block diagram of the system of FIG. 1 showing on-linecommunications protocols between the access control device, the radiofrequency bridge device, and the access control device.

FIG. 6 is a flow diagram of the sleep and wake modes of operation of theaccess devices of FIG. 1.

FIG. 7 is a flow diagram of a sleep mode of operation of the accesscontrol device of FIG. 1.

FIG. 8 is a flow diagram of a wakeup mode of operation for the accesscontrol device of FIG. 1.

FIGS. 9A and 9B are flow diagrams of an initialization procedure for theaccess control device.

DETAILED DESCRIPTION

For the purposes of promoting an understanding of the principles of theinvention, reference will now be made to the embodiments illustrated inthe drawings and specific language will be used to describe the same. Itwill nevertheless be understood that no limitation of the scope of theinvention is thereby intended. Any alterations and further modificationsin the described embodiments, and any further applications of theprinciples of the invention as described herein are contemplated aswould normally occur to one skilled in the art to which the inventionrelates.

Systems, devices and methods are disclosed for remote monitoring andcontrol of access devices that are connectable to a WI-FI network and toa radio frequency network. The access devices can be located in or on,for example, a commercial building, industrial facility, medicalfacility, residential building or facility, hotel or resort facility, aresidence, a storage facility, or other structure or group ofstructures. In one form, the access devices are configured to work withone or more bridge devices that provide RF communication with the accessdevices, with the bridge device(s) and access devices integrated intothe computer network of the facility to leverage the facility's WI-FInetwork and allow real time communications between an access controldatabase and selected access devices in order to minimize powerconsumption of the access devices for which communication is not needed.

FIG. 1 illustrates an access control system 10 that monitors andcontrols electronic access devices 20 including but not limited toelectronic door locks. Access devices 20 may also include oralternatively be any one or more of deadbolts, cameras, lights,temperature controls, appliances, and the like. The system 10 includes acomputer network 12 that can be coupled to an access control device 30,which includes a database and software for operating the access controlsystem. Computer network 12 can be any one or combination of wired localarea network, a wireless area network, or the internet. Computer network12 can further include a routing device 14. At least one RF bridgedevice 16 couples an RF network 24 to the computer network 12. In oneembodiment, bridge device 16 is connected to computer network 12 with anEthernet cable or other suitable connection with routing device 14.

FIG. 1 illustrates a plurality of access devices 20 in the form of doorlocks, e.g. for use on an entrance door of a building, room or otherpart of a structure, that is configured to receive RF signals as part ofthe RF network 24 and that are also configured to send and receivesignals to computer network 12 via a WI-FI connection 26. However, itshould be understood that many other devices can send and receive RFsignals as part of the RF network 24 and WI-FI connection 26 and theillustrated door lock is simply an example of one of these devices.

In the RF network 24, each connected device 20 acts as a communicationnode that can receive a radio signal as a wakeup signal from accesscontrol device 30 through its assigned bridge device 16, and thencommunicate to send and receive information packets via WI-FI connection26 with computer network 12 to other devices in the system 10, such asaccess control device 30. If a wakeup signal is not addressed to theaccess device 20 in RF network 24, the access device 20 ignores thewakeup signal. If the particular wakeup signal is addressed to theaccess device 20 that interrogates it, the access device 20 is awakenedfrom a sleep mode and operates in a wake or run mode to communicate withaccess control device 30 through the WI-FI connection 26 with computernetwork 12. In this arrangement, the battery operating life of eachaccess device 20 is maintained since only access devices 20 that aredesignated to receive information from access control device 30 areawakened in real time for information downloads and information uploads.The interrogation of the wakeup signal by access device 20 occurs inconjunction with radio frequency communications, increasing battery lifesince the bridge device 16 transmits RF signals and the RF receiver ofthe access device 20 can operate at a lower power level when compared tostandard wireless networks.

Referring further to FIG. 2, in one construction, the RF network 24communicates via a sub-1 GHz beacon with each of the access devices 20in the radio network through an assigned bridge device 16. In systems 10with multiple bridge devices 16 having access devices 20 assigned torespective ones thereof, access control device 30 can identify whichbridge devices 16 connected to computer network 12 to alert in order tosend a wakeup signal to only a portion of access devices 20 in thesystem 10. The wakeup signal enables WI-FI communication of the awakenedaccess device 20 with access control device 30 through WI-FI connection26, which handles large data volumes more efficiently. Access device 20downloads information packets from and transmits information packets toaccess control device 30 via WI-FI connection 26 with computer network12.

The exemplary access device 20 shown in FIG. 1 is a door lock, which isfurther shown in a block diagram form in FIG. 3. The access device 20includes a logic and memory module 40, a suitable power source 42, suchas A/C power and/or battery power, a keyless entry system 44, a keyedentry mechanism 46, a locking mechanism 48, a multi-frequencytransceiver 50, and a user interface 52.

The keyless entry system 44 includes a keypad 44 a for entering anaccess code and other data. In other constructions, other data entrysystems may be used in place of the keypad, such as biometric entry,smart cards, infrared readers, etc. Keyless entry system 44 may also oralternatively include a card reader for electronically reading an accesscode from a card carried by the user. The keyless entry system 44communicates with the logic and memory module 40 that stores accesscodes and other user identification information and for carrying out thefunctions of the access device 20. The logic and memory module 40 maystore individual user codes, where each person having access to the dooris issued a unique user code that is stored and compared to input codesat the door to allow access decisions to be made at the door withouttransmissions over computer network 12. In one embodiment, logic andmemory module includes a processor that drives communications with RFnetwork 24 and establishes WI-FI connection 26 through appropriatehardware on access device 20 and bridge device 16. The logic and memorymodule 40 may further include an internal memory for storing credentialdata and audit data, and a real-time clock for determining timesassociated with access events. In addition, logic and memory module 40is operable in a low power mode to preserve battery life. In onespecific embodiment, logic and memory module 40 includes an advancereduced instruction set computer machine.

The keyed entry mechanism 46 can manually operate the locking mechanism48, for example in case of power loss or other malfunction. The lockingmechanism 48 of the access device 20 may include a locking device suchas a sliding deadbolt, or other suitable locking mechanism coupled to adoor handle or knob and/or to a key mechanism. In the illustratedconstruction, the locking mechanism 48 is power-driven, for example by asolenoid or an electric motor, to facilitate remote operation. Theaccess device 20 may also include user interface 52 having visualcomponents, such as an LED light and/or an LCD screen, and/or audiocomponents, such as a speaker or other sound-generating device.

Where the access device 20 is part of a networked system 10 such as thatdescribed herein, functions that can be performed remotely throughaccess control device 30 include, but are not limited to, confirming thestatus of a lock, such as whether the door lock is locked or unlocked,notifying the network of an attempted access, including whether the lockwas accessed, when it was accessed and by whom, whether there wereattempts at unauthorized access, and other audit information. In someconstructions, the access device 20 can also receive and execute asignal to unlock the lock, add or delete user codes for locks havingsuch codes, and, if the door lock is paired with a suitable camera (notshown), transmit images of the person seeking entry. The access device20 can also be used to send a command to disarm an electronic alarm orsecurity system, or to initiate a duress command from the keypad 44 a ofthe access device 20, where the duress command may be utilized by thenetwork to transmit a message to access control device 30 or otherlinked device, such as a computer terminal or mobile device, anelectronic alarm or security system, or a networked computer server.

The access device 20 can be a self-contained functional lock such as anelectronic lock used to secure an access point. Access device 20includes an electronically-controlled system containing a keypad 44 a,logic-memory module 40, and an electro-mechanical locking mechanism 48.Using the keypad 44 a, a user can enter a numeric access code toactivate the electro-mechanical locking mechanism 48 thus unlocking thedoor controlled by access device 20. The keypad 44 a can also be used toprogram and configure the operation of the access device 20, such asadding access codes, deleting access codes, enabling audible operation,and setting relocking time delays. Additionally, the access device 20includes multi-frequency transceiver 50, or interface, that can includean RF module 50 a such as an antenna or programmable card for thereception and transmission of sub 1-GHz RF signals, a WI-FI module 50 bconfigured to establish WI-FI connection 26 to and send and receiveWI-FI signals to computer network 12, and all necessary electroniccomponents required for the reception and generation of RF signals andWI-FI connection/disconnection with logic-memory module 40. The WI-FIinterface with access control device 30 provides the same operation,programming, and configuration functionality as that afforded by thekeypad 44 a, in addition to a wide range of features including but notlimited to audit information such as lock status reporting, lockoperation reporting, lock battery status, and the like.

FIG. 4 is a block diagram of the RF bridge device 16. The bridge device16 includes a transceiver module 60, such as a power over Ethernet (PoE)receiver for sending and receiving signals to and from the computernetwork 12 via connection 18 via transmission control protocol/internetprotocol (TCP/IP). Bridge device 16 also include a network interfacecard 62 connected to transceiver module 60. Network interface card 62 isconnected to a microcontroller 64 and an RF transmitter 66. RFtransmitter 66 receives commands from microcontroller 64 and providesoutput of RF signals over RF network 24. Bridge device 16 may alsoinclude a power source 68 and a user interface (not shown) for inputtinginformation and obtaining status. Other transmission protocols besidesInternet Protocol can also be employed to communicate with the computernetwork 12.

The RF transmitter 66 is suited for communication at the appropriate RFnetwork frequency, for example sub-1 GHz, although other frequencies canbe used as well. The RF transmitter 66 formats the RF signals ittransmits according to the communications protocol that is being used.The RF bridge device 16 may include an antenna 17 (FIG. 1), which can becontained within the housing of the bridge device 16 or may be externalto the housing. The transceiver module 60 formats the signals it sendsaccording to the communications protocol, e.g. Internet Protocol, usedto connect the computer network 12. In one construction, the RF bridgedevice 16 connects to a local-area network (LAN) via an Ethernetconnection 18, although other types of connections are possible. Asshown in FIG. 1, the connection 18 includes a cable having a plug toconnect to an Ethernet port on a router 14. As illustrated in FIG. 1,the router 14 can include wireless Internet Protocol signaling tocommunicate with suitable wireless-compatible devices such as accessdevices 20. The transceiver module 60 may alternatively connect to awireless router 16 using a wireless connection, for example using anIEEE 802.11x-based wireless networking protocol. The power source 68 ofbridge device 16 can be a battery or other portable power supply, or analternating current (A/C) or other fixed power source, or both. The userinterface can include input mechanisms such as one or more buttons andan output mechanism such as a screen or indicator lights.

The microcontroller 64 can be any suitable logic-memory unit configuredto coordinate the various functions of the RF bridge device 16 asdiscussed herein. The micro-controller 64 coordinates transfer ofsignals between the RF network 24 and the computer network 12. Themicrocontroller 64 translates signals from the transceiver module 60into commands that the RF transmitter 66 broadcasts to the RF network 24to access devices 20. The microcontroller 64 may also translate signalsinto commands for the transceiver module 60 to transmit to the computernetwork 12.

FIG. 5 illustrates additional details of the communications protocols ofsystem 10 of FIG. 1. Access control device 30 is connected totransceiver module 60 of bridge device 16 with at least one of computernetwork 12, router 14 and Ethernet connection 18 for two-waycommunication. Transceiver module 60 is connected to RF transmitter 66to provide RF signals over RF network 24. Each of the access devices 20is connected to RF network 24 with RF module 50 a to receive andinterrogate a wakeup signal. RF module 50 a is connected withlogic-memory module 40 of access device 20 so that when a RF signal thatis targeted to access device 20, access device 20 enters a wakeup modeof operation. In the wakeup mode, logic-memory module 40 activates WI-FImodule 50 b, which connects to computer network 12 via WI-FI connection26 for two-way communication. Additional communications protocols arealso contemplated and not precluded. For example, one or more remotedevices, such as a networked computer and a mobile device, can connectto access control device 30 for access to computer network 12.

Access control device 30 can be, for example, a networked computer thatis connected with computer network 12, and that can communicate with amobile device or networked computer using HyperText Transfer Protocol(HTTP) commands or other protocols suited for use via the Internet orother connection, with appropriate web-browsing or other software beingloaded on the mobile device or networked computer. Access control device30 can include a database with, for example, user identifications,access device identifications, access device credentials, access deviceaudit data, and programmed with software to manage the databaseinformation. Access control device 30 can further include software withuser interface features that facilitate user operation of access controldevice 30 to view access device status, manage and update access devices20 with programming, user credentials, and override commands, and toreceive audit data from access devices 20.

FIG. 6 shows a flow diagram for a power state transition procedure 100of access control device 20. Any reset operation 102 that provides aninput to access device 20 can cause access device 20 to reset, and inparticular logic-memory module 40, to enter a wakeup or run mode 104.Reset operation 102 can include a number of wakeup sources such as, forexample, an entry of an access code to access device 20, reading of anaccess card by access device 20, an RF signal interrupt received byaccess device 20, a real time clock interrupt programmed into accessdevice 20, tampering of access device, 20, or receipt of a data packetby access device 20 over WI-FI-connection 26 and/or RF network 24. Aftera predetermined time of inactivity, access device 20 transitions to asleep mode 106, where logic-memory module 40 shuts down WI-FI connection26, suspends all tasks relating to wireless operation, and shuts downpower to WI-FI module 50 b. In one embodiment, sleep mode 106 is a deepsleep mode with a low leakage stop (LLS) that provides a low level ofpower to enable wakeup operations, memory retention, and state retentionof peripherals while preventing peripheral operation in the sleep mode.Other power retention and shutdown schemes are also contemplated so longas adequate battery life is preserved and/or power consumption isminimized for access device 20. When a wakeup signal is received over RFnetwork 24, access device 20 returns to wakeup operation under run mode104 and powers WI-FI module 50 b to establish WI-FI connection 26 andpower up logic-memory module 40. The run mode 104 can include a lowleakage wakeup module that flags the wakeup source and logs the wakeupsource and time in memory of logic-memory module 40.

FIG. 7 shows a flow diagram for one embodiment of a procedure 200 forentry of access device 20 to sleep mode 106. Procedure 200 begins atsleep mode indicator 202 and continues at conditional 204 in which anoperating mode of access device 20 is determined. In one embodiment,access device 20 is operable in either an on-line mode or an off-linemode. The on-line mode discussed hereinabove provides real timecommunications between access control device 30 and access devices 20through WI-FI connection 26 by providing a wakeup signal over RF network24 to the particular access devices 20 targeted for communication byaccess control device 30. As a result, access devices 20 can be updatedin the on-line mode with user credentials and other information in realtime by pushing the data to the targeted access devices 20 wheneverdesired. Battery life of access devices 20 is preserved and/or powerconsumption is minimized since access devices 20 can otherwise remaindisconnected from computer network 12 by shutting down WI-FI connection26 in the sleep mode.

In FIG. 1, certain access devices 20, designated as access devices 20′in FIG. 1, are configured to operate in an off-line mode since they arenot connected to or operable to receive radio signals transmitted overRF network 24. Rather, access devices 20′ are configured to communicatewith access control device 30 solely through wireless connections 22when the wireless connection is established. In order to preservebattery life and/or minimize power consumption, access devices 20′ onlyestablish WI-FI connections 22 at predetermined intervals, such as oncea day, to receive updates of user credentials and other data, fromaccess control device 30.

Referring back to FIG. 7, in procedure 200 if it is determined atconditional 204 that access device 20 is to operate in an off-line mode,procedure 200 continues at operation 206 in which an alarm is set thatestablishes a predetermined time or time interval for access device 20to wake up and connect to computer network 12 for updates through WI-FIconnection 26. If it is determined at conditional 204 that the accessdevice 20 is to operate in an on-line mode, no alarm is set. Procedure200 continues at operation 208 to shut down WI-FI module 50 b and theWI-FI connection 26. Procedure 200 then continues at operation 210 whereaccess device 20 enters a sleep mode until a wakeup signal is received,either via alarm or by an RF signal, depending on whether access device20 is operating in an off-line mode or an on-line mode, respectively.Procedure 200 then continues at operation 212 where access device 20continues in a wakeup mode of operation to communicate with computernetwork 12 and access control device 30 trough WI-FI connection 26.

Referring now to FIG. 8, there is shown a flow diagram for a wakeupprocedure 300 for operation of access device 20 and system 10 in theon-line mode discussed above. Procedure 300 begins upon receipt of awakeup signal at one or more of the access devices 20. At conditional304 the wakeup source is determined. If the wakeup source is fromkeyless entry system 44, such as an entry to a reader of access device20, an access code entered by keypad 44 a, or an input/output (I/O)change from entry system 44 or logic-memory module 40 to change settingsassociated with access device 20, procedure 300 continues at conditional306 to identify whether the wakeup source is a credential entry or anI/O change. If the wakeup source is associated with a credential entry,procedure 300 continues at operation 308 to search for the credential inthe data stored in logic-memory module 40. Procedure 300 continues atconditional 310 to determine if the credential is found. If thecredential is found at operation 308, procedure 300 continues atoperation 318 where logic-memory module 40 sends a motor control commandto open locking mechanism 48 of access control device 20. Procedure 300then continues at operation 320 to update audit data associated with theunlocking of access device 20. Such audit data can include, for example,the identification of the access device, identification of the usercredentials, and time of access. Alternatively, if at conditional 310 auser credential is not identified on the database of access device 20,procedure 300 proceeds directly to operation 320 to update audit data torecord the time of attempted access with the access control device 20.After updating the audit data in logic-memory module 40 at operation320, access control device 20 returns to sleep mode 328.

If at conditional 306 it is determined that the wakeup source is an I/Ochange, notification of the change is provided. Procedure 300 continuesto operation 320 to update the audit data indicating, for example, thetime of the I/O change and the particular I/O change that was made.After updating the audit data in logic and memory unit 40 at operation320, access control device 20 returns to sleep mode 328. If the wakeupsource determined at conditional 304 is from an access code entry orinput/output (I/O) change WI-FI connection 26 is not established withcomputer network 12, preserving battery life of access device 20.

If at conditional 314 it is determined that the wakeup source wasinitiated by a radio signal from RF network 24, procedure 300 continuesat operation 312 and access device 20 receives the radio signal andreads the packet transmitted to the access device 20. Procedure 300continues at conditional 304 and determines the type of packet receivedby the access control device 20. If the packet is a wakeup signalindicating a download from access control device 30 is requested, accesscontrol device wakes up and restarts to power WI-FI module 50 b atoperation 324. The data from access control device 30 is then downloadedover WI-FI connection 26 at operation 326 to logic-memory module 40.Furthermore, audit data stored in logic-memory module 40 of accesscontrol device 20 is downloaded to access control device 30. Uponcompletion of downloads at operation 326, access control device 20 thenreturns to sleep mode 328.

If at conditional 304 it is determined the packet is a lock/unlockcommand from access control device 30, procedure 300 continues atoperation 318 and logic-memory module 40 sends a motor control commandto locking mechanism 48 to lock or unlock the lock of access controldevice 20. In one embodiment, the lock command is a command thatover-rides user credentials and prevents any unlocking of access device20. Procedure 300 then continues at operation 320 to update audit dataassociated with the locking and/or unlocking of access device 20. Afterupdating the audit data in logic and memory unit 40 at operation 320,access control device 20 returns to sleep mode 328. If is determined atconditional 304 the packet is a lock/unlock command from access controldevice 30, WI-FI connection 26 is not established with computer network12, preserving battery life of access devices 20.

For operation of access device 20 in an off-line mode, procedure 300 ismodified since a radio signal from RF network 24 is not interrogated byaccess device 20. Rather, at conditional 304, if the modified proceduredetermines the wakeup source is from entry system 44 or I/O change, theprocedure continues as discussed above. If the wakeup source isdetermined to be the alarm settings of access device 20, wireless module50 b is automatically powered on and connected to computer network 12via WI-FI connection 26 to receive data download from access controldevice 30 and to transmit audit data to access control device 30 throughWI-FI connection 26.

Referring now to FIGS. 9A and 9B, one example of a boot-up procedure 400for access control devices 20 is shown. Boot-up procedure 400 begins at402 upon initial power on or reset of the access control device 20.Procedure 400 continues at operation 402 and initializes the hardware ofaccess device 20. Operation 402 also configures the wakeup interruptsthat can be used based on the operating mode for access device 20,either on-line or off-line as discussed above. Procedure 400 continuesat operation 406 and further configures the access deviceidentification, the internet protocol address required to communicatewith the access control device 30, and the logic-memory module 40 ofaccess device 20. Procedure 400 then continues at operation 408 to startthe access device connection client with access control device 30, andto connect with access control device 30. The starting of the connectionclient may include, for example, opening a TCP/IP client connection forcommunication with computer network 12 through WI-FI connection 26.

Procedure 400 continues at conditional 410 to determine if access device20 is connected to access control device 30. Once access device 20 isconnected, procedure 400 continues at operation 412 and retrieves theoperating mode (on-line or off-line) and synchronizes with the accesscontrol software on access control device 30. Via a download 414,procedure 400 continues at operation 416 where the user and credentialdata is downloaded from the access control device 30 and stored ininternal memory of logic-memory module 40. At conditional 418, it isdetermined if the download is successful. If the download 414 fails, adatabase error is indicated at output 420 and procedure 400 stops at422. If download 414 is successful, procedure 400 continues at operation424 to upload audit data to access control device 30. At conditional 426it is determined whether the upload is successful. If the upload fails,procedure 400 continue by indicating a connection failure 428 with theaccess control device 30, and procedure 400 stops at 430. If the uploadis successful, procedure 400 continues where access control device 20enters a sleep mode at 432 for saving power.

According to one aspect, a method includes transmitting a first signalfrom an access control device via a first network to a radio frequencybridge device; in response to the first signal, transmitting a wake upsignal from the radio frequency bridge device to at least one electronicaccess device that is operating in a sleep mode; waking the at least oneelectronic access device from the sleep mode in response to receivingthe wake up signal; wirelessly connecting the electronic access deviceto the first network with a WI-FI connection in response to waking theat least one electronic access device with the wake up signal; andtransmitting operating parameters to the electronic access device fromthe access control device through the WI-FI connection with the firstnetwork.

In one embodiment, the method includes updating the electronic accessdevice with user credentials that authorize one or more users to unlockthe electronic access device and/or updating software of a logic andmemory unit of the electronic access device. In another embodiment, themethod includes unlocking or locking the electronic access device inresponse to an unlocking command or a locking command, respectively,associated with the wake-up signal. In yet another embodiment, themethod includes transmitting a second signal from the electronic accessdevice to the access control device through the WI-FI connection withthe first network. In a refinement of this embodiment, the second signalincludes at least one of: whether the electronic access device is lockedor unlocked, whether the electronic access device has been accessed, anidentity of a user who has accessed or attempted to access theelectronic access device, and whether a distress code has been entered.

In another embodiment, the method includes configuring a plurality ofelectronic access devices to interrogate the wake up signal. In onerefinement of the embodiment, only a portion of the plurality ofelectronic access devices wake in response to interrogating the wake upsignal from the radio frequency bridge device. In a further refinement,each electronic access device of the portion of the plurality ofelectronic access devices that wake wirelessly connect to the firstnetwork through the WI-FI connection in response to receiving the wakeup signal. In another refinement of the embodiment, the first network isa local area network and further comprising connecting the local areanetwork to the radio frequency bridge device with an Ethernetconnection.

In another aspect, a system is disclosed. The system includes an accessdevice with a locking mechanism movable between a locked and unlockedposition, a keyless entry system operably connected to the lockingmechanism, a logic and memory module connected to the keyless entrysystem, a multi-frequency transceiver connected to the logic and memorymodule, and a power source. The system also includes a radio frequencybridge device with a radio frequency transmitter and a transceiverconfigured to receive signals from a computer network. The transceiveris operatively connected to the radio frequency transmitter to cause theradio frequency transmitter to output a radio signal in response to thesignals from the computer network. The multi-frequency transceiver ofthe access device is configured to receive the radio signal from thetransmitter. The system also includes an access control deviceoperatively connected to the computer network. The access control deviceincludes a database with user credentials and access deviceidentification information. The access control device is configured totransmit the signals over the computer network to the radio frequencybridge device, and the access control device is further configured totransmit database information to the access device via a WI-FIconnection of the multi-frequency transceiver of the access device tothe computer network. The WI-FI connection is established in response tothe access device interrogating the radio signal from the radiofrequency bridge device.

In one embodiment, the access device further includes a user interface.In another embodiment, the access device includes a keyed entrymechanism for manually operating the locking mechanism. In yet anotherembodiment, the keyless entry system includes a keypad for entering anaccess code to the logic and memory module. In a further embodiment, themulti-frequency transceiver includes a radio frequency module configuredto receive the radio signal from the radio frequency bridge device and aWI-FI module configured to establish a WI-FI connection with thecomputer network in response to interrogation of the radio signal.

In another embodiment, the transceiver of the radio frequency bridgedevice is an internet protocol transceiver. In yet another embodiment,the radio frequency transmitter is configured to transmit the radiosignal at sub-1 GHz. In another embodiment, the system includes a routerconnecting the radio frequency bridge device with the computer network.In a further embodiment, the power source of the access device is abattery. In another embodiment, the radio frequency bridge deviceincludes a network interface card connected to the transceiver and amicrocontroller connected to the radio frequency transmitter and thenetwork interface card.

In another aspect, a system is disclosed that includes a computernetwork and a plurality of access devices. The computer network includesan access control device with a database including at least usercredentials and access device identification information. The computernetwork also includes a wireless routing device connected to the accesscontrol device and to a radio frequency transmitter configured totransmit a radio signal. The access devices each include a lockingmechanism movable between a locked and unlocked position, a keylessentry system operably connected to the locking mechanism, a logic andmemory module connected to the keyless entry system, a multi-frequencytransceiver connected to the logic and memory module, and a powersource. The multi-frequency transceiver is operable to receive the radiosignal from the radio frequency transmitter to transition the accessdevice from a sleep mode of operation to a wake mode of operation. Whenin the wake mode of operation the multi-frequency transmitter isconfigured to establish a WI-FI connection with the wireless routingdevice for data transmission between the access device and the accesscontrol device.

In one embodiment, the multi-frequency transmitter includes a radiofrequency module that is configured to interrogate the radio signalbefore transitioning the access device from the sleep mode of operationto the wake mode of operation. In another embodiment, the access controldevice is configured to identify a portion of the plurality of accessdevices and configure the radio frequency transmitter to transmit theradio signal to targeted access devices. In yet another embodiment, theradio frequency transmitter is part of a bridge device that is connectedto the routing device with an Ethernet connection. In a furtherembodiment, the multi-frequency transceiver of each of the plurality ofaccess devices is operable to receive the radio signal from the radiotransmitter and unlock or lock the access device in response to theradio signal.

While the invention has been illustrated and described in detail in thedrawings and foregoing description, the same is to be considered asillustrative and not restrictive in character, it being understood thatonly the certain embodiments have been shown and described and that allchanges and modifications that come within the spirit of the inventionsare desired to be protected. It should be understood that while the useof words such as preferable, preferably, preferred or more preferredutilized in the description above indicate that the feature so describedmay be more desirable, it nonetheless may not be necessary andembodiments lacking the same may be contemplated as within the scope ofthe invention, the scope being defined by the claims that follow.

In reading the claims, it is intended that when words such as “a,” “an,”“at least one,” or “at least one portion” are used there is no intentionto limit the claim to only one item unless specifically stated to thecontrary in the claim. When the language “at least a portion” and/or “aportion” is used the item can include a portion and/or the entire itemunless specifically stated to the contrary.

What is claimed is:
 1. A method, comprising: transmitting, by a seconddevice over a first wireless communication connection and in response toreceiving a communication from an access control device, a wake-upsignal to an electronic door lock that is operating in a sleep mode;waking the electronic door lock from the sleep mode in response toreceiving the wake-up signal; communicatively coupling the electronicdoor lock to the access control device via a second wirelesscommunication connection in response to waking the electronic door lockwith the wake-up signal, wherein the second wireless communicationconnection utilizes a different communication protocol from the firstwireless communication connection; and transmitting one or moreoperating parameters between the electronic door lock and the accesscontrol device via the second wireless communication connection.
 2. Themethod of claim 1, wherein the second wireless communication connectioncomprises a Wi-Fi connection.
 3. The method of claim 1, wherein theelectronic door lock is communicatively coupled to the access controldevice via a routing device.
 4. The method of claim 1, wherein thesecond wireless communication connection uses an IEEE 802.11x-basedwireless networking protocol.
 5. The method of claim 1, furthercomprising disconnecting the second wireless communication connectionbetween the electronic door lock and the access control device todecrease power consumed by the electronic door lock.
 6. The method ofclaim 1, wherein transmitting the one or more operating parameterscomprises updating the electronic door lock with user credentials thatauthorize one or more users to unlock the electronic door lock.
 7. Themethod of claim 1, further comprising unlocking or locking theelectronic door lock in response to an unlocking command or a lockingcommand, respectively, associated with the wake-up signal.
 8. Anelectronic lock, comprising: a locking mechanism movable between alocked position and an unlocked position; and a multi-frequencytransceiver operable to (i) receive a wireless communication signal froma radio frequency device to transition the electronic lock from a sleepmode of operation to a wake mode of operation and (ii) establish acommunication connection with an access control device for datatransmission between the electronic lock and the access control devicein response to the electronic lock transitioning to the wake mode ofoperation; wherein the communication connection between the electroniclock and the access control device is via a different communicationprotocol from the communication protocol through which the electroniclock receives the wireless communication signal from the radio frequencydevice; and wherein the access control device includes a databasestoring at least one of user identifications, access deviceidentifications, access device credentials, or access device audit data.9. The electronic lock of claim 8, wherein the communication connectionwith the access control device for data transmission between theelectronic lock and the access control device comprises a Wi-Ficonnection.
 10. The electronic lock of claim 8, further comprising akeyed entry mechanism for manually operating the locking mechanism. 11.The electronic lock of claim 8, further comprising: a memory; and aprocessor configured to update at least one of credential data or auditdata stored in the memory in response to the data transmission from theaccess control device.
 12. The electronic lock of claim 8, furthercomprising a user interface having at least one of a visual component oran audio component.
 13. The electronic lock of claim 8, furthercomprising a keypad for user entry of an access code to the electroniclock.
 14. The electronic lock of claim 8, wherein the multi-frequencytransceiver is operable to receive a signal and unlock or lock thelocking mechanism of the electronic lock in response to the signal. 15.A system, comprising: an access device comprising a locking mechanismmovable between a locked and unlocked position, a logic and memorymodule, a multi-frequency transceiver connected to the logic and memorymodule, and a power source; a radio frequency device comprising a radiofrequency transmitter and a transceiver configured to receive signalsfrom a first network, wherein the transceiver is operatively connectedto the radio frequency transmitter to cause the radio frequencytransmitter to output a radio signal in response to the signals from thefirst network, wherein the multi-frequency transceiver of the accessdevice is configured to receive the radio signal from the transmitter;and an access control device operatively connected to the first network,the access control device including a database with at least one of usercredentials, access device identification information, or access deviceaudit data, wherein the access control device is configured to transmitsignals over the first network to the radio frequency device, and theaccess control device is further configured to transmit databaseinformation to the access device via a wireless communication connectionof the multi-frequency transceiver of the access device to the firstnetwork, wherein the wireless communication connection is established inresponse to the access device receiving the radio signal from the radiofrequency device and (ii) waking the access device from a sleep mode ofoperation in response to the radio signal.
 16. The system of claim 15,wherein the wireless communication connection comprises a Wi-Ficonnection.
 17. The system of claim 15, wherein the access devicefurther comprises a keyed entry mechanism for manually operating thelocking mechanism.
 18. The system of claim 15, wherein the radiofrequency device is configured to communicate over sub-1 GHz radiofrequencies.
 19. The system of claim 15, wherein the access device isfurther configured to update at least one of credential data or auditdata stored in the logic and memory module in response to receipt of thedatabase information from the access control device.
 20. The system ofclaim 15, wherein the radio frequency device comprises at least one of abattery or portable power supply.