Wireless access control system and related methods

ABSTRACT

A wireless access control system includes a remote access device and an electronic lock. The electronic lock communicates with the remote access device. The electronic lock controls the ability to lock and unlock a door in which the electronic lock is disposed. The electronic lock determines when the remote access device is at a distance less than or equal to a predetermined distance from the lock to enable the lock to be unlocked.

CROSS REFERENCE TO RELATED APPLICATION(S)

This application is a continuation-in-part of copending U.S. applicationSer. No. 13/415,365, filed Mar. 8, 2012, which claims the benefit ofProvisional Patent Application No. 61/453,737, filed Mar. 17, 2011, inits entirety and is hereby incorporated by reference.

FIELD OF THE INVENTION

The present invention generally relates to access control systems, andmore particularly, to wireless access control systems for door locks.

BACKGROUND

A passive keyless entry (PKE) system offers an increased level ofconvenience over a standard lock and key, for example, by providing theability to access a secure building or device without having to find,insert, and turn a traditional key. A user may simply approach and toucha locked PKE lock and with little if any pause, the lock grants thisuser access if they are carrying an authorized token.

A PKE system is currently used in an automotive application and mayoffer increased convenience by identifying drivers and unlocking the caras they approach and grab the handle. Automotive access is traditionallygiven by inserting a key into the lock or by pushing buttons on atraditional remote keyless entry (RKE) system. In contrast, a PKE systemgrants access with reduced user interaction through the use of a handsfree token carried by the driver.

Several technical challenges have been encountered during theengineering of a radio frequency (RF) PKE system, for example, for usein a residential lock. The desired basic perceived behavior of the PKEsystem in a residential application may be as follows: 1) the userapproaches and touches the lock; 2) the lock authenticates the user witha minimally perceived delay; 3) the lock unlocks; 4) the lock may notoperate if the authorized user is outside a desired range and the lockis touched by another, unauthorized, user; 5) the lock may not operateif the authorized user is on the inside of the house, and the lock istouched on the outside by an unauthorized user; and 6) the batterypowered lock needs several months or more worth of battery life toprevent inconvenient and costly battery changes. 7) if a PKE fob isused, battery power needs to be over a year. 8) the lock can provideanytime, or configurable limited time, access control. 9) the lock hasthe ability to be locked without a remote access device

Indeed, as will be appreciated by those skilled in the art, with respectto the above desired basic perceived behavior of the PKE system in aresidential application, primary challenges to be addressed includeitems 1 (Simplicity), 2 (speed), 4 (distance), 5 (location), 6-7(battery life), and 8-9 (convenience). Accordingly, it may be desirableto improve authentication speed, proximity measurement, locationdetermination, decrease power consumption, and increase convenience forexample.

SUMMARY OF THE INVENTION

A wireless access control system includes a remote access device forauthorizing access control to a lock when present on a user who touches,or triggers a proximity detector, of the lock.

A wireless access control system includes a remote access device forauthorizing access control to a lock when the user possessing theauthorized remote access device is within an activation range of thelock and door. If the authorized user is outside of activation range,signal range, or inside the lock and door, the remote access device willnot be enabled to lock or unlock the door.

A wireless control system includes a remote access device for accessinga lock. The remote access device includes a controller and radio signalgenerator. A battery powers the controller and radio signal generator.An accelerometer provides an acceleration signal to the controller inresponse to sensed acceleration. The radio signal generator outputting aradio signal for a predetermined time period in response to anacceleration signal via the controller. In a preferred embodiment, anauthentication circuit provides an input to the controller forencryption and authentication purposes which are carried by the radiosignal to the lock.

In another embodiment, the remote access device can be a Smartphone. Inanother embodiment, additional haptic feedback can be utilized tocontrol the electronic lock. A user can tap the remote access device ifwithin activation range to cause a larger acceleration trigger which canbe captured by the controller and sent to the lock via a radio signal tolock or unlock the electronic lock in response.

In another embodiment, a lock includes a controller and radio signaltransceiver to communicate with an electronic lock for controlling theelectronic lock in response to the signal from the remote access device.The lock includes an accelerometer for determining movement, such as aknock or the door opening, in which the lock is disposed and controllingthe radio or the electronic lock via the controller as a function of theacceleration signal.

In another embodiment, a real time clock provides a clock input to thecontroller, the controller allowing for configurable access control ofthe electronic lock as a function of the time indicated by a signal fromthe real time clock. The controller operating on the real time clocksignal can permit anytime, limited time, recurring time windows, orone-time use access for example.

In another embodiment, a proximity detector which detects the presenceof a user at or near the lock provides a proximity detection signal tothe controller and radio for permitting control of the electronic lockin response to a signal from a remote access device when the proximityof a user is detected. In one embodiment, the proximity detector may bea touch sensor disposed within the lock or a trip light detector. In oneembodiment, the trip light detector is located at the bottom of adeadbolt lock facing downwards towards the handle so when a user grabsthe handle of the door the light detector is tripped and the deadboltcontroller can initiate the desired action, for example unlocking thedeadbolt.

In another embodiment, the proximity detector can be intentionallytriggered “n” times in a row within a predetermined time period, or becontinuously held for a predetermined time period (the time periodpreferably being ten or fewer seconds) to trigger a lock event without aremote access device being present.

In another embodiment, the proximity detector which detects the presenceof a user at or near the lock provides a proximity detection signal tothe controller and radio to turn on or change the state of the radio inorder to make a connection with an authorized remote access device andlock or unlock the electronic lock. In a preferred embodiment, theproximity detection activates the radio into a listening state for alimited period of time to listen for remote access devicesadvertisements. This listening state requires more power there for it isdesirable to only go into this state for a limited period of time uponuser detection.

In another embodiment, the lock is already communicating with anauthorized remote access device and the proximity detector which detectsthe presence of a user at or near the lock provides a proximitydetection signal to the controller to lock or unlock the electroniclock.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of a wireless access system according tothe present invention;

FIG. 2 a is a perspective view of a lock constructed in accordance withthe invention;

FIG. 2 b is a perspective view of a lock constructed in accordance withanother embodiment of the invention;

FIG. 3 a is a top plan view of a remote access device constructed inaccordance with the invention as a key;

FIG. 3 b is a front plan view of a remote access device constructed inaccordance with yet another embodiment of the invention as anapplication for a cell phone;

FIG. 4 is a front plan view of a Router Plug-in Unit of the wirelessaccess system constructed in accordance with the invention;

FIG. 5 is a schematic diagram of the communication between thecomponents of the wireless access system in a typical residential systemlayout in accordance with the invention;

FIG. 6 is a flow chart of operation of the wireless access system inaccordance with the invention;

FIG. 7 a is a diagram of a system showing the local communicationbetween the remote access and the lock in accordance with the invention;

FIG. 7 b is a diagram of a system showing range and locationdetermination in accordance with the invention;

FIG. 8 is a diagram of a system showing the method of sending accesscontrol authorization from one remote access device to another inaccordance with the invention;

FIG. 9 is a circuit diagram of a remote access device constructed inaccordance with still another embodiment of the invention;

FIG. 10 is a circuit diagram of a PKE lock constructed in accordancewith another embodiment of the invention; and

FIG. 11 is a schematic diagram of a trip light circuit for sensing thepresence of a user in accordance with the invention.

DETAILED DESCRIPTION OF THE INVENTION

The present description is made with reference to the accompanyingdrawings, in which various embodiments are shown. However, manydifferent embodiments may be used, and thus the description should notbe construed as limited to the embodiments set forth herein. Rather,these embodiments are provided so that this disclosure will be thoroughand complete. Like numbers refer to like elements throughout, and primenotation is used to indicate similar elements or steps in alternativeembodiments.

Referring to FIGS. 1, 2 a, 2 b, 3 a, 3 b, and 4, a wireless accesssystem 10, for example, a PKE system, includes a lock 11. The lock 11may be installed in a standard deadbolt hole and may be battery powered,for example. The lock 11 may be a human controlled (keyed) lock, forexample (FIG. 2 a). The lock 11 includes an outer cylinder 12 thatrotates freely around a standard key cylinder 13. When engaged, thecylinder 13 is linked to a deadbolt 14 (which may optionally be part oflock 11), thus giving the user control to extend or retract the deadboltutilizing their key. The lock 11 includes a controller 21 or processorand wireless communication circuitry 22 for wireless communication whichas will be discussed below, enable remote access device 15 to operatelock 11.

Alternatively, in another embodiment, the lock 11′ may be motor powered(FIG. 2 b). When a user is in sufficiently close vicinity or touchesanywhere on the lock, or in proximity of the lock, 11′, the deadbolt 14′is driven by the motor (not shown) to open the lock for authorized usershaving the remote access device 15. Of course, the lock 11 may beanother type of lock or locking mechanism and may be installed in anyaccess point, for example.

Lock 11 includes a proximity detector 27 for detecting the presence of auser. Proximity detector 27 outputs a presence signal in response todetecting a user. As discussed below, proximity detector 27 may be acapacitance touch sensor, a button, a trip light circuit, a near fielddetector, a radio frequency signal strength detector, an audio switch(which actuates upon receipt of audio signals of a set frequency), orthe like. Proximity detector 27 outputs the presence signal tocontroller 21.

In one non-limiting exemplary embodiment, lock 11 is in a hibernation orlow power level state. Upon triggering a proximity detector 27outputting the presence signal by a users touch for example, controller21 causes system 10 to wake up and start listening for remote accessdevices 15 advertisements. Upon finding a remote access device 15, thelock 11 communicates with (connects) to the remote access device 15,determines if the device 15 is an authorized user via an encrypted keyexchange, then determines if the remote access device 15 is in range tocontrol the lock 11, and ultimately provides access to an authorizeduser; all within a short or small perceived delayed time (ten seconds orless) if all the criteria is met.

Additionally, the lock 11 may be advertising or listening (sending orsampling signals) at a low frequency rate in order to conserve batterypower yet establish a communication link with the remote access device15 in advance of a users touch. In this way, increasing the speed of theauthentication process to create little if any perceived delay for theuser.

In another embodiment, once the lock 11 is touched by a user, the lockwireless communication circuitry 22 changes states and starts listeningfor a remote access device 15 advertisement. Once a connection is madeauthentication can be done upon connection, or upon lock or unlockrequest from remote access device 15. Once authenticated, the lock 11tracks the Received Signal Strength Indicator (RSSI) of the remoteaccess device until the algorithm determines it is within a definedaccessible range from lock 11. The lock 11 gathers RSSI data andutilizes this data in an algorithm to determine the position of theremote access device 15. Once the remote access device 15 is within apre-determined accessible distance (control range), the lock grantsremote access device 15 access control to lock or unlock the lock 11.Additional antennas may be used in some embodiments for more accurateposition determining, and to increase authorized user capacity andoverall speed of the wireless access system 10,

Alternatively, in another embodiment, the lock may be a doorknob lock,handle lock, or other style lock for example.

Referring now additionally to FIG. 3, the wireless access system 10includes a remote access device 15. The remote access device 15 isadvantageously a key or token authorized to control the lock 11. Inparticular, the remote access device 15 may be a standard key includinga controller 16 for controlling lock 11 via remote wireless accesselectronics coupled thereto (FIG. 3 a). Remote access device 15 alsoincludes wireless communication circuitry radio 18 such as a radio inone non-limiting embodiment, for sending and receiving signals. In apreferred non-limiting example, the signal is a Bluetooth Low Energysignal.

Alternatively, or additionally, the remote access device 15 may be amobile wireless communications device, such as, for example, aSmartphone that may include the remote wireless access electronicsdescribed above cooperating with an application 17′ stored in memory 17(FIG. 3 b). The application 17′ may be configured to send a signal toprovide access and control over the lock 11′, for example. Of course,more than one remote access device 15′ may be used and may be anothertype of remote access wireless device, for example, a wireless FOBwithout the mechanical key, as will be appreciated by those skilled inthe art.

Referring now additionally to FIG. 4, the wireless access system 10 alsoincludes a Router Plug-in Unit (RPU) 30. Connected to mains power via apower source plug-in 38 and the Internet via a Ethernet port 37 to thehome router. A controller 32 controls operation of RPU 30. In oneembodiment, the RPU 30 includes a radio transceiver 33 to communicatewith lock 11 and/or remote access device 15, and utilizes a BluetoothLow Energy communication protocol to communicate with the lock 11.

The RPU 30 may link to an off-site web-based server 34 via acommunications network such as the internet 28, for example. Thisadvantageously enables RPU 30 to receive near real time updates foradding or removing users, one-time access, extended access or specifictimed access, and other connectivity related updates and functions atlock 11, as will be appreciated by those skilled in the art. Inaddition, the RPU 30 can send lock 11 status and transaction updates viathe Internet 28 to the server 34 which can be viewed on a remote accessdevice 15 or personal computer 25, for example. Additional services maybe selectively provided via the Internet using the connectivity of RPU30 with server 34, for example. While the RPU 30 is described herein asa plugin device, it will be appreciated by those skilled in the art thatthe functionality of the RPU 30 may be embodied in any of a number ofform factors, for example, such as a mobile cellular based unit makinguse of cell network 35.

Referring now additionally to FIG. 5, a typical residential setupexample of the wireless access system 10 is illustrated. As describedabove with respect to FIG. 4, the RPU 30 is typically plugged-in to themains power via power source plug-in 38 and to the internet 28 via thehome router though an Ethernet cable and port 37, at a location near thehome router. RPU 30 may also communicate wirelessly to the lock 11,which may be installed on the front door, for example.

Operation of the wireless access system 10 will now be described withreference additionally to the flowchart in FIG. 6. The lock 11, mayinitially be in a low power mode in a step 101 to conserve batterypower, for example. The lock 11 is typically in a low power mode;searching for authorized remote access devices 15′, for example aSmartphone, at a lower frequency to conserve battery power, In onepreferred non-limiting embodiment, when a user triggers the proximitydetector 27 by touch in a Step 102, or another method, the lock 11begins to listen for remote access devices 15 in a Step 103, morespecifically fobs in this embodiment. At the same time, system 10 powersup and controller 2 increases its broadcast and listening rate.

If lock 11 “sees” (receives) an advertisement from a fob 15 within apredetermined time period in a Step 104, and the fob 15 is authorizedfor access at that time as determined by lock 11 in a step 107, aconnection is made between fob 15 and lock 11 in a step 110. It is thendetermined whether fob 15 is still connected by determining whethercommunication has occurred within a predetermined time period in a Step112.

If the fob 15 has not timed out, then in a Step 114 a lock 11 performs achallenge response verification process to authenticate the remoteaccess device 15. If fob 15 is verified by comparing an identificationportion of the advertisement signal to information stored at system 10,lock 11 begins to gather and process location and positioning data offob 15 in a step 117 utilizing Received Signal Strength Indication(RSSI) by way of non-limiting example. Utilizing the location andpositioning algorithm in step 117, lock 11 can determine if the user iswithin activation range in step 118. If the user is in the activationrange as determined in step 118, the control of lock 11 is given to fob15 and the lock 11 will lock or unlock as needed in a step 119, then thelock 11 disconnects from fob 15 in a step 120 and returns to step 100 toits low power state 101.

If in in Step 104 the advertisement from the fob 15 is not receivedwithin a predetermined time window or the fob is not authorized asdetermined in Steps 107 and a Step 109 in which the signal is ignored,or the fob connection times out in a Step 112, or the challenge responsein Step 115 is not an appropriate one, then the process returns to Step100 to be repeated.

In another embodiment, controller 21 can enable locking the door withoutthe use of fob 15. If proximity detector 27, which may include a touchsensor, determines that lock 11 was touched at least a second timewithin a time window, preferably measured in seconds, in a Step 106,then controller 21 determines whether lock 11 is unlocked in a step 108.If it is determined that lock 11 is in fact unlocked in Step 108, thenit is determined whether or not or not the lock 11 is touched a thirdtime within a predetermined time window measured in seconds or less, andif in fact the lock 11 is touched three times within the time window,then controller 21 causes lock 11 to lock bolt 14 in a Step 113 and theprocess is returned to the beginning in Step 100 to monitor for anotherremote access device 15. If the deadbolt is not touched the prescribednumber of times during the time window, in Steps 106 and 111, or isalready in the locked state as determined in Step 108, then the processreturns to Step 100 to await connection with another remote accessdevice. In this way, a door can be locked merely by activating proximitydetector 27, a predetermined number of times within a predetermined timeperiod, or by continuously activating proximity detector 27 for apredetermined time period.

In another embodiment, the system may work without the need to touchlock 11 in step 102. In this embodiment, lock 11 and remote accessdevice 15 determine that they are within range of each other to beginprocessing without the need to initially touch lock 11. This allows forthe control of lock 11 well ahead of being sufficient proximity of adoor to touch lock 11.

In this preferred non-limiting embodiment, an in-range remote accessdevice 15′, such as a Smartphone, responds in a Step 121 to a broadcastadvertisement from the lock 11 in a Step 121 by controller 21. If theSmartphone 15′ is authorized for access at that time as determined bycontroller 21 in a Step 122, a connection is made in a Step 124 betweena Smartphone 15′ and lock 11. If Smartphone 15′ is authenticated duringa challenge response verification process in Step 125, lock 11 begins togather and process location and positioning data in a Step 127,utilizing RSSI or a signal from Global Positioning System (GPS) enabledSmartphone 15, for example. Utilizing the location and positioningalgorithm in Step 127, the lock 11 can determine if the user is inactivation range in a Step 129. In an optional Step 128, lock 11 maydetermine whether lock 11 has been touched prior to determining whetherthe user is in range in Step 129. If the user is in activation range,lock 11 will lock or unlock (reverse state) in a Step 130.

In another embodiment, information about remote access device 15′ may bestored at any one of memory 55, and memory associated with personalcomputer 25 or server 34. Remote access device 15 may have limitedaccess to lock 11. By way of example, access may only be duringpredetermined time periods of a day, or for a limited number of times;such as a one-time use key. If the remote access device 15′, representsa one-time key as determined in Step 131, this key will be deleted fromthe memory or stored in the memory of system 10 as an invalid key inStep 132 to prevent further access.

As with touch process, in this proximity determination process at anytime controller 21 or 32 determines that the response is inappropriate(Step 125), or remote access device 15 is not a one-time key (131) theprocess is returned to Step 100 to begin again. However, if the buttonhas not been pressed in Step 128 then the process merely returns toredetermining the location of remote access device 15 in Step 127.

A hybrid approach is also possible. In a Step 105, once it is determinedthat the lock has been touched in Step 102 and lock 11 listens for abroadcast from fob 15 in Step 103, if a lock 11 determines in a step 105that a Smartphone connectable advertisement response has been receivedwithin a predetermined time window; five seconds or less in a preferredembodiment, the process continues for Smartphone 15′ at Step 124 asdescribed above. If the response is not appropriate, as determined Step105, then the process returns to the beginning in Step 100.

In another preferred non-limiting embodiment, the location andpositioning algorithm performed in a Step 127 can utilize RSSI information from the lock 11 to the remote access device 15′. This can bedone by the remote access device 15′ receiving RSSI information from thelock 11 and transmitting this RSSI information back to the lock 11 to beprocessed by controller 21 for location and positioning purposes.

In another preferred non-limiting embodiment, any unauthorized user canlock the lock 11 by triggering the proximity detector three consecutivetimes within a predetermined time window such as discussed above in Step106. In another possible embodiment, the lock 11 can be touched and heldfor greater than a predetermined time to lock the lock 11.

In another preferred non-limiting embodiment, only remote access devices15 looking for a unique advertisement from the lock 11 will respond witha connectable advertisement. In this way, the system can provide accesscontrol to many possible authorized devices without adding additionaldelays per additional authorized devices.

In another embodiment in which the remote access device 15′ is aSmartphone, tablet, or similar device, the lock 11 may also request theuser to verify their access control request by requiring the transmittalof a PIN, Password or other authentication code. Lock 11 transmits asignal prompting the users, on their remote access device 15′, forexample, via a display on their mobile wireless communications device toanswer with a PIN. Controller 21 compares the received password toauthentication code previously stored by user at system 10, prior toenabling control of lock 11. This can be done to add additional securityor to assist with inconclusive positioning or location information.

Referring now additionally to FIGS. 7 a and 7 b, a user 70, carries aremote access device 15′, a Smartphone in their pocket for example.Assume the remote access device 15′ is positioned within in-signal range90. In this case, a wireless connection is made between the remoteaccess device 15′ and the lock 11. The remote access device 15′ isauthorized to control the lock 11.

In one non-limiting embodiment, when the user 70 approaches, theirposition is determined by receiving signals from remote access device15′ at an exterior facing antenna 52. Once user 10 is within activationrange 91, and touches the lock 11, the lock 11 radio switches to aninternal antenna 50 to verify the user 70 is on the outside. If thecalibrated RSSI, as determined by controller 21, or some other elementof system 10, from one or more readings from the internal antenna 50 isless than the external calibrated RSSI reading or readings, user 70 isdetermined by controller 21 to be on the outside and the lock 11 willlock or unlock. If the calibrated RSSI from the internal antenna 50 isgreater than the RSSI reading or readings from external antenna 52, user70 is determined to be on the inside, within inside range 92 bycontroller 21, and the lock 11 will not operate as to preventunauthorized entry.

The wireless access system 10 may include a calibration feature. Moreparticularly, a connection between the remote access device 15′ and thelock 11 may be used by the algorithm to calibrate the RSSI input toadjust for varying antenna characteristics of remote access devices 15′or changes in user behavior or environmental conditions, for example. Inone non limiting example, the lock 11 determines RSSI values for remoteaccess devices 15′ unlocking and locking events over a number ofdistinct communications. It then determines a maximum average activationrange 91 value to calibrate with.

In another non limiting embodiment, the lock 11 can request that theremote access device 15′ send its RSSI values as received from the lock11 and utilize these to calibrate for remote access device 15′ antennadifferences. In another embodiment, the calibration is continuouslyself-adjusting per the last “n” number of access control events as toadjust for user behavioral changes or local condition changes over time.

The wireless access system 10 may also include a computing device 25,for example, a personal computer at the user's residence for use in arevocation process by way of example. The computing device 25 mayinclude circuitry for wirelessly communicating with the RPU 30, remoteaccess device 15, and/or lock 11 for revoking a permission from remoteaccess device 15. For example, the computing device 25 may includeBluetooth Low Energy communications circuitry, for example. Otherdevices and communications protocols may be used in the revocationprocess.

While the wireless access system 10 is described herein with respect toa door, the wireless access system may be used for access control orprotection of, but not limited to, appliances, a safe, heavy machinery,factory equipment, power tools, pad locks, real estate lock-boxes,garage door openers, etc., for example. Alternative remote access device15 embodiments may include a pen, watch, jewelry, headset, FDA, laptop,etc., for example. The wireless access system 10 may be used to protectother devices or areas where it may be desired to restrict access.

The present invention lends itself to a process for transferringone-time, limited time, or permanent use Passive Keyless Entry (PKE)token key codes to a cellular or other wireless mobile remote accessdevice 15′ for use with PKE access control devices, such as lock 11 forexample. Reference is now made to FIG. 8. In one exemplary, but nonlimiting embodiment, a first user has a first remote access device 15′embodied in a mobile communication device that is PKE enabled and isknown to lock 11 as an authorized user. A second user has a secondremote access device embodied in a mobile communication device 15″ thatis PKE enabled, but is not authorized for use with lock 11. Both userscan communicate locally with lock 11 via a wireless Bluetooth Low Energynetwork as discussed above for example. Furthermore, both users have theability to communicate with each other via a cellular network 35 asknown in the art, or other wireless communication and as a result havean almost unlimited range.

The authorized user of lock 11, chooses to send an unauthorized user anauthorized token for the lock 11 by way of a mobile application 17′ onauthorized remote access device 15′ to unauthorized remote access device15″. The authorized user can select the option within mobile application17′ on authorized remote access device 15′ for a one-time, limited time,or permanent token to send to unauthorized remote access device 15″.

In one exemplary, but non limiting embodiment, the authorizationcredentials are transmitted from the authorized remote access device 15′to the currently unauthorized remote access device 15″ via the cellularnetwork 35. Now unauthorized remote access device 15″ stores and makesuse of the authorization credentials and becomes an authorized user ofthe lock 11. Another embodiment can be that authorized remote accessdevice 15′ sends a request for information to unauthorized remote accessdevice 15″ which responds to authorized remote access device with usefulinformation such as device 15″ Bluetooth address. This information isthen transmitted from authorized remote access device 15′ to the RPU 30via the cellular network 35 to the internet, then from the internet to ahome router 36 that is connected to the RPU 30. The RPU 30 thentransfers identification information wirelessly to the lock 11, so thatwhen now authorized remote access device 15″ tries to access the lock11, it is already a known remote access device, thus speeding up theinitial access control process.

It should be noted that the use of the mobile phone cellular network wasused by way of non-limiting example. The key code can be sent directlyto another device via SMS text message, Email, or other datacommunication protocols. Additionally, the key codes can be sent toanother device through server 34, or a server disposed in thecommunications network, which can also act as a master database.Additionally, the key code master database can allow a user to manage(send, receive, revoke) locks from a secured webpage. Additionally, thekey code master database can be used to restore a devices key codes viaa mobile application with verification upon a lost or damaged device.

This present invention also lends itself to revoking authorization. In aprocess to revoke a key where the key is a smart phone, tablet or thelike, once a user decides to revoke a key code, the user may send atermination request directly to the remote access device key 15′ beingrevoked, via the cellular network 35 using computer 25 or anothercomputing device. If there is no response, the request is broadcast tousers, for example, all users, in the “approved” network (i.e. usersenrolled in the same lock 11). The request is stored in the backgroundmemory on their respective keys. Then when any authorized user is inrange of the lock 11, the claimant request is activated and the key codeof the requested revoked user is revoked from the lock, denying accessto the revoked user. In another embodiment, the revoked key informationcan be sent via the cellular network 35, or through the Internet 28, tothe RPU 30, then to the lock 11 to disable access.

With respect to power conservation and increased security methods forthe lock 11, a remote access device 15 for example, may include theremote access application and a global positioning system (GPS) receiver23. The GPS receiver may be used to track the location of remote accessdevice 15 relative to the position of lock 11 and enable communicationby the lock 11 only when the remote access device 15 is within range, bygeo fencing for example. If the remote access device 15, i.e. mobilewireless communications device 15′ is outside the range, as determinedby the GPS receiver 23, remote access 15 may tell the lock 11, via thecell network 35 and Internet 28 through the RPU 30 to go into sleep modeor turn off. Additionally, or alternatively, the location of the mobilewireless communication device 15′ may be determined via triangulationwith wireless service provider base stations or towers, for example.

Alternatively, or additionally, the remote access device 15 or mobilewireless communications device 15′ may wake up, determine a position,calculate a fastest time a user could be within range of the lock 11,then wake up again at that time and recalculate. When the user is withinthe range, it may enable the remote access application 17, and, thuscommunication for authentication or other purposes.

Another method in which to conserve power consumption within remoteaccess device 15 is to provide a wake-up mechanism internal to remoteaccess device 15. Reference is now made to FIG. 9 in which a remoteaccess device generally indicated as 15 constructed in accordance withanother embodiment of the invention is provided. The circuitry as shownin FIG. 9 may be provided in any form factor known for a portable remoteaccess device which as shown above is disposed within a cellphone,within a key, a fob, or any other portable entry device known in theart.

Remote access device 915 includes a radio signal generator 918 poweredby a battery 900 to provide portability. Radio signal generator 918generates a radio signal to be transmitted by an antenna 53 to bereceived at the lock 11 to gain access to the door in which a lock isprovided as discussed above. A controller 16 controls operation ofremote access device 15 and provides an input to radio signal generator918. An authentication chip 24 provides an information input to thecontroller 16, such as security identification information, encryptioninformation, and the like to be carried by the radio signal generated byradio 18 and recognized at the lock 11. In an alternative embodiment,the authentication process can be performed on the controller 16.

If radio 18 were to continuously output a radio signal even when the fobis not in use, it would exhaust battery 900 at a higher rate requiringfrequent replacement, if replacement were even possible in some key fobconstructions. A trigger mechanism is provided within key fob circuitry915 to begin the creation of a radio signal by radio signal generator918. In one preferred embodiment, an accelerometer 39 is provided withinkey fob circuitry 915 and outputs an acceleration signal to thecontroller 16 upon acceleration of the key fob 915. The accelerationsignal is output to the controller 16 and the radio signal generator 918is triggered to begin generating a radio signal. Radio signal generator918 includes an onboard counter for measuring a predetermined timeperiod during which transmission of the radio signal generator 918occurs. The signal from the accelerometer 39 causes controller 16 tobegin the transmission of the radio signal, and absent the accelerationsignal, after the predetermined time period, the radio signal generator918 does not operate. In this way, a radio signal is only produced whenfob 15 is moving; such as when a person is in motion and approaches alock carrying the fob for example, and not producing a radio signal whensomeone removes the key fob 15 from their pocket and sets it down on atable for example.

In one embodiment, light emitting diodes (LED) 901 are provided forproviding a visual signal to a user of key fob circuitry 915. By way ofexample, LED 901 may be powered during transmission of the radio signalby radio signal generator 918, or may indicate a low battery condition.

By use of key fob circuitry 915, battery life is increased by limitingthe transmission of the advertising radio signals to times when remoteaccess device 15 is in motion. This also increases security if the userwere to leave their keys near the lock 11, but just on the inside of thedoor. If the key were in a bowl or on a table near the door as oftendone, no motion would be sensed and the radio signal would not betriggered so there would be no false acceptance of an outside userresulting from the transmission of the radio signal while the key is onan interior side of the lock.

Reference is now made to FIG. 10 in which a circuit for a lock,generally indicated as 1011, having a proximity sensor triggered wake-upoperation is provided. Lock circuit 1011 includes a connection to anelectronic lock 1014 mounted within a door. Electronic lock 1014 iscontrolled by signals output by a controller 21. The lock circuit 1011also includes a radio signal generator 1022 for communication withremote access devices 15. The circuitry 1011 is powered by batteries1000. The radio 1022 receives radio signals from an internal antenna 50and an external antenna 52. These antennas to the radio 1022 may becontrolled by a RF switch 1001 which switches between the internalantenna 50 and external antenna 52. For the purposes of thisdescription, internal is a direction facing within the dwelling thatincludes the door in which lock 11 is disposed while external is theoutwardly facing direction outside of the dwelling or structure whichcontains the door in which the lock is disposed. The external antenna 52may be disposed on an external side of the door.

The Radio 1022 operates under the control of a controller 21, memory 55,accelerometer 26, authentication unit 54, real time clock 1002, andproximity detector 27. During operation, controller 21 is dormant, notactively controlling bolt 14 or electronic lock 1014, so it maintainsits current condition until acted upon. Proximity detector 27 may be acapacitance detector as discussed above. Proximity detector 27 outputs apresence signal 10 when the proximity of a user is detected, to radiocontroller 21 to wake up radio 22 to begin the lock or unlock operation.

It should be noted, that proximity detector 27 takes the form of acapacitance detector. However, as seen in FIG. 11, proximity detector 27may include an LED 1102 and photodetector circuit 1104 between a handle1106 and lock 1111 to form a trip light circuit. In this way, a usertouches either one of handle 1102 or lock 1111, the user blocks thelight path, breaking a light circuit as known in the art to signal thepresence of the user.

Alternatively, the proximity detector 27 may also be a near fielddetector, a magnetic field detector, or even a radio signal detector fordetecting the signal from a remote access device such as remote accessdevice 15 as it is within close proximity of lock 11. In yet anotherembodiment, proximity detector 27 may take the form of a second lock, orhandle, such as on a screen or storm door. Activation of the second lockis detected by proximity detector 27 which outputs a presence signal.

Lock circuitry 1011 also includes a memory 55 for storing data such asrecognition information for authorized users or even periods ofoperation corresponding to specific users. By way of example, staff at afacility may only be provided access during their shift occurring at aknown predetermined time. Memory 55 may also store active time periodsof the day such as morning, or afternoon, when lock 11 is most in use.

A real time clock 1002 provides a real time output to controller 21which in conjunction with access times stored in memory 55 determineswhen to provide access for certain authenticated users, discussed inmore detail below, or when to stay on such as during known busy timeperiods to eliminate any operating delays. For example, between thehours of 8:00 and 9:00 when people may be showing up for work, or in aresidential setting, the hours of 2:00 to 4:00 when children arereturning from school, one may want the radio 22 to be broadcasting orlistening at a faster rate to eliminate any delay in the operation oflocking or unlocking the door.

The Authentication chip 54 creates public and private keys to be used bythe controller 21 to authenticate and confirm the identity of theauthorized remote access devices 15. The authentication unit 54 whichincludes encryption data for encrypting communications transmitted byradio 1022 or unencrypting messages received at either one of theantennas 50 or 52.

During operation, a user will approach or touch lock 11 to be detectedby proximity detector 27 sending a user interaction signal to thecontroller 21. The radio 1022 will receive signals from a remote accessdevice 15 at one or both of antennas 50 and 52. The received signalswill be processed by the controller 21 to determine position andlocation as described above. Additionally, the controller verifies theremote access device 15 is authorized for access at that time asdetermined by utilizing the real time clock 1002 and data stored inmemory 55. If access is permitted, or permitted as a function of time ofday, then the actual signal received by the radio 1022 will beauthenticated utilizing the authentication chip 54.

If the radio signal is recognized by the controller 21, the controller21 will lock or unlock the electronic lock 14.

An accelerometer 26 may also provide an input to the radio 22 via thecontroller 21. An accelerometer 26 embedded in the door senses when thedoor is open or closed, or even experiences vibration such as a knock.In the absence of authorization as a function of memory unit 55 workingwith the real time clock 1002 and/or authentication processing utilizingauthentication chip 54, the triggering of accelerometer 26 is anindication of an unwanted person at the door or even a break-in. In oneembodiment, if a signal is received from accelerometer 26 in the absenceof other authorizing indicia, then the controller 21 may send a signalvia the radio 1022 along either one of internal antenna 50 or externalantenna 52 to remote access device 15 or RPU 30 to cause an alert to besent to a selected user.

The wireless access system 10 may be used to augment multi-factorauthentication, e.g. use with a biometric identifier, personalidentification number (PIN) code, key card, etc. The wireless accesssystem 10 may also allow simultaneous multiple authentication of remoteaccess device, for example, mobile wireless communications devices. Moreparticularly, the wireless access system 10 may require a thresholdnumber of authorized remote access devices 15 to be present at a sametime for authentication to succeed.

The wireless access system 10 advantageously may provide increasedsecurity, for example. More particularly, the wireless access system 10may force the user to authenticate in addition to authorization, via theremote access device 15 before the door can be opened. For example, theremote access device 15 may include an authentication device 24 forauthentication via a biometric, password, PIN, shake pattern,connect-the-dots, or combination thereof, for example, prior toaccessing the lock 11. In the case of the remote access application 17on a mobile wireless communications device, for example, the applicationmay have multiple security levels to enable these features, as will beappreciated by those skilled in the art.

With respect to security features, by using proximity sensors, switches,or the like, the wireless access system 10 may indicate whether a userlocked the door, for example. When a user locks the door, for example,the remote access application 17 may log “Lock” with a time stamp sothat it may be tracked and checked on the remote access device 15, i.e.the mobile wireless communications device, for example. The wirelessaccess system 10 may include a sensing device 26 for example, anaccelerometer to track door openings, for example. Based upon theaccelerometer, data may be provided through the application or via theInternet or other network, for example. The sensing device 26 may beanother type of device, for example, a touch sensor.

In one advantageous security feature, when the door is opened, or anattempt is made to open the door, which may be detected by theaccelerometer 26 or other door opening determining methods, as will beappreciated by those skilled in the art, known, and even previouslyrevoked, remote access devices 15 in range and/or discoverable devices,may be recorded along with a time stamp. This may capture anunauthorized user, for example.

Another advantageous feature of the wireless access system 10 may allowauthorized visits, for example. More particularly, an authorized visitmay be enabled by a 911 dispatcher or other authorized user to allowspecial or temporary access by the smart phone of a normallyunauthorized user, for example. The wireless access system 10 may keep alog/audit trail. Approval may be granted by trusted a friend or specialauthority, for example, emergency medical services, a fire department,or a police department.

The wireless access system 10 may also include a security featurewhereby when a threshold time has elapsed, the wireless access systemmay ignore a remote access device 15 in range. This advantageouslyreduces or may prevent unauthorized access that may occur from leaving aremote access device 15 that is authorized inside near the door. Atimeout function (via a timer, not shown) may additionally be used inother undesired entry scenarios. The wireless access system 10 may alsolog all rejected pairing attempts, as will be appreciated by thoseskilled in the art.

The wireless access system 10 may also include a revocable key securityfeature. For example, the wireless access system 10 may include bothrevocable and non-revocable keys. If, for example, the wireless accesssystem 10 is unable to access the server 34 to verify keys, for example,the wireless access system may force the application 17 on the remoteaccess device 15, for example, to check the servers. If the wirelessaccess system 10 is unable to connect or verify the keys, access isdenied.

The identification of remote access device may be stored in memory 55 orat server 34, or computer 25. The status of the key as a one-time key,or limited duration key may also be stored. During the authenticationprocess, lock 11 may compare the identification and/or passwordinformation with information stored within system 10 to determinewhether access has been revoked or expired.

For example, the revocable key feature may be particularly advantageousto keep an old boyfriend, for example, who is aware that his key isbeing revoked from being able to turn off his remote access device 15 sothat the key is not deleted. However, a wireless connection for theremote access device 15 may be a prerequisite to access in someinstances.

As will be appreciated by those skilled in the art, the wireless accesssystem 10 has the ability to transfer a key from one remote accessdevice 15 to another with the remote access application 17, for example.It may be desired that these keys be revocable in some configurations.However, if the remote access device 15 with the key to be revoked isnot accessible via the network 28, then revocation may not be guaranteedif the lock 11 is offline, for example. The wireless access system 10advantageously addresses these challenges.

A proximity detection feature may be included in the wireless accesssystem 10, and more particularly, the remote access device 15 may use amagnetic field sensor, such as, for example, a compass in mobilewireless communications device, as a proximity sensor to obtain a moreuniform approach/departure distance calibration. A magnetic pulse orpulse sequence may be used in the lock 11 to illuminate a magnetic fluxsensor in the remote access device 15 to establish proximity.

Additionally, the remote device 15, for example, a mobile wirelesscommunications device or mobile telephone, may be qualified using bothradio frequency (RF) and audio, for example. The remote access device 15may be a source or sink of audio to help qualify proximity.

In another embodiment, as an alternative to a human driven lock, asnoted above, a turn-tab (not shown) may be included that will “flip out”of the front of the lock 11 when pressed to allow the user to turn thelock on an un-powered deadbolt 14. It may be desirable that the surfacearea be no larger than a standard key, for example. The user pushes theturn-tab back into the lock face when done. The turn-tab mayalternatively be spring loaded, for example.

In another embodiment, the turn-tab (not shown) may be added to apowered lock, for example the lock 11 described above. This is may beuseful to help force ‘sticky’ locks, for example, as will be appreciatedby those skilled in the art. This may also allow the user to give amanual assist to the motor in case of a strike/deadbolt 14 misalignment.This may also allow for operation in a low battery situation, forexample. The turn-tab may be particularly useful in other situations.

Additionally, one of the deadbolts may have a traditional key backup asit may be needed for emergencies, for example, while the remainingdeadbolts on a house may be keyless. This may eliminate the need tomatch physical keys on multiple deadbolts, and may reduce the cost foradditional deadbolts.

The wireless access system 10 may also include an additional accessfeature. For example, with the RPU 30 connected to the Internet 28through the home router 36, this provides access to the server 34 forexample, it may be possible to have the lock 11 unlock via a commandfrom the RPU 30 through the internet. In other words, the lock 11 couldbe opened for users who don't have a remote access device 15. Moreparticularly, they could call a call center or service that could unlockthe lock 11 via the Internet 28, for example, or via other wirelesscommunications protocol. Also, an authorized user could provide thisaction as well. Additionally, fire/police could gain access by thismethod if the lock owner opts-in to this service. As will be appreciatedby those skilled in the art, alternatively, a command could be sent fromthe remote access device 15.

The wireless access system 10 may also include an activation indication.For example, the remote access device 15 can signal the operator via anauditory tone, vibration or other indication when the lock is activated.This may help communicate actions to the user to reduce any confusion.

The wireless access system 10 may also include an additional securityfeature. For example, the wireless access system 10 may use anadditional authentication channel, for example, via a WLAN, WiFi, orother communication protocol, either wired or wireless, with the remoteaccess device 15. This may improve authentication and make spoofingconsiderably more difficult, as will be appreciated by those skilled inthe art.

As another security feature of the wireless access system 10, if cellservice and data service, for example, if the remote access device 15 isa mobile phone, are turned off, remote access application may considerthis a threat related to key revocation and authentication may not beapproved.

Also, the lock 11 may include a radar device, or a radar device may becoupled adjacent the lock to detect the locations of the entrant byfacing outward in its sweep to resolve inside/outside ambiguity, forexample. If the radar does not detect an entrant, then by default theholder of the remote access device is inside and the lock is notactivated.

The lock 11 includes an interior facing directional antenna 50 and a anexternal facing directional antenna 52. Each is operatively coupled tothe radio 22 to send signals to, and listen for signals from, remoteaccess devices 15. If a remote access device 15 is on the interior ofthe lock, then the interior facing directional antenna 50 communicateswith remote access device 15, and the signal strength sensed bydirectional antenna 50 will be greater than the signal strength sensedby directional antenna 52 (which may be no sensed signal). Lock 11, andin turn system 10, determine that remote access device is inside thehome, dwelling or structure. Conversely, if remote access device 15 isexterior of the lock, exterior facing directional antenna 52communicates with remote access device 15 and the signal strength atdirectional antenna 52 is greater than the signal strength received atdirectional antenna 50. System 10 determines that remote access device52 is outside of the dwelling and operates as discussed above. The lock11 compares the signals from interior facing directional antenna 50 andexterior facing directional antenna 52 to confirm the location of remoteaccess device 15 prior to enabling the remote access device 15 tocontrol lock 11. This prevents undesired unlocking if an authorized useris inside the door.

A mechanical or zero/low-power tilt sensor may be configured to detectbreak-in events, for example to the lock 11. Upon a detected break-in,the lock 11 activates and thereafter communicates to the RPU 30 toreport an intruder alert. The lock 11 may also store information, in amemory, for example, if home-connect plugin is off-line.

Indeed, while the different components of the wireless access system 10have been described with respect to a wireless protocol, it will beappreciated by those skilled in the art that the components maycommunicate via a wired network and protocols or a combination of wiredand wireless networks. Additionally, while Bluetooth, Bluetooth LowEnergy, and WLAN (i.e. WiFi) has been described herein as wirelessprotocols of particular merit, other wireless protocols may be used, forexample, Zywave, ZigBee, near field communication (NFC), and otherwireless protocols.

Many modifications and other embodiments of the invention will come tothe mind of one skilled in the art having the benefit of the teachingspresented in the foregoing descriptions and the associated drawings.Therefore, it is understood that the invention is not to be limited tothe specific embodiments disclosed, and that modifications andembodiments are intended to be included within the invention.

1-53. (canceled)
 54. A wireless access control system for a door, thewireless access control system comprising: a plurality of remote accessdevices, each having a unique remote access identification (ID); and alock assembly for the door and comprising a lock, lock wirelesscommunications circuitry, a memory for storing a plurality of authorizedremote access device IDs, and a lock controller coupled to said lock,said lock wireless communications circuitry, and said memory; and eachremote access device comprising remote access wireless communicationscircuitry, and a remote access controller configured to cooperate withsaid remote access wireless communications circuitry to wirelesslytransmit an access command to switch said lock between the locked andunlocked positions, and to wirelessly transmit a revoke authorizationcommand for a given remote access device ID; said lock controllerconfigured to switch said lock between the locked and unlocked positionsbased upon wirelessly receiving, via said lock wireless communicationscircuitry, the access command from said remote access device and basedupon said memory having the given remote access device ID storedtherein, and revoke authorization from the given remote access device IDstored in said memory based upon receiving the revoke authorizationcommand from said remote access device.
 55. The wireless access controlsystem of claim 54 wherein said remote access controller is configuredto wirelessly transmit the revoke authorization command for a givenremote access device ID based upon a threshold distance from said lockassembly.
 56. The wireless access control system of claim 54 whereinsaid remote access controller is configured to wirelessly receive thegiven remote access device ID from a remote computing device.
 57. Thewireless access control system of claim 54 wherein authorized ones ofsaid plurality of remote access devices each wirelessly receives thegiven remote access ID from a remote computing device.
 58. The wirelessaccess control system of claim 57 wherein the authorized ones of saidplurality of remote access devices each wirelessly receives the givenremote access ID from the remote computing device based upon there beingno response from a remote access device associated with the given remoteaccess device ID.
 59. The wireless access control system of claim 54wherein each remote access device further comprises a memory coupled tosaid remote access controller for storing the given remote access IDtherein; and wherein said remote access controller is configured towirelessly transmit the revoke authorization command for the givenremote access device ID stored in said memory based upon a thresholddistance from said lock assembly.
 60. The wireless access control systemof claim 54 wherein at least one of the plurality of said remote accessdevices comprises a display coupled to said remote access controller.61. The wireless access control system of claim 54 wherein said remoteaccess wireless communications circuitry comprises cellularcommunications circuitry.
 62. A lock assembly for a wireless accesscontrol system for a door, the wireless access control system comprisinga plurality of remote access devices, each having a unique remote accessidentification (ID), the lock assembly being for a door and comprising:a lock; lock wireless communications circuitry; a memory for storing aplurality of authorized remote access device IDs; and a lock controllercoupled to said lock, said lock wireless communications circuitry, andsaid memory, said lock controller configured to said lock controllerconfigured to switch said lock between the locked and unlocked positionsbased upon wirelessly receiving, via said lock wireless communicationscircuitry, an access command from the remote access device and basedupon said memory having a given remote access device ID stored therein,and revoke authorization from the given remote access device ID storedin said memory based upon wirelessly receiving a revoke authorizationcommand from the remote access device.
 63. The lock assembly of claim62, wherein said lock controller is configured to revoke authorizationfrom the authorized remote access device IDs based upon wirelesslyreceiving the revoke authorization command from a remote computingdevice.
 64. A remote access device from among a plurality thereof, eachhaving a unique remote access identification (ID), the remote accessdevice being for a wireless access control system for a door, thewireless access control system comprising a lock assembly for the doorand comprising a lock, lock wireless communications circuitry, a memoryfor storing a plurality of authorized remote access device IDs, and alock controller coupled to the lock, the lock wireless communicationscircuitry, and the memory, each remote access device comprising: remoteaccess wireless communications circuitry; and a remote access controllerconfigured to cooperate with said remote access wireless communicationscircuitry to wirelessly transmit an access command to switch said lockbetween the locked and unlocked positions, and to wirelessly transmit arevoke authorization command for a given remote access device ID, theaccess command causing the lock controller to switch the lock betweenthe locked and unlocked positions based upon wirelessly receipt thereof,via the lock wireless communications circuitry and based upon the memoryhaving the given remote access device ID stored therein, and the revokeauthorization command causing the lock controller to revokeauthorization from the given remote access device ID stored in thememory based upon receiving the revoke authorization command from theremote access device.
 65. The remote access device of claim 64 whereinsaid remote access controller is configured to wirelessly transmit therevoke authorization command for a given remote access device ID basedupon a threshold distance from said lock assembly.
 66. The remote accessdevice of claim 64 wherein said remote access controller is configuredto wirelessly receive the given remote access device ID from a remotecomputing device.
 67. The remote access device of claim 64 whereinauthorized ones of said plurality of remote access devices eachwirelessly receives the given remote access ID from a remote computingdevice.
 68. The remote access device of claim 67 wherein the authorizedones of said plurality of remote access devices each wirelessly receivesthe given remote access ID from the remote computing device based uponthere being no response from a remote access device associated with thegiven remote access device ID.
 69. The remote access device of claim 64wherein each remote access device further comprises a memory coupled tosaid remote access controller for storing the given remote access IDtherein; and wherein said remote access controller is configured towirelessly transmit the revoke authorization command for the givenremote access device ID stored in said memory based upon a thresholddistance from said lock assembly.
 70. A method of using a wirelessaccess control system for a door, the wireless access control systemcomprising a plurality of remote access devices, each having a uniqueremote access identification (ID) and a lock assembly for the door, thelock assembly comprising a lock, lock wireless communications circuitry,a memory for storing a plurality of authorized remote access device IDs,and a lock controller coupled to the lock, the lock wirelesscommunications circuitry, and the memory, the method comprising: using aremote access controller to cooperate with remote access wirelesscommunications circuitry to wirelessly transmit an access command toswitch the lock between the locked and unlocked positions, and towirelessly transmit a revoke authorization command for a given remoteaccess device ID; and using the lock controller to switch the lockbetween the locked and unlocked positions based upon wirelesslyreceiving, via the lock wireless communications circuitry, the accesscommand from the remote access device and based upon the memory havingthe given remote access device ID stored therein, and revokeauthorization from the given remote access device ID stored in thememory based upon receiving the revoke authorization command from theremote access device.
 71. The method of claim 70 wherein the remoteaccess controller is used to wirelessly transmit the revokeauthorization command for a given remote access device ID based upon athreshold distance from the lock assembly.
 72. The method of claim 70wherein the remote access controller is used to wirelessly receive thegiven remote access device ID from a remote computing device.
 73. Themethod of claim 70 wherein authorized ones of the plurality of remoteaccess devices each wirelessly receives the given remote access ID froma remote computing device.
 74. The method of claim 73 wherein theauthorized ones of the plurality of remote access devices eachwirelessly receives the given remote access ID from the remote computingdevice based upon there being no response from a remote access deviceassociated with the given remote access device ID.
 75. The method ofclaim 70 wherein each remote access device further comprises a memorycoupled to the remote access controller for storing the given remoteaccess ID therein; and wherein the remote access controller is used towirelessly transmit the revoke authorization command for the givenremote access device ID stored in the memory based upon a thresholddistance from the lock assembly.